Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
701 résultats
-
-
Séminaire
-
Cryptographie
Efficient Implementation of Ideal Lattice-Based Cryptography on Embedded Devices
Orateur : Thomas Pöppelmann - Infineon Technologies AG
Novel public-key cryptosystems beyond RSA and ECC are urgently required to ensure long-term security in the era of quantum computing. One alternative to such established schemes is ideal lattice-based cryptography which offers elegant security reductions and versatile cryptographic building blocks such as the ring learning with errors (RLWE) problem. In this talk we will give an overview on[…] -
-
-
Séminaire
-
Cryptographie
Gröbner Bases Techniques in Post-Quantum Cryptography
Orateur : Ludovic Perret - LIP6
After the publication of Shor's algorithm, it became evident the most popular public-key cryptographic systems that rely on the integer factorization problem or on the discrete logarithm problem would be easily solvable using large enough quantum computers (if such quantum computers are ever built). That triggered a vivid interest in the research of cryptographic algorithms (mostly public-key[…] -
-
-
Séminaire
-
Cryptographie
Sanitization of FHE Ciphertexts
Orateur : Damien Stehlé - ENS Lyon
By definition, fully homomorphic encryption (FHE) schemes support homomorphic decryption, and all known FHE constructions are bootstrapped from a Somewhat Homomorphic Encryption (SHE) scheme via this technique. Additionally, when a public key is provided, ciphertexts are also re-randomizable, e.g. by adding to them fresh encryptions of~$0$. From those two operations we devise an algorithm to[…] -
-
-
Séminaire
-
Cryptographie
Multilinear Maps from Obfuscation
Orateur : Pooya Farshim - ENS Paris
We provide constructions of multilinear groups equipped with natural hard problems from indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements known results on the constructions of indistinguishability obfuscators from multilinear maps in the reverse direction.<br/> We provide two distinct, but closely related constructions and show that multilinear analogues of the[…] -
-
-
Séminaire
-
Cryptographie
How to find low-weight polynomial multiples.
Orateur : Carl Löndahl - Université de Lund
We present an improved algorithm for finding low-weight multiples of polynomials over the binary field using coding heoretic methods. The associated code defined by the given olynomial has a cyclic structure, allowing an algorithm to earch for shifts of the sought minimum-weight odeword. Therefore, a code with higher dimension is onstructed, having a larger number of low-weight codewords nd[…] -
-
-
Séminaire
-
Cryptographie
Bornes de Weil généralisées pour le nombre de points d'une courbe projective lisse définie sur un corps fini.
Orateur : Emmanuel Hallouin - Université de Toulouse 2
Je commencerai par rappeler l'esprit de la preuve initiale de Weil pour la majoration du nombre de points d'une courbe projective lisse définie sur un corps fini. En particulier, j'insisterai sur le fait qu'elle découle de contraintes euclidiennes dans un espace euclidien bien choisi. Ensuite je montrerai comment cette borne de Weil peut être vue comme la borne d'ordre 1 d'une classe de bornes de[…] -