Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
708 results
-
-
Seminar
-
Cryptography
Beyond the black and grey box
Speaker : Yoni De Mulder - University of Leuven
In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted open platform, the adversary has full access to the implementation and its execution environment. As a result, the adversary is much more powerful than in a traditional black-box environment in which the adversary has only access to the inputs and outputs of a[…] -
-
-
Seminar
-
Cryptography
Broadcast encryption: combinatorial vs. algebraic methods
Speaker : Duong-Hieu Phan - ENS
We consider a generalisation of the encryption from "one-to-one'' to "one-to-many'' communication, i.e. broadcast encryption. The objective is to allow a center to send secret messages to a large number of receivers. The security notion in “one-to-many” communications needs to be extended beyond the notion of confidentiality in “one-to-one” encryption in order to meet practical requirements. Two[…] -
-
-
Seminar
-
Cryptography
GGHLite: More Efficient Multilinear Maps from Ideal Lattices
Speaker : Adeline Langlois - ENS Lyon
The GGH Graded Encoding Scheme (of Garg, Gentry and Halevi), based on ideal lattices, is the first plausible approximation to a cryptographic multilinear map. Unfortunately, using the security analysis the authors provided, the scheme requires very large parameters to provide security for its underlying encoding re-randomization process. Our main contributions are to formalize, simplify and[…] -
-
-
Seminar
-
Cryptography
Keep your friends close with distance-bounding protocols
Speaker : Maria Cristina Onete - IRISA
Authentication protocols, run between a prover and a verifier, allow the verifier to check the legitimacy of the prover. A legitimate prover should always authenticate (the correctness requirement), while illegitimate parties (adversaries) should not authenticate (the soundness or impersonation resistance requirement). Secure authentication protocols thwart most Man-in-the-Middle (MIM) attacks,[…] -
-
-
Seminar
-
Cryptography
Couplages et applications industrielles
Speaker : Renaud Dubois - Thales
Les couplages permettent de réaliser de nouveaux protocoles cryptographiques ou d'en améliorer les complexités : chiffrement broadcast, IBE... On trouve peu d'exemples de développements concrets de tels sytèmes. Nous exposons les contraintes industrielles qui se posent lors du développement de ces outils. Nous présentons les choix de développement et les performances atteintes par la librairie[…] -
-
-
Seminar
-
Cryptography
Calcul du groupe de classes et du groupe des unités de corps de
Speaker : Jean-François Biasse - Calgary University
Depuis les travaux de Hafner-MacCurley et Buchmann, le calcul du groupe de classes et d'unités d'un corps de nombres est connu comme étant possible en temps sous-exponentiel sous GRH pour les classes de corps de degré fixé.<br/> Dans cet exposé, nous montrerons qu'il est possible d'étendre ces résultats aux corps de nombres de degré tendant vers l'infini. Nous envisagerons des applications à des[…] -