Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
654 results
-
-
Seminar
-
Cryptography
Extended Private Information Retrieval Protocols: definitions,
Speaker : Julien Bringer - Sagem Sécurité
Cet exposé est basé sur des travaux communs avec Hervé Chabanne, David Pointcheval, Qiang Tang menés dans le cadre du projet ANR RNRT BACH (Biometric Authentication with Cryptographic Handling).<br/> Extended Private Information Retrieval (EPIR) is a generalization of the notion of Private Information Retrieval (PIR). The principle is to enable a user to privately evaluate a fixed and public[…] -
-
-
Seminar
-
Cryptography
Cube Attacks on Tweakable Black Box Polynomials
Speaker : Adi Shamir - Weizmann Institute of Science
In this talk I will introduce a new kind of attack on cryptosystems which can be represented by an (unknown) low degree polynomial with tweakable public variables such as a plaintext or IV and fixed secret variables such as a key. Its complexity is exponential in the degree but only polynomial in the key size, and it was successfully applied to several concrete schemes. In particular, for Trivium[…] -
-
-
Seminar
-
Cryptography
A Residue Approach of the Finite Fields Arithmetics
Speaker : Jean-Claude Bajard - Université de Montpellier
Finite fields arithmetic is one of the challenges in current computer arithmetic. It occurs, in particular, in cryptography where the needs increase with the evolution of the technologies and also of the attacks. Through our research, we have proposed different systems based on residues representations. Different kinds of finite fields are concerned with. For each of them, some specificities of[…] -
-
-
Seminar
-
Cryptography
Recent results about side-channel attacks and countermeasures.
Speaker : François-Xavier Standaert - Université de Louvain
Traditionally, cryptographic algorithms provide security against an adversary who has only black box access to cryptographic devices. That is, the only thing the adversary can do is to query the cryptographic algorithm on inputs of its choice and analyze the responses, which are always computed according to the correct original secret information. However, such a model does not always correspond[…] -
-
-
Seminar
-
Cryptography
Groupes SL2 et fonctions de hachage
Speaker : Gilles Zémor - Université Bordeaux I
Nous ferons un survol des différentes propositions de fonctions de hachage cryptographiques fondées sur des groupes de matrices et dont il fut question en particulier à Eurocrypt 2008. Ces fonctions s'appuient sur un principe général simple: toute suite de symboles détermine une suite d'éléments du groupe et la valeur de la fonction est le produit de ces éléments. Les propriétés arithmétiques du[…] -
-
-
Seminar
-
Cryptography
Reconnaissance de codes. Application aux codes cycliques.
Speaker : Christophe Chabot - Université de Limoge
Lors d'un transfert de données entre deux entités, plusieurs transformations sont appliquées au message avant d'être envoyé dans un canal souvent bruité et non sécurisé. Dans un milieu non coopératif, certains peuvent intercepter des séquences sans connaissances particulières sur le message initial, le système de chiffrement et le codage utilisés. Nous nous mettrons à leur place en faisant l[…] -