Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
688 results
-
-
Seminar
-
Cryptography
Bad reduction of genus 3 curves with complex multiplication
Speaker : Garcia Lorenzo - Université de Catalogne
Let C be a smooth, absolutely irreducible genus 3 curve over a number field M. Suppose that the Jacobian of C has complex multiplication by a sextic CM-field K. Suppose further that K contains no imaginary quadratic subfield. We give a bound on the primes P of M such that the stable reduction of C at P contains three irreducible components of genus 1. -
-
-
Seminar
-
Cryptography
Is there an L(1/4) algorithm for the discrete logarithm problem in algebraic curves?
Speaker : Maike Massierer - LORIA
The function field sieve, an algorithm of subexponential complexity L(1/3) that computes discrete logarithms in finite fields, has recently been improved to an L(1/4) algorithm, and subsequently to a quasi-polynomial time algorithm. Since index calculus algorithms for computing discrete logarithms in Jacobians of algebraic curves are based on very similar concepts and results, the natural question[…] -
-
-
Seminar
-
Cryptography
Multiplication by n on elliptic curves over rings
Speaker : Jinbi Jin - Leiden university
Division polynomials express multiples of *affine* points on Weierstrass elliptic curves over fields. The restriction to affine points becomes an issue with elliptic curves over arbitrary rings, where it may happen that there are multiple 'points at infinity'. We will explain how a modification of the classical division polynomials describes multiplication on all points of Weierstrass elliptic[…] -
-
-
Seminar
-
Cryptography
Keccak
Speaker : Joan Daemen - ST Micro
In October 2012, the American National Institute of Standards and Technology (NIST) announced the selection of Keccak as the winner of the SHA-3 Cryptographic Hash Algorithm Competition. This concluded an open competition that was remarkable both for its magnitude and the involvement of the cryptographic community. Public review is of paramount importance to increase the confidence in the new[…] -
-
-
Seminar
-
Cryptography
Verification of Security Protocols with Lists:
Speaker : Miriam Paiola - ENS
We present a novel, simple technique for proving secrecy properties for security protocols that manipulate lists of unbounded length, for an unbounded number of sessions.<br/> More specifically, our technique relies on the Horn clause approach used in the automatic verifier ProVerif: we show that if a protocol is proven secure by our technique with lists of length one, then it is secure for lists[…] -
-
-
Seminar
-
Cryptography
Calculs de cup-produits et comptage de points.
Speaker : François-Renaud Escriva - Vrije Universiteit Amsterdam
Dans cet exposé, nous présentons un algorithme de comptage de points qui repose sur le calcul de certains cup-produits. Notre algorithme se fonde, comme l'algorithme de Kedlaya, sur le calcul de la matrice de l'action d'un Frobenius semi-linéaire sur le premier groupe de cohomologie d'une courbe. Cependant, notre algorithme a l'avantage de pouvoir s'appliquer à une classe très générale de courbes[…] -