Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

710 results

    • Seminar

    • Cryptography

    Bad reduction of genus 3 curves with complex multiplication

    • October 17, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Garcia Lorenzo - Université de Catalogne

    Let C be a smooth, absolutely irreducible genus 3 curve over a number field M. Suppose that the Jacobian of C has complex multiplication by a sextic CM-field K. Suppose further that K contains no imaginary quadratic subfield. We give a bound on the primes P of M such that the stable reduction of C at P contains three irreducible components of genus 1.
    • Seminar

    • Cryptography

    Is there an L(1/4) algorithm for the discrete logarithm problem in algebraic curves?

    • March 27, 2015

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Maike Massierer - LORIA

    The function field sieve, an algorithm of subexponential complexity L(1/3) that computes discrete logarithms in finite fields, has recently been improved to an L(1/4) algorithm, and subsequently to a quasi-polynomial time algorithm. Since index calculus algorithms for computing discrete logarithms in Jacobians of algebraic curves are based on very similar concepts and results, the natural question[…]
    • Seminar

    • Cryptography

    Beyond the black and grey box

    • April 25, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Yoni De Mulder - University of Leuven

    In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted open platform, the adversary has full access to the implementation and its execution environment. As a result, the adversary is much more powerful than in a traditional black-box environment in which the adversary has only access to the inputs and outputs of a[…]
    • Seminar

    • Cryptography

    SCREAM/iSCREAM: Side-Channel Resistant Authenticated Encryption with

    • November 14, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : François-Xavier Standaert - Université Catholique de Louvain

    In this talk, I will describe the family of authenticated encryption (with associated data) algorithms SCREAM and iSCREAM. They are based on Liskov et al.'s Tweakable Authenticated Encryption (TAE) mode with the new tweakable block ciphers Scream and iScream. The main desirable features of SCREAM and iSCREAM are:<br/> * A simple and regular design allowing excellent performances on a wide range of[…]
    • Seminar

    • Cryptography

    How to find low-weight polynomial multiples.

    • June 13, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Carl Löndahl - Université de Lund

    We present an improved algorithm for finding low-weight multiples of polynomials over the binary field using coding heoretic methods. The associated code defined by the given olynomial has a cyclic structure, allowing an algorithm to earch for shifts of the sought minimum-weight odeword. Therefore, a code with higher dimension is onstructed, having a larger number of low-weight codewords nd[…]
    • Seminar

    • Cryptography

    Bornes de Weil généralisées pour le nombre de points d'une courbe projective lisse définie sur un corps fini.

    • January 16, 2015

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Emmanuel Hallouin - Université de Toulouse 2

    Je commencerai par rappeler l'esprit de la preuve initiale de Weil pour la majoration du nombre de points d'une courbe projective lisse définie sur un corps fini. En particulier, j'insisterai sur le fait qu'elle découle de contraintes euclidiennes dans un espace euclidien bien choisi. Ensuite je montrerai comment cette borne de Weil peut être vue comme la borne d'ordre 1 d'une classe de bornes de[…]