Table of contents

Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

718 results

    • Seminar

    • Cryptography

    Beyond the black and grey box

    • April 25, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Yoni De Mulder - University of Leuven

    In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted open platform, the adversary has full access to the implementation and its execution environment. As a result, the adversary is much more powerful than in a traditional black-box environment in which the adversary has only access to the inputs and outputs of a[…]
    • Seminar

    • Cryptography

    Comparaison de la factorisation d'entiers et du logarithme

    • October 03, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Pierrick Gaudry - LORIA

    Le crible algébrique est le meilleur algorithme connu pour factoriser les entiers et pour calculer des logarithmes discrets dans des corps finis de grande caractérsitique. Bien que la complexité théorique est la même dans les deux cas, la phase d'algèbre linéaire est bien plus difficile dans le cas du logarithme discret. En revanche, les corps finis non premiers ont plus de structure, si bien que[…]
    • Seminar

    • Cryptography

    Functional Encryption: A novel paradigm for public-key encryption.

    • March 20, 2015

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Angelo De Caro - ENS

    Whereas, in traditional public-key encryption, decryption is an all-or-nothing affair (i.e., a receiver is either able to recover the entire message using its key, or nothing), functional encryption enables fine-grained access control and computation on encrypted data, as required to protect data in the cloud.<br/> In the first part of the talk, we provide an introduction to functional encryption[…]
    • Seminar

    • Cryptography

    Cyclic and quasi-cyclic separable Goppa codes

    • November 14, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Sergey Bezzateev - Université d'État de Saint-Pétersbourg

    Overview of recent results in constructions of cyclic and quasi-cyclic Goppa codes. Classical and generalized Goppa codes are considered. Subclasses of embedded optimal quasi-cyclic Goppa codes with improvement parameters are presented.
    • Seminar

    • Cryptography

    Disjunctions for Hash Proof Systems: New Constructions and Applications

    • April 24, 2015

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Fabrice Ben Hamouda - ENS

    Hash Proof Systems were first introduced by Cramer and Shoup (Eurocrypt'02) as a tool to construct efficient chosen-ciphertext-secure encryption schemes. Since then, they have found many other applications, including password authenticated key exchange, oblivious transfer, and zero-knowledge arguments. One of the aspects that makes hash proof systems so interesting and powerful is that they can be[…]
    • Seminar

    • Cryptography

    Keep your friends close with distance-bounding protocols

    • February 07, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Maria Cristina Onete - IRISA

    Authentication protocols, run between a prover and a verifier, allow the verifier to check the legitimacy of the prover. A legitimate prover should always authenticate (the correctness requirement), while illegitimate parties (adversaries) should not authenticate (the soundness or impersonation resistance requirement). Secure authentication protocols thwart most Man-in-the-Middle (MIM) attacks,[…]