Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

716 results

    • Seminar

    • Cryptography

    New Representations of the AES Key Schedule

    • June 10, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Clara Pernot - INRIA Paris

    In this talk we present a new representation of the AES key schedule, with some implications to the security of AES-based schemes. In particular, we show that the AES-128 key schedule can be split into four independent parallel computations operating on 32 bits chunks, up to linear transformation. Surprisingly, this property has not been described in the literature after more than 20 years of[…]
    • Seminar

    • Cryptography

    Fault tolerant algorithms via decoding: Interleaving techniques

    • June 17, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Eleonora Guerrini - Université Montpellier

    Evaluation Interpolation algorithms are a key tool for the algebraic decoding of a large class of codes, including the famous Reed Solomon codes. Recent techniques allow the use of this type of decoding in the more general setting of fault tolerant algorithms, where one has to interpolate erroneous data (potentially computed by an untrusted entity). In this talk we will present algorithms to[…]
    • Seminar

    • Cryptography

    Soutenance de thèse: Algebraic Cryptanalysis of the Shortest Vector Problem in Ideal Lattices

    • June 13, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Olivier Bernard - Rennes

    • Seminar

    • Cryptography

    Isogenies over Hessian Model of Elliptic Curves

    • June 03, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Emmanuel Fouotsa - Université de Bamenda

    In this talk we present explicit formulas for isogenies between elliptic curves in (twisted) Hessian form. We examine the numbers of operations in the base field to compute the formulas. In comparison with other isogeny formulas, we note that the obtained formulas for twisted Hessian curves have the lowest costs for processing the kernel and the X-affine formula has the lowest cost for processing[…]
    • Seminar

    • Cryptography

    Cryptographie post-quantique fondée sur les codes : les candidats à la standardisation

    • March 25, 2020

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Nicolas Sendrier - INRIA

    Au second tour du processus de standardisation du NIST, il reste 7 candidats dont la sécurité est fondée sur les code correcteurs, tous sont des mécanismes d'échange de clé. Nous les classifierons selon leurs hypothèses de sécurité et leurs propriétés. Nous trouvons les systèmes « historiques » (Classic McEliece et NTS-KEM), les systèmes fondés sur des matrices creuses et quasi-cycliques (BIKE,[…]
    • Seminar

    • Cryptography

    PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild

    • December 03, 2021

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Daniel De Almeida Braga - Université Rennes 1

    Protocols for password-based authenticated key exchange (PAKE) allow two users sharing only a short, low-entropy password to establish a secure session with a cryptographically strong key. The challenge in designing such protocols is that they must resist offline dictionary attacks in which an attacker exhaustively enumerates the dictionary of likely passwords in an attempt to match the used[…]