Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

708 results

    • Seminar

    • Cryptography

    Beyond the black and grey box

    • April 25, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Yoni De Mulder - University of Leuven

    In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted open platform, the adversary has full access to the implementation and its execution environment. As a result, the adversary is much more powerful than in a traditional black-box environment in which the adversary has only access to the inputs and outputs of a[…]
    • Seminar

    • Cryptography

    Broadcast encryption: combinatorial vs. algebraic methods

    • April 10, 2015

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Duong-Hieu Phan - ENS

    We consider a generalisation of the encryption from "one-to-one'' to "one-to-many'' communication, i.e. broadcast encryption. The objective is to allow a center to send secret messages to a large number of receivers. The security notion in “one-to-many” communications needs to be extended beyond the notion of confidentiality in “one-to-one” encryption in order to meet practical requirements. Two[…]
    • Seminar

    • Cryptography

    GGHLite: More Efficient Multilinear Maps from Ideal Lattices

    • December 05, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Adeline Langlois - ENS Lyon

    The GGH Graded Encoding Scheme (of Garg, Gentry and Halevi), based on ideal lattices, is the first plausible approximation to a cryptographic multilinear map. Unfortunately, using the security analysis the authors provided, the scheme requires very large parameters to provide security for its underlying encoding re-randomization process. Our main contributions are to formalize, simplify and[…]
    • Seminar

    • Cryptography

    Keep your friends close with distance-bounding protocols

    • February 07, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Maria Cristina Onete - IRISA

    Authentication protocols, run between a prover and a verifier, allow the verifier to check the legitimacy of the prover. A legitimate prover should always authenticate (the correctness requirement), while illegitimate parties (adversaries) should not authenticate (the soundness or impersonation resistance requirement). Secure authentication protocols thwart most Man-in-the-Middle (MIM) attacks,[…]
    • Seminar

    • Cryptography

    Couplages et applications industrielles

    • November 23, 2012

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Renaud Dubois - Thales

    Les couplages permettent de réaliser de nouveaux protocoles cryptographiques ou d'en améliorer les complexités : chiffrement broadcast, IBE... On trouve peu d'exemples de développements concrets de tels sytèmes. Nous exposons les contraintes industrielles qui se posent lors du développement de ces outils. Nous présentons les choix de développement et les performances atteintes par la librairie[…]
    • Seminar

    • Cryptography

    Calcul du groupe de classes et du groupe des unités de corps de

    • September 13, 2013

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Jean-François Biasse - Calgary University

    Depuis les travaux de Hafner-MacCurley et Buchmann, le calcul du groupe de classes et d'unités d'un corps de nombres est connu comme étant possible en temps sous-exponentiel sous GRH pour les classes de corps de degré fixé.<br/> Dans cet exposé, nous montrerons qu'il est possible d'étendre ces résultats aux corps de nombres de degré tendant vers l'infini. Nous envisagerons des applications à des[…]