Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
688 results
-
-
Seminar
-
Cryptography
Improved Cryptanalysis of Rank Metric Schemes Based on Gabidulin Codes.
Speaker : Hervé Talé Kalachi - Université de Rouen et Université de Yaoundé, Cameroun
In this presentation, we prove that any variant of the GPT cryptosystem which uses a right column scrambler over the extension field as advocated by the works of Gabidulin et al. with the goal to resist to Overbeck’s structural attack are actually still vulnerable to that attack. We show that by applying the Frobenius operator appropriately on the public key, it is possible to build a Gabidulin[…] -
-
-
Seminar
-
Cryptography
Investigating LWE without Modular Reduction
Speaker : Jonathan Bootle - UCL
The LWE problem is ubiquitous in lattice cryptography. In order to try and design more efficient cryptosystems, an increasing number of LWE variants are being considered. In this talk, we consider a variant of LWE over the integers i.e. without modular reduction. We explain why the problem is easy to solve with a large number of samples, and show how this leads to a side-channel attack on the[…] -
-
-
Seminar
-
Cryptography
A Modular Security Analysis of EAP and IEEE 802.11
Speaker : Haakon Jacobsen - TBD
The Extensible Authentication Protocol (EAP) is a widely used three-party authentication framework that allows a client to connect to a wireless access point it does not share a secret with, using a mutually trusted server. EAP is often found in enterprise networks or large organizations to provide central key-management and user authentication; one prime example being the eduroam network.<br/> In[…] -
-
-
Seminar
-
Cryptography
Cryptanalyse de Chiffrements Symétriques Récents
Speaker : Virginie Lallemand - Inria
Depuis moins d'une dizaine d'années nous faisons face à l'apparition de nouvelles applications de la cryptographie symétrique, parmi lesquelles la cryptographie dédiée à la protection de petits objets connectés (dite cryptographie à bas coût) ainsi que celle adaptée aux schémas de chiffrement homomorphe. Pour ces applications, les contraintes imposées sur les chiffrements sont si fortes que les[…] -
-
-
Seminar
-
Cryptography
Paramètres des carrés de codes
Speaker : Hugues Randriam - Telecom Paristech
Les produits et puissances de codes linéaires sont une construction très basique sous-jacente à de nombreuses applications du codage en informatique théorique : algorithmes de multiplication et partage de secret arithmétique, cryptanalyse de systèmes à la McEliece, décodage algébrique, construction de réseaux euclidiens, codes quantiques, transfert inconscient... Un problème fondamental[…] -
-
-
Seminar
-
Cryptography
Efficient Implementation of Ideal Lattice-Based Cryptography on Embedded Devices
Speaker : Thomas Pöppelmann - Infineon Technologies AG
Novel public-key cryptosystems beyond RSA and ECC are urgently required to ensure long-term security in the era of quantum computing. One alternative to such established schemes is ideal lattice-based cryptography which offers elegant security reductions and versatile cryptographic building blocks such as the ring learning with errors (RLWE) problem. In this talk we will give an overview on[…] -