Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
669 results
-
-
Seminar
-
Cryptography
Short McEliece key from algebraic geometry codes with automorphism
Speaker : elise barelli - INRIA Saclay
In 1978, McEliece introduced a public key encryption scheme based on linear codes and suggested to use classical Goppa codes, ie: subfield subcodes of algebraic geometric (AG) codes built on a curve of genus 0. This proposition remains secure and in order to have a generalization of classical Goppa codes, in 1996, H. Janwa and O. Moreno suggested to use subfield subcode of AG codes, which we call[…] -
-
-
Seminar
-
Cryptography
Locally recoverable codes from curves
Speaker : Everett Howe - Center for Communications Research, San Diego
A locally recoverable code, or LRC, is a code over a finite alphabet such that the value of any single coordinate of a codeword can be recovered from the values of a small subset of other coordinates. I will explain why LRCs are important for applications such as cloud data storage, and I will present several constructions of locally recoverable codes from Galois covers of curves over finite[…] -
-
-
Seminar
-
Cryptography
Gröbner Bases Techniques in Post-Quantum Cryptography
Speaker : Ludovic Perret - LIP6
After the publication of Shor's algorithm, it became evident the most popular public-key cryptographic systems that rely on the integer factorization problem or on the discrete logarithm problem would be easily solvable using large enough quantum computers (if such quantum computers are ever built). That triggered a vivid interest in the research of cryptographic algorithms (mostly public-key[…] -
-
-
Seminar
-
Cryptography
Sanitization of FHE Ciphertexts
Speaker : Damien Stehlé - ENS Lyon
By definition, fully homomorphic encryption (FHE) schemes support homomorphic decryption, and all known FHE constructions are bootstrapped from a Somewhat Homomorphic Encryption (SHE) scheme via this technique. Additionally, when a public key is provided, ciphertexts are also re-randomizable, e.g. by adding to them fresh encryptions of~$0$. From those two operations we devise an algorithm to[…] -
-
-
Seminar
-
Cryptography
Multilinear Maps from Obfuscation
Speaker : Pooya Farshim - ENS Paris
We provide constructions of multilinear groups equipped with natural hard problems from indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements known results on the constructions of indistinguishability obfuscators from multilinear maps in the reverse direction.<br/> We provide two distinct, but closely related constructions and show that multilinear analogues of the[…] -
-
-
Seminar
-
Cryptography
Journée de rentrée
Speaker : Géométrie et Algèbre Effectives - IRMAR
Divers exposés. -