Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
654 results
-
-
Seminar
-
Cryptography
Learning with Errors in the Exponent
Speaker : özgür Dagdelen - Darmstadt University
We initiate the study of a novel class of group-theoretic intractability problems. Inspired by the theory of learning in presence of errors [Regev, STOC'05] we ask if noise in the exponent amplifies intractability. We put forth the notion of Learning with Errors in the Exponent (LWEE) and rather surprisingly show that various attractive properties known to ex- clusively hold for lattices carry[…] -
-
-
Seminar
-
Cryptography
SCREAM/iSCREAM: Side-Channel Resistant Authenticated Encryption with
Speaker : François-Xavier Standaert - Université Catholique de Louvain
In this talk, I will describe the family of authenticated encryption (with associated data) algorithms SCREAM and iSCREAM. They are based on Liskov et al.'s Tweakable Authenticated Encryption (TAE) mode with the new tweakable block ciphers Scream and iScream. The main desirable features of SCREAM and iSCREAM are:<br/> * A simple and regular design allowing excellent performances on a wide range of[…] -
-
-
Seminar
-
Cryptography
Beyond the black and grey box
Speaker : Yoni De Mulder - University of Leuven
In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted open platform, the adversary has full access to the implementation and its execution environment. As a result, the adversary is much more powerful than in a traditional black-box environment in which the adversary has only access to the inputs and outputs of a[…] -
-
-
Seminar
-
Cryptography
How to find low-weight polynomial multiples.
Speaker : Carl Löndahl - Université de Lund
We present an improved algorithm for finding low-weight multiples of polynomials over the binary field using coding heoretic methods. The associated code defined by the given olynomial has a cyclic structure, allowing an algorithm to earch for shifts of the sought minimum-weight odeword. Therefore, a code with higher dimension is onstructed, having a larger number of low-weight codewords nd[…] -
-
-
Seminar
-
Cryptography
Bornes de Weil généralisées pour le nombre de points d'une courbe projective lisse définie sur un corps fini.
Speaker : Emmanuel Hallouin - Université de Toulouse 2
Je commencerai par rappeler l'esprit de la preuve initiale de Weil pour la majoration du nombre de points d'une courbe projective lisse définie sur un corps fini. En particulier, j'insisterai sur le fait qu'elle découle de contraintes euclidiennes dans un espace euclidien bien choisi. Ensuite je montrerai comment cette borne de Weil peut être vue comme la borne d'ordre 1 d'une classe de bornes de[…] -
-
-
Seminar
-
Cryptography
Calcul de polynômes modulaires en genre 2
Speaker : Enea Milio - Université Bordeaux I
Nous nous proposons de décrire nos travaux de thèse sur le calcul des polynômes modulaires en genre 2. Ces polynômes dépendent des invariants d'Igusa, qui sont une généralisation de la fonction j dans le genre 1, et permettent d'obtenir toutes les variétés abéliennes isogènes à une variété abélienne donnée. Dans un premier temps, nous reviendrons sur cette notion de polynôme en genre 1 et 2 et[…] -