Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
705 results
-
-
Seminar
-
Cryptography
Toutes les informations ici https://cca.inria.fr/
Speaker : Ilaria Chillotti, Ayoub Otmani, Ida Tucker et Brice Minaud - Séminaire C2
-
-
-
Seminar
-
Cryptography
Soutenance de thèse (exceptionnellement mercredi à 13h30 en salle Petri-Turing à l'IRISA): Algorithmes d'algèbre linéaire pour la cryptographie
Speaker : Claire Delaplace - Université Rennes 1
Dans cette thèse, nous discutons d’aspects algorithmiques de trois différents problèmes, en lien avec la cryptographie. La première partie est consacrée à l’algèbre linéaire creuse. Nous y présentons un nouvel algorithme de pivot de Gauss pour matrices creuses à coefficients exacts, ainsi qu’une nouvelle heuristique de selection de pivots, qui rend l’entière procédure particulièrement efficace[…] -
-
-
Seminar
-
Cryptography
Wave: A New Code-Based Signature Scheme
Speaker : Thomas Debris-alazard - inria
It is a long standing open problem to build an efficient and secure digital signature scheme based on the hardness of decoding a linear code which could compete with widespread schemes like DSA or RSA. The latter signature schemes are broken by a quantum computer with Shor’s algorithm. Code-based schemes could provide a valid quantum resistant replacement. We present here Wave the first « hash[…] -
-
-
Seminar
-
Cryptography
Supersingular isogeny Diffie-Hellman
Speaker : Leonardo Colo - Univesité Aix-Marseille
Supersingular isogeny graphs have been used in the Charles–Goren–Lauter cryptographic hash function and the supersingular isogeny Diffie–Hellman (SIDH) protocole of De\,Feo and Jao. A recently proposed alternative to SIDH is the commutative supersingular isogeny Diffie–Hellman (CSIDH) protocole, in which the isogeny graph is first restricted to $\FF_p$-rational curves $E$ and $\FF_p$-rational[…] -
-
-
Seminar
-
Cryptography
Locally recoverable codes from curves
Speaker : Everett Howe - Center for Communications Research, San Diego
A locally recoverable code, or LRC, is a code over a finite alphabet such that the value of any single coordinate of a codeword can be recovered from the values of a small subset of other coordinates. I will explain why LRCs are important for applications such as cloud data storage, and I will present several constructions of locally recoverable codes from Galois covers of curves over finite[…] -
-
-
Seminar
-
Cryptography
Attaques sur des conversions IND-CCA de systèmes basés sur les codes
Speaker : Paul Stankovski - Université de Lund
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention in the research community, including several larger projects and a standardization effort from {NIST}. One of the most promising algorithms is the code-based scheme called QC-MDPC, which has excellent performance and a small public key size.<br/> In this work we present a very efficient key recovery[…] -