Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
655 results
-
-
Seminar
-
Cryptography
Improving greedy nonrandomness detectors for stream ciphers
Speaker : Paul Stankovski - Université de Lund
We consider the problem of designing distinguishers and nonrandomness detectors for stream ciphers using the maximum degree monomial test. We construct an improved algorithm to determine the subset of key and IV-bits used in the test. The algorithm is generic, and can be applied to any stream cipher. In addition to this, the algorithm is highly tweakable, and can be adapted depending on the[…] -
-
-
Seminar
-
Cryptography
Towards the Implementation of Efficient and Distributable Pairing-based Crypto Library
Speaker : Al-Amin Khandaker - Okayama University
Pairing-based cryptography is popular among the cryptographic protocol researchers for its eccentric provable security. Protocol side researchers often see pairing as a black box. They often need to test the correctness of their proposal. Typically, mathematicians and cryptography engineers try to make the underlying operations of pairing-based crypto efficient. In addition, different types of[…] -
-
-
Seminar
-
Cryptography
Encryption Switching Protocols
Speaker : Geoffroy Couteau - ENS
(Joint work with Thomas Peters, and David Pointcheval) We put forth a novel cryptographic primitive: encryption switching protocol (ESP), allowing to switch between two encryption schemes. Intuitively, this two-party protocol converts given ciphertexts from one scheme into ciphertexts of the same messages in the other scheme, for any polynomial number of switches, in any direction. Although ESP is[…] -
-
-
Seminar
-
Cryptography
Adaptive Oblivious Transfer with Access Control for NC1 from LWE
Speaker : Fabrice Mouhartem - Ens Lyon
Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database M_1, …, M_N. Then, a receiver can query the sender up to k times with private indexes ρ_1, …, ρ_k so as to obtain M_{ρ_1}, …, M_{ρ_k} and nothing else. Moreover, for each i ∈ [k], the receiver’s choice ρ_i may depend on previously obtained messages {M_{ρ_j}}_{j< i} . Oblivious transfer with access control[…] -
-
-
Seminar
-
Cryptography
Soutenance de thèse : Algorithmes de recherche sur bases de données chiffrées
Speaker : Raphaël Bost - Université Rennes 1
La recherche sur les bases de données chiffrées vise à rendre e cace une tâche apparemment simple : déléguer le stockage de données à un serveur qui ne serait pas de con ance, tout en conservant des fonctionnalités de recherche. Avec le développement des services de stockage dans le Cloud, destinés aussi bien aux entreprises qu’aux individus, la mise au point de solutions e caces à ce problème est[…] -
-
-
Seminar
-
Cryptography
Algebraic geometry meets microcontrollers: Efficient, compact key
Speaker : Ben Smith - Ecole polytechnique
This talk will describe how we have applied the theory of Kummer surfaces --classic objects in algebraic geometry-- to produce compact, high-speed software for secure key exchange and signatures on microcontrollers. This is joint work with Brian Chung, Craig Costello, Joost Renes, Peter Schwabe, and Lejla Batina. -