Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
655 results
-
-
Seminar
-
Cryptography
Key recovery from partial information
Speaker : Gabrielle De Michelli - UC San Diego
The security of deployed protocols not only relies on the hardness of the underlying mathematical problem but also on the implementation of the algorithms involved. Many fast modular exponentiation algorithms have piled up over the years and some implementations have brought vulnerabilities that are exploitable by side-channel attacks, in particular cache attacks.<br/> In this talk, we consider[…] -
-
-
Seminar
-
Cryptography
Traceable Constant-Size Multi-Authority Credentials
Speaker : Chloé Hébant - ENS
Many attribute-based anonymous credential (ABC) schemes have been proposed allowing a user to prove the possession of some attributes, anonymously. They became more and more practical with, for the most recent papers, a constant-size credential to show a subset of attributes issued by a unique credential issuer. However, proving possession of attributes coming from K different credential issuers[…] -
-
-
Seminar
-
Cryptography
Improved Classical and Quantum Algorithms for Subset-Sum
Speaker : André Schrottenloher - INRIA
We present new classical and quantum algorithms for solving random hard instances of the subset-sum problem, in which we are given n integers on n bits and try to find a subset of them that sums to a given target. This classical NP-complete problem has several applications in cryptography and underlies the security of some proposed post-quantum cryptosystems.<br/> At EUROCRYPT 2010, Howgrave[…] -
-
-
Seminar
-
Cryptography
Workshop mise en oeuvre de la cryptographie post-quantique
Speaker : European CyberWeek - Rennes
L'inscription est gratuite mais obligatoire, en particulier pour des raisons de jauges. Le nombre de places est limité. Le programme est disponible à l'adresse <a href="https://www.european-cyber-week.eu/cryptographie-post-quantique">https://www.european-cyber-week.eu/cryptographie-post-quantique</a><br/> -
-
-
Seminar
-
Cryptography
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
Speaker : Emmanuel Thomé - INRIA Nancy
We report on two new records: the factorization of RSA-240, a 795-bit number, and a discrete logarithm computation over a 795-bit prime field. Previous records were the factorization of RSA-768 in 2009 and a 768-bit discrete logarithm computation in 2016. Our two computations at the 795-bit level were done using the same hardware and software, and show that computing a discrete logarithm is not[…] -
-
-
Seminar
-
Cryptography
Soutenance de thèse: Autour de la sécurité des messageries instantanées: des solutions pour des applications multi-appareils et les communications de groupe.
Speaker : Céline Duguey - DGA-Rennes
Les applications de messagerie instantanée sécurisée, telles WhatsApp ou Signal, sont devenues incontournables pour nos communications quotidiennes.<br/> Elles apportent une sécurité caractérisée notamment par le chiffrement de bout en bout, la confidentialité persistante ou encore la sécurité après compromission. Mais ces propriétés sont généralement limitées aux communications deux à deux. L[…] -