Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

688 results

    • Seminar

    • SemSecuElec

    Schindler-Itoh/Wiemers revisited: recovering full RSA/ECC private key from noisy side-channel observations

    • September 28, 2018

    • NinjaLab - Salle Métivier

    Speaker : Victor Lomné et Thomas Roche

    Side-channel attacks on public-key cryptography (i.e. modular exponentiation for RSA or scalar multiplication for ECC) often boils down to distinguishing the 0s from the 1s in the binary representation of the secret exponent (resp. secret scalar).When state-of-the-art countermeasures are implemented, this detection must be errorless: thanks to masking techniques, erroneous masked exponents (resp.[…]
    • Seminar

    • SemSecuElec

    Rank metric cryptography and its implementations

    • October 08, 2021

    • XLIM – Université de Limoges - Salle Pétri/Turing

    Speaker : Nicolas Aragon

    In 2017, the NIST (National Institute for Standards and Technology) started astandardization process in order to select post-quantum encryption and digital signature schemes. Among the proposed solutions, two rank-metric based encryption schemes were selected for the second round of the standardization process: ROLLOand RQC.This raised questions about both the performance and the security of the[…]
    • Seminar

    • Cryptography

    Soutenance de thèse: Algebraic Cryptanalysis of the Shortest Vector Problem in Ideal Lattices

    • June 13, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Olivier Bernard - Rennes

    • Seminar

    • Cryptography

    Isogenies over Hessian Model of Elliptic Curves

    • June 03, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Emmanuel Fouotsa - Université de Bamenda

    In this talk we present explicit formulas for isogenies between elliptic curves in (twisted) Hessian form. We examine the numbers of operations in the base field to compute the formulas. In comparison with other isogeny formulas, we note that the obtained formulas for twisted Hessian curves have the lowest costs for processing the kernel and the X-affine formula has the lowest cost for processing[…]
    • Seminar

    • Cryptography

    Binary codes, hyperelliptic curves, and the Serre bound

    • June 10, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Ivan Pogildiakov - Rennes

    TBA lien: https://seminaire-c2.inria.fr/
    • Seminar

    • Cryptography

    New uses in Symmetric Cryptography: from Cryptanalysis to Designing

    • May 20, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Clémence Bouvier - INRIA

    New symmetric primitives are being designed to be run in abstract settings such as Multi-Party Computations (MPC) or Zero-Knowledge (ZK) proof systems. More particularly, these protocols have highlighted the need to minimize the number of multiplications performed by the primitive in large finite fields.<br/> As the number of such primitives grows, it is important to better understand the[…]