599 results
-
Symmetric Encryption Scheme adapted to Fully Homomorphic Encryption Scheme
Speaker : Pierrick Méaux - ENS Paris
Fully Homomorphic Encryption is a powerful cryptographic construction, enabling to securely compute all functions on encrypted data, and decrypt the result of the function applied on the real data.<br/> This construction allows to securely delegate computation, which is a very important property with the increasing of the Cloud computing. Many client-server applications are appearing, all[…] -
The Analysis of Error-Correcting Capabilities of Non-Binary LDPC Codes
Speaker : Alexei Frolov - Institute for Information Transmission Problems of the Russian Academy of Sciences (IITP RAS)
Non-binary low-density parity-check (NB LDPC) codes significantly outperform their binary counterparts. Moreover, NB LDPC codes are especially good for the channels with burst errors and high-order modulations. This talk is devoted to the analysis of error-correcting capabilities of NB LDPC codes.<br/> We start with distance properties of NB LDPC codes. We consider two approaches to obtain[…] -
NFLlib une librairie pour la cryptographie fondée sur les réseaux
Speaker : Carlos Aguilar - INP ENSEEIHT
Dans cette présentation je décrirai dans un premier temps ce que sont les réseaux d’idéaux et leur importance en cryptographie. Ensuite je présenterai quelques techniques (NTT-CRT, opérations modulaires rapides) permettant de manipuler les objets associés à faible coût. Finalement je décrirai comment réaliser des implémentations simples et efficaces de cryptosystèmes fondés sur les réseaux grâce à[…] -
Efficient Implementation of Ideal Lattice-Based Cryptography on Embedded Devices
Speaker : Thomas Pöppelmann - Infineon Technologies AG
Novel public-key cryptosystems beyond RSA and ECC are urgently required to ensure long-term security in the era of quantum computing. One alternative to such established schemes is ideal lattice-based cryptography which offers elegant security reductions and versatile cryptographic building blocks such as the ring learning with errors (RLWE) problem. In this talk we will give an overview on[…] -
Algorithms on Ideal over Complex Multiplication order (ATTENTION : Exceptionnellement, exposé en SALLE de la BIBLIOTHÈQUE (au 8ième étage)
Speaker : Paul Kirchner - Rennes 1
En 2002 Gentry et Szydlo ont inventé un algorithme sur les anneaux cyclotomiques pour casser un schéma de signatures NTRU. Depuis, il a trouvé d'autres applications, tant en cryptographie qu'en théorie algébrique des nombres.<br/> On va présenter une simplification de cet algorithme, qui peut être étendu à tout corps de nombres. En particulier, on peut calculer dans le groupe des[…] -
Speeding up Fully Homomorphic Encryption
Speaker : Marie Paindavoine - Orange Labs
Access to encrypted data is often “all-or-nothing” : either one has to decrypt everything, or one cannot read anything. Following Gentry’s work in 2009, fully homomorphic encryption has gained more and more attention, in particular because it allows more flexibility on encrypted data access and process. It is now possible to evaluate functions on encrypted data and get only the result – encrypted[…]