Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
627 results
- 
                    
    
          
                
                      
  
    
    
    
- 
                                        
    
    
    
Seminar
 - 
                                        
    
    
Cryptography
 
RSA problems with Lattice Reduction
Speaker : Alexander May - Technische Universität Darmstadt
This survey addresses the problems of factoring and inverting the RSA function. We define practically relevant relaxed instances of these problems that can be solved in polynomial time. These problem instances are modelled by polynomial equations with small roots. In order to recover the roots, we make use of a method due to Coppersmith which is in turn based on the famous LLL lattice reduction.[…] - 
                                        
    
    
    
 - 
                    
    
          
                
                      
  
    
    
    
- 
                                        
    
    
    
Seminar
 - 
                                        
    
    
Cryptography
 
Standard models for finite fields
Speaker : Bart de Smit - University of Leiden
We give a deterministic polynomial time algorithm that on input two finite fields of the same cardinality produces an isomorphism between the two. Moreover, if for three finite fields of the same cardinality one applies the algorithm to the three pairs of fields then one obtains a commutative triangle. The algorithm depends on the definition of F_q as an actual field rather than a field up to[…] - 
                                        
    
    
    
 - 
                    
    
          
                
                      
  
    
    
    
- 
                                        
    
    
    
Seminar
 - 
                                        
    
    
Cryptography
 
Towards Trustworthy Electronic Voting Systems
Speaker : Jacques Traoré - France telecom
We will focus on this talk on electronic voting which emulates traditional voting in a networked environment. We will first introduce the model of electronic voting. In particular, we will present the security requirements that an electronic voting system must fulfil in order to be a proper substitute for a paper-ballot system. We will also briefly review the cryptographic tools generally used to[…] - 
                                        
    
    
    
 - 
                    
    
          
                
                      
  
    
    
    
- 
                                        
    
    
    
Seminar
 - 
                                        
    
    
Cryptography
 
Quelques aspects algorithmiques de la cryptographie
Speaker : David Lubicz - DGA et Université Rennes I
La cryptographie à clef publique, qui fut inventée dans les années soixante-dix par W. Diffie et M. Hellman, apporte par rapport à la cryptographie symétrique un certain nombre de fonctionnalités particulièrement intéressantes pour les applications pratiques. Sa mise en oeuvre repose le plus souvent sur la difficulté calculatoire de certains problèmes issus de la théorie des nombres. De là, on[…] - 
                                        
    
    
    
 - 
                    
    
          
                
                      
  
    
    
    
- 
                                        
    
    
    
Seminar
 - 
                                        
    
    
Cryptography
 
An infinite class of balanced functions with optimal algebraic
Speaker : Claude Carlet - Université Paris 8
Travail en commun avec Keqin Feng, Tsinghua University, Pékin.<br/> After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and the introduction of the related notion of algebraic immunity, several constructions of infinite classes of Boolean functions with optimum algebraic immunity have been proposed. All of them gave functions whose algebraic degrees are high[…] - 
                                        
    
    
    
 - 
                    
    
          
                
                      
  
    
    
    
- 
                                        
    
    
    
Seminar
 - 
                                        
    
    
Cryptography
 
Un algorithme en L(1/3) pour le problème du logarithme discret dans certaines courbes
Speaker : Andreas Enge - INRIA
Depuis les travaux d'Adleman, DeMarrais et Huang il y a plus d'une décennie, il est bien connu que le problème du logarithme discret dans une courbe de grand genre sur un corps fini est plus simple à résoudre que dans une courbe elliptique de la même taille. Si L(\alpha, c) = e^{(c + o (1)) (g \log q)^{\alpha} (\log (g \log q))^{1 - \alpha}} désigne la fonction sous-exponentielle par rapport au[…] -