Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
721 results
-
-
Seminar
-
Cryptography
Designing and deploying post-quantum cryptography
Speaker : Jean-Philippe Aumasson - Teserakt AG
I will review the hash-based signature submitted to the NIST competition jointly with Guillaume Endignoux, discussing its assurance level and performance. Then I will discuss the challenges of deploying post-quantum cryptography in an end-to-end encryption product for machine-to-machine communications.<br/> lien: http://desktop.visio.renater.fr/scopia?ID=721783***6864&autojoin -
-
-
Seminar
-
Cryptography
Cryptography based on rank metric codes
Speaker : Nicolas Aragon - Université de Limoges, exceptionnellement salle Jersey à l'ISTIC
In the past few years, the interest for rank metric based cryptography has drastically increased, especially since the beginning of the NIST Post-Quantum Cryptography standardization process : five rank metric based proposals were submitted to the first round. This talk will present the different approaches and tradeoffs for building Key Encapsulation Mechanisms and Public Key Encryption schemes[…] -
-
-
Seminar
-
Cryptography
Attaques sur des conversions IND-CCA de systèmes basés sur les codes
Speaker : Paul Stankovski - Université de Lund
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention in the research community, including several larger projects and a standardization effort from {NIST}. One of the most promising algorithms is the code-based scheme called QC-MDPC, which has excellent performance and a small public key size.<br/> In this work we present a very efficient key recovery[…] -
-
-
Seminar
-
Cryptography
Class Group Computations in Number Fields and Applications to Cryptology
Speaker : Alexandre Gelin - Versailles-Saint-Quentin-en-Yvelines
In this talk, we focus on class group computations in number fields. We start by describing an algorithm for reducing the size of a defining polynomial of a number field. There exist infinitely many polynomials that define a specific number field, with arbitrarily large coefficients, but our algorithm constructs the one that has the absolutely smallest coefficients. The advantage of knowing such a[…] -
-
-
Seminar
-
Cryptography
Design de cryptographie white-box : n'oublions pas la grey-box
Speaker : Philippe Teuwen - QuarksLab
Bien que toutes les tentatives académiques actuelles pour créer des primitives cryptographiques standard en white-box aient été cassées, il y a encore un grand nombre d'entreprises qui vendent des solutions "sécurisées" de cryptographie white-box. Afin d'évaluer le niveau de sécurité de solutions en boîte blanche, nous verrons de nouvelles approches qui ne nécessitent ni connaissance des tables[…] -
-
-
Seminar
-
Cryptography
Falcon un schéma de signature sur les réseaux euclidiens NTRU
Speaker : Thomas Ricosset - Thales Communications & Security, INP-ENSEEIHT
Dans cette présentation je décrirai le schéma de signature Falcon, pour "FAst Fourier Lattice-based COmpact signatures over NTRU", basé sur le schéma de signature hash-and-sign de Gentry, Peikert et Vaikuntanathan. Je présenterai les outils et techniques permettant à Falcon d'offrir aujourd'hui, à faibles coûts, les signatures les plus compactes sur les réseaux euclidiens : une version randomisée[…] -