Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
654 results
-
-
Seminar
-
Cryptography
Toutes les informations ici https://cca.inria.fr/
Speaker : Ilaria Chillotti, Ayoub Otmani, Ida Tucker et Brice Minaud - Séminaire C2
-
-
-
Seminar
-
Cryptography
Soutenance de thèse (exceptionnellement mercredi à 13h30 en salle Petri-Turing à l'IRISA): Algorithmes d'algèbre linéaire pour la cryptographie
Speaker : Claire Delaplace - Université Rennes 1
Dans cette thèse, nous discutons d’aspects algorithmiques de trois différents problèmes, en lien avec la cryptographie. La première partie est consacrée à l’algèbre linéaire creuse. Nous y présentons un nouvel algorithme de pivot de Gauss pour matrices creuses à coefficients exacts, ainsi qu’une nouvelle heuristique de selection de pivots, qui rend l’entière procédure particulièrement efficace[…] -
-
-
Seminar
-
Cryptography
Wave: A New Code-Based Signature Scheme
Speaker : Thomas Debris-alazard - inria
It is a long standing open problem to build an efficient and secure digital signature scheme based on the hardness of decoding a linear code which could compete with widespread schemes like DSA or RSA. The latter signature schemes are broken by a quantum computer with Shor’s algorithm. Code-based schemes could provide a valid quantum resistant replacement. We present here Wave the first « hash[…] -
-
-
Seminar
-
Cryptography
Supersingular isogeny Diffie-Hellman
Speaker : Leonardo Colo - Univesité Aix-Marseille
Supersingular isogeny graphs have been used in the Charles–Goren–Lauter cryptographic hash function and the supersingular isogeny Diffie–Hellman (SIDH) protocole of De\,Feo and Jao. A recently proposed alternative to SIDH is the commutative supersingular isogeny Diffie–Hellman (CSIDH) protocole, in which the isogeny graph is first restricted to $\FF_p$-rational curves $E$ and $\FF_p$-rational[…] -
-
-
Seminar
-
Cryptography
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Speaker : Mathy Vanhoef - KU-Leuven
We introduce key reinstallation attacks (KRACKs). These attacks abuse features of a protocol to reinstall an already in-use key, thereby resetting nonces and/or replay counters associated to this key. We show that our novel attack technique breaks several handshakes that are used in a WPA2-protected network.<br/> All protected Wi-Fi networks use the 4-way handshake to generate fresh session keys.[…] -
-
-
Seminar
-
Cryptography
Designing and deploying post-quantum cryptography
Speaker : Jean-Philippe Aumasson - Teserakt AG
I will review the hash-based signature submitted to the NIST competition jointly with Guillaume Endignoux, discussing its assurance level and performance. Then I will discuss the challenges of deploying post-quantum cryptography in an end-to-end encryption product for machine-to-machine communications.<br/> lien: http://desktop.visio.renater.fr/scopia?ID=721783***6864&autojoin -