Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
633 results
-
-
Seminar
-
Cryptography
Lattice-based NIST candidates: abstractions and ninja tricks
Speaker : Thomas Prest - PQShield
I will present the remaining lattice-based candidates for standardization by NIST (2 signature schemes, 5 encryption schemes). At a high level, these can all be interpreted as straightforward instantiations of decades-old paradigms. But when we look under the hood, all of them make design choices which impact their security, efficiency and portability in distinct manners; we will discuss these.[…] -
-
-
Seminar
-
Cryptography
TBA
Speaker : Louiza Khati - Anssi
TBA lien: https://univ-rennes1-fr.zoom.us/j/97066341266?pwd=RUthOFV5cm1uT0ZCQVh6QUcrb1drQT09 -
-
-
Seminar
-
Cryptography
Constant time techniques for lattice based cryptography
Speaker : Melissa Rossi - École normale supérieure, CNRS, PSL University, Inria
NIST’s post-quantum cryptography competition has entered in its second phase, the time has come to focus more closely on practical aspects of the candidates. On the lattice-based side, certain schemes chose to implement discrete Gaussian distributions which allow better parameters and security reductions. However, this advantage has also proved to be their Achilles’ heel, as discrete Gaussians[…] -
-
-
-
Seminar
-
Cryptography
Candidats NIST basés sur les réseaux: choix de conception et astuces de ninja
Speaker : Thomas Prest. - PQShield
Parmi les 26 schémas post-quantique toujours considérés pour standardisation par le NIST, 12 sont basés sur les réseaux (3 schémas de signature et 9 schémas de chiffrement). Cette présentation leur est consacrée. A haut niveau, tous peuvent être interprétés comme des instanciations directes de paradigmes bien établis. Mais une analyse plus attentive révèle que chacun d'eux fait des choix de[…] -
-
-
Seminar
-
Cryptography
Quantum cryptanalysis of block ciphers: beyond quadratic speedups
Speaker : André Schrottenloher - CWI
The security of modern cryptosystems relies on computational assumptions, which may be challenged by the advent of large-scale quantum computing devices.<br/> While Shor's algorithm is known to break today's most popular public-key schemes, secret-key cryptosystems are generally expected to retain half of their pre-quantum bits of security. However, the precise advantage of quantum[…] -