Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
633 results
-
-
Seminar
-
Cryptography
Discrete logarithm computation in finite fields GF(p^k) with NFS
Speaker : Aurore Guillevic - INRIA
Pairings on elliptic curves are involved in signatures, NIZK, and recently in blockchains (ZK-SNARKS).<br/> These pairings take as input two points on an elliptic curve E over a finite field, and output a value in an extension of that finite field. Usually for efficiency reasons, this extension degree is a power of 2 and 3 (such as 12,18,24), and moreover the characteristic of the finite field has[…] -
-
-
Seminar
-
Cryptography
Cryptography based on rank metric codes
Speaker : Nicolas Aragon - Université de Limoges, exceptionnellement salle Jersey à l'ISTIC
In the past few years, the interest for rank metric based cryptography has drastically increased, especially since the beginning of the NIST Post-Quantum Cryptography standardization process : five rank metric based proposals were submitted to the first round. This talk will present the different approaches and tradeoffs for building Key Encapsulation Mechanisms and Public Key Encryption schemes[…] -
-
-
Seminar
-
Cryptography
CRYSTALS: Dilithium and Kyber
Speaker : Damien Stehlé - ENS de Lyon
Kyber -- a Key Exchange Mechanism -- and Dilithium -- a digital signature -- are the two components of the Cryptographic Suite for Algebraic Lattices (CRYSTALS). I will present the intractable problems underlying their security, overview their design and comment their practical performance. The talk is based on the following articles:<br/> https://eprint.iacr.org/2017/633.pdf<br/> https:/[…] -
-
-
Seminar
-
Cryptography
Improved Cryptanalysis of Rank Metric Schemes Based on Gabidulin Codes.
Speaker : Hervé Talé Kalachi - Université de Rouen et Université de Yaoundé, Cameroun
In this presentation, we prove that any variant of the GPT cryptosystem which uses a right column scrambler over the extension field as advocated by the works of Gabidulin et al. with the goal to resist to Overbeck’s structural attack are actually still vulnerable to that attack. We show that by applying the Frobenius operator appropriately on the public key, it is possible to build a Gabidulin[…] -
-
-
Seminar
-
Cryptography
A Modular Security Analysis of EAP and IEEE 802.11
Speaker : Haakon Jacobsen - TBD
The Extensible Authentication Protocol (EAP) is a widely used three-party authentication framework that allows a client to connect to a wireless access point it does not share a secret with, using a mutually trusted server. EAP is often found in enterprise networks or large organizations to provide central key-management and user authentication; one prime example being the eduroam network.<br/> In[…] -
-
-
Seminar
-
Cryptography
On the Construction of Lightweight S-Boxes
Speaker : Sébastien Duval - INRIA Paris-Rocquencourt
S-Boxes are essential objects in the conception of blockciphers. Typically, an S-Box is simply a permutation (bijective function) on n bits, with n small (usually 4 or 8). Its role in a blockcipher is to bring nonlinearity to the cipher, thus an S-Box must be highly nonlinear. Several parameters of a function are used to measure nonlinearity, among which the most important are differential[…] -