599 results
-
Point counting in families of hyperelliptic curves
Speaker : Hendrik Hubrechts - Leuven University
Let p be a small prime number, F a field of characteristic p and extension degree n, and E a hyperelliptic curve over F. In cryptography one tries to exploit the hardness of determining a discrete logarithm on the jacobian of such curves. In order to achieve this it is important to know what the size of this jacobian is. This parameter can be deduced from the zeta function of the curve.<br/>[…] -
Association de malfaiteurs
Speaker : Yannick Chevalier - Toulouse III
Le travail présenté s'inscrit dans le cadre de l'analyse automatique au niveau symbolique de protocoles cryptographiques. De nombreuses procédures de décisions ont été présentées dans différents cadre ces dernières années. Un point commun de ces procédures est qu'à chaque fois, un adversaire est spécifié par des règles de déductions, et que seules certaines opérations changent. Par[…] -
Group Signatures for Federated Systems
Speaker : Mark Manulis - Ruhr-University of Bochum
For many mutli-party applications group signatures are important cryptographic primitives that can be used for the purpose of anonymity and privacy. In classical group signatures members of a group are able to sign messages anonymously on behalf of the group. However, there exists a designated authority, called group manager, that initializes the scheme, adds new group members, and is able to open[…] -
Le décodage itératif et ses applications à la cryptanalyse
Speaker : Anne Canteaut et Jean-Pierre Tillich - INRIA, projet CODES
Un certain nombre de cryptanalyses sur les algorithmes de chiffrement à flot peuvent s'exprimer comme des problèmes de correction d'erreurs et bénéficient par conséquent des progrès réalisés dans le domaine du décodage. Dans cet exposé, nous présenterons plusieurs attaques sur les systèmes par registre filtré qui reposent toutes sur l'existence de relations linéaires creuses entre[…] -
Cryptography in the Bounded Quantum-Storage Model
Speaker : Serge Fehr - CWI Amsterdam
Most of todays cryptography relies on the assumption that a potential attacker cannot solve some computational problem (e.g. factor a large integer). It has been shown in the early 80's that with the use of quantum-mechanical effects, certain cryptographic tasks can be done unconditionally, i.e., secure against computationally unbounded attackers: Quantum-cryptography, and with it the hope[…] -
Constructing group based provably secure encryption schemes: a
Speaker : Maria Isabel Gonzalez Vasco - Universidad Rey Juan Carlos Madrid
Cryptographic primitives arising from group theory have in the last few years attracted a lot of attention. Unfortunately, up to date most of the existing proposals are still far away from practical applications, not only due to unlucky computational assumptions which later turned out to be invalid. In this talk we address the impact of modern security analysis in the sense of provable security to[…]