Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
691 results
-
-
Seminar
-
Cryptography
On weak keys in QC-MDPC schemes
Speaker : Valentin Vasseur - INRIA
Quasi-cyclic moderate density parity check (QC-MDPC) codes allow the design of McEliece-like public-key encryption schemes with compact keys and a security that provably reduces to hard decoding problems for quasi-cyclic codes. Because of these features, QC-MDPC have attracted a lot of interest from the cryptographic community. In particular, the BIKE suite of key exchange mechanisms has been[…] -
-
-
Seminar
-
Cryptography
The generalized quaternion isogeny path problem.
Speaker : Antonin Leroux - LIX
The correspondence between maximal orders in a quaternion algebra and supersingular elliptic curves has uncovered new perspectives in the field of isogeny-based cryptography. The KLPT algorithm of Kohel et al. in 2014 introduces an algorithm solving the quaternion isogeny path problem in polynomial time. Studying this problem has applications both constructive and destructive. It has allowed to[…] -
-
-
Seminar
-
Cryptography
Soutenance de thèse: Study and design of new encryption primitives based on rank metric error correcting codes
Speaker : Ba Duc Pham - Rennes
In 2005, Faure and Loidreau proposed a new rank-metric cryptosystem inspired from the Hamming metric scheme of Augot-Finiasz in 2003. In 2018, it was broken by the attack of Gaborit, Otmani and Kalachi. Recently, there are some attempts of repairing the Faure-Loidreau scheme, for example the work of Renner, Puchinger and Wachter–Zeh which is called LIGA. In this thesis, we also introduce a new[…] -
-
-
Seminar
-
Cryptography
Learning Strikes Again: the Case of the DRS Signature Scheme
Speaker : Yu Yang - CWI Amsterdam
Lattice signature schemes generally require particular care when it comes to preventing secret information from leaking through signature transcript. For example, the Goldreich-Goldwasser-Halevi (GGH) signature scheme and the NTRUSign scheme were completely broken by the parallelepiped-learning attack of Nguyen and Regev (Eurocrypt 2006). Several heuristic countermeasures were also shown[…] -
-
-
Seminar
-
Cryptography
Homomorphic Signatures on Randomizable Ciphertexts
Speaker : David Pointcheval - ENS
Anonymity is a primary ingredient for our digital life. Several tools have been designed to address it such as, for authentication, blind signatures, group signatures or anonymous credentials and, for confidentiality, randomizable encryption or mix-nets.<br/> When it comes to complex electronic voting schemes, random shuffling of ciphertexts with mix-nets is the only known tool. Such mix-nets are[…] -
-
-
Seminar
-
Cryptography
Soutenance de thèse (exceptionnellement jeudi à 14h): Couches de diffusion linéaires à partir de matrices MDS
Speaker : Victor Cauchois - DGA/Université Rennes 1
Cette thèse s’intéresse à deux aspects de la cryptologie symétrique liés à l’utilisation de matrices MDS dans les couches de diffusion linéaires de primitives. Une première partie se fonde sur les conceptions de couches de diffusion linéaires de schémas de chiffrement symétrique à partir de matrices MDS. Les associations entre matrices récursives, respectivement circulantes, et polynômes sont[…] -