Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
688 results
-
-
Seminar
-
Cryptography
Construction d'une petite boite S 8-bit avec branchement 3 (&applications)
Speaker : Pierre Karpman - Rennes 1 et Singapour
Je présenterai la construction et l'implémentation d'une boîte S sur 8 bits qui a un branchement linéaire et différentiel de 3. Je montrerai une application en construisant un chiffre par bloc sur 64 bits dont la structure est très simple et basée sur l'évaluation en tranches (bitsliced) et des rotations sur mots de 8 bits. La fonction de tour de ce chiffre peut s'implémenter avec le même nombre d[…] -
-
-
Seminar
-
Cryptography
Computing individual discrete logarithms in non-prime finite fields
Speaker : Aurore Guillevic - Inria Saclay, équipe Grace et Ecole Polytechnique, LIX
This talk is about computing discrete logarithms in non-prime finite fields. These fields arise in pairing-based cryptography. In this setting, the pairing-friendly curve is defined over GF(q) and the pairing takes its values in an extension GF(q^k), where k is the embedding degree.<br/> Fr example, GF(p^2) is the embedding field of supersingular elliptic curves in large characteristic; GF(p^3),[…] -
-
-
Seminar
-
Cryptography
Speeding up Fully Homomorphic Encryption
Speaker : Marie Paindavoine - Orange Labs
Access to encrypted data is often “all-or-nothing” : either one has to decrypt everything, or one cannot read anything. Following Gentry’s work in 2009, fully homomorphic encryption has gained more and more attention, in particular because it allows more flexibility on encrypted data access and process. It is now possible to evaluate functions on encrypted data and get only the result – encrypted[…] -
-
-
Seminar
-
Cryptography
Disjunctions for Hash Proof Systems: New Constructions and Applications
Speaker : Fabrice Ben Hamouda - ENS
Hash Proof Systems were first introduced by Cramer and Shoup (Eurocrypt'02) as a tool to construct efficient chosen-ciphertext-secure encryption schemes. Since then, they have found many other applications, including password authenticated key exchange, oblivious transfer, and zero-knowledge arguments. One of the aspects that makes hash proof systems so interesting and powerful is that they can be[…] -
-
-
Seminar
-
Cryptography
Tours ordinaires de corps de fonctions et rang de tenseur de la multiplication dans les extensions de F_2 et F_3
Speaker : Julia Pieltant - LIX
On s'intéresse dans cet exposé au rang de tenseur de la multiplication dans les extensions finies de F_q, qui correspond à la complexité bilinéaire sur F_q de la multiplication dans F_{q^n}.<br/> Dans cette optique, on présentera l'algorithme introduit en 1987 par D.V. et G.V. Chudnovsky qui a permis d'établir la linéarité du rang de tenseur en le degré n de l'extension considérée, et en fournit[…] -
-
-
Seminar
-
Cryptography
Cyclic and quasi-cyclic separable Goppa codes
Speaker : Sergey Bezzateev - Université d'État de Saint-Pétersbourg
Overview of recent results in constructions of cyclic and quasi-cyclic Goppa codes. Classical and generalized Goppa codes are considered. Subclasses of embedded optimal quasi-cyclic Goppa codes with improvement parameters are presented. -