Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
691 results
-
-
Seminar
-
Cryptography
Géométries affines finies et recherche de racines dans GF(q^n)
Speaker : Luca De Féo - UVSQ
La recherche de racines dans un corps fini est un problème classique, avec de nombreuses applications en cryptographie et codage. Étant donné un polynôme de degré d à coefficients dans un corps fini GF(q^n), on cherche ses zéros dans GF(q^n).<br/> Cet exposé s'intéresse au cas où q est un petit nombre, et donc notamment au cas de la petite caractéristique. Nous présentons trois algorithmes pour la[…] -
-
-
Seminar
-
Cryptography
Is there an L(1/4) algorithm for the discrete logarithm problem in algebraic curves?
Speaker : Maike Massierer - LORIA
The function field sieve, an algorithm of subexponential complexity L(1/3) that computes discrete logarithms in finite fields, has recently been improved to an L(1/4) algorithm, and subsequently to a quasi-polynomial time algorithm. Since index calculus algorithms for computing discrete logarithms in Jacobians of algebraic curves are based on very similar concepts and results, the natural question[…] -
-
-
Seminar
-
Cryptography
Bad reduction of genus 3 curves with complex multiplication
Speaker : Garcia Lorenzo - Université de Catalogne
Let C be a smooth, absolutely irreducible genus 3 curve over a number field M. Suppose that the Jacobian of C has complex multiplication by a sextic CM-field K. Suppose further that K contains no imaginary quadratic subfield. We give a bound on the primes P of M such that the stable reduction of C at P contains three irreducible components of genus 1. -
-
-
Seminar
-
Cryptography
Rencontre au milieu avec match box sur KATAN
Speaker : Brice Minaud - ANSSI
Les attaques par rencontre au milieu ont connu un regain d'intérêt notamment à cause des chiffrements légers, qui s'y prêtent mieux que les chiffrements traditionnels. Cela a amené au développement de nouvelles variantes et améliorations de ces attaques. On présente ici une nouvelle technique pour augmenter le nombre de tours couverts par une rencontre au milieu. On l'applique ensuite à une[…] -
-
-
Seminar
-
Cryptography
SCREAM/iSCREAM: Side-Channel Resistant Authenticated Encryption with
Speaker : François-Xavier Standaert - Université Catholique de Louvain
In this talk, I will describe the family of authenticated encryption (with associated data) algorithms SCREAM and iSCREAM. They are based on Liskov et al.'s Tweakable Authenticated Encryption (TAE) mode with the new tweakable block ciphers Scream and iScream. The main desirable features of SCREAM and iSCREAM are:<br/> * A simple and regular design allowing excellent performances on a wide range of[…] -
-
-
Seminar
-
Cryptography
Usage of Modular Techniques for Efficient Computation of Ideal
Speaker : Kazuhiro Yokoyama - Rikkyo University
Modular techniques are widely applied to various algebraic computations. (See [1] for basic modular techniques applied to polynomial computations.) In this talk, we discuss how modular techniques are efficiently applied to computation of various ideal operations such as Gröbner base computation and ideal decompositions. Here, by *modular techniques* we mean techniques using certain projections for[…] -