Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
633 results
-
-
Seminar
-
Cryptography
Towards the Implementation of Efficient and Distributable Pairing-based Crypto Library
Speaker : Al-Amin Khandaker - Okayama University
Pairing-based cryptography is popular among the cryptographic protocol researchers for its eccentric provable security. Protocol side researchers often see pairing as a black box. They often need to test the correctness of their proposal. Typically, mathematicians and cryptography engineers try to make the underlying operations of pairing-based crypto efficient. In addition, different types of[…] -
-
-
-
Seminar
-
Cryptography
Construction d'une petite boite S 8-bit avec branchement 3 (&applications)
Speaker : Pierre Karpman - Rennes 1 et Singapour
Je présenterai la construction et l'implémentation d'une boîte S sur 8 bits qui a un branchement linéaire et différentiel de 3. Je montrerai une application en construisant un chiffre par bloc sur 64 bits dont la structure est très simple et basée sur l'évaluation en tranches (bitsliced) et des rotations sur mots de 8 bits. La fonction de tour de ce chiffre peut s'implémenter[…] -
-
-
Seminar
-
Cryptography
Computing individual discrete logarithms in non-prime finite fields
Speaker : Aurore Guillevic - Inria Saclay, équipe Grace et Ecole Polytechnique, LIX
This talk is about computing discrete logarithms in non-prime finite fields. These fields arise in pairing-based cryptography. In this setting, the pairing-friendly curve is defined over GF(q) and the pairing takes its values in an extension GF(q^k), where k is the embedding degree.<br/> Fr example, GF(p^2) is the embedding field of supersingular elliptic curves in large characteristic; GF(p[…] -
-
-
Seminar
-
Cryptography
Speeding up Fully Homomorphic Encryption
Speaker : Marie Paindavoine - Orange Labs
Access to encrypted data is often “all-or-nothing” : either one has to decrypt everything, or one cannot read anything. Following Gentry’s work in 2009, fully homomorphic encryption has gained more and more attention, in particular because it allows more flexibility on encrypted data access and process. It is now possible to evaluate functions on encrypted data and get only the result – encrypted[…] -
-
-
Seminar
-
Cryptography
Algorithms for polynomial selection in the number field sieve
Speaker : Shi Bai - Australian National University
The general number field sieve (GNFS) is the most efficient algorithm known for factoring large integers. It consists of several stages, the first one being polynomial selection. The running-time of the number field sieve depends on the quality of the chosen polynomials. The quality of the chosen polynomials can be modeled in terms of size and root properties. In this talk, we will describe some[…] -