Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
633 results
-
-
Seminar
-
Cryptography
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble
Speaker : Michele Orru - ENS
-
-
-
Seminar
-
Cryptography
Unifying Leakage Models on a Renyi Day
Speaker : Thomas Prest - PqShield
In the last decade, several works have focused on finding the best way to model circuit leakage in order to obtain provably secure implementations. One of the most realistic models is the noisy leakage model, introduced in (Prouff, Rivain'13) and (Duc-Dziembowski-Faust'14) together with secure constructions. These works suffer from various limitations, in particular the use of ideal leak-free[…] -
-
-
Seminar
-
Cryptography
CSIDH: an efficient post-quantum commutative group action
Speaker : Chloé Martindale - Technical University of Eindhoven
CSIDH, or `commutative supersingular isogeny Diffie-Hellman' is a new isogeny-based protocol of Castryck, Lange, Martindale, Panny, and Renes.<br/> The Diffie-Hellman style scheme resulting from the group action allows for public key validation at very little cost, runs reasonably fast in practice, and has public keys of only 64 bytes at a conjectured AES-128 security level, matching NIST’s post[…] -
-
-
Seminar
-
Cryptography
Optimisation des Principaux Composants des Chiffrements par Bloc
Speaker : Baptiste Lambin - soutenance de thèse salle Métivier à l'IRISA, 14h
La sécurité des chiffrements par bloc évolue constamment au fur et à mesure que de nouvelles techniques de cryptanalyse sont découvertes. Lors de la conception de nouveaux chiffrements par bloc, il est donc nécessaire de considérer ces nouvelles techniques dans l'analyse de sécurité. Dans cette thèse, nous montrons comment construire certaines opérations internes des chiffrements par bloc pour[…] -
-
-
Seminar
-
Cryptography
Zero-Knowledge Argument for Matrix-Vector Relations and Lattice-Based Group Encryption
Speaker : Fabrice Mouhartem - ENS Lyon
Group encryption (GE) is the natural encryption analogue of group signatures in that it allows verifiably encrypting messages for some anonymous member of a group while providing evidence that the receiver is a properly certified group member. Should the need arise, an opening authority is capable of identifying the receiver of any ciphertext. As intro- duced by Kiayias, Tsiounis and Yung […] -
-
-
Seminar
-
Cryptography
New candidate PRFs and their applications
Speaker : Alain Passelègue - Inria
In this talk, I will present new and simple candidate PRFs introduced in a recent work. In this work, we depart from the traditional approaches for building PRFs used in provable security or in applied cryptography by exploring a new space of plausible PRF candidates. Our guiding principle is to maximize simplicity while optimizing complexity measures that are relevant to advanced cryptographic[…] -