Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

633 results

    • Seminar

    • Cryptography

    Extraction d'entropie et courbes elliptiques

    • November 04, 2005

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Nicolas Gurel - LIX

    Lors d'un protocole de mise en accord de clé (comme Diffie-Hellman) basé sur un groupe générique G, les protagonistes aboutissent à un élément commun K_{AB} de G qui est indistinguable d'un autre élément de G mais pas d'une suite de bits aléatoire de même taille. Nous présenterons deux nouvelles méthodes pour extraire des bits de K_{AB} lorsque G est une courbe elliptique définie[…]
    • Seminar

    • Cryptography

    Protecting security protocols against guessing attacks: towards

    • April 07, 2006

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Mathieu Baudet - ENS Cachan

    Designing secure protocols based on passwords is a difficult task. Indeed, passwords, and more generally low-entropy secrets, are potentially vulnerable to guessing attacks, that is, exhaustive, "brute force" searches. Preventing guessing attacks typically requires a protocol to conceal any partial information on the password (e.g. its checksum) which could help the attacker confirm his[…]
    • Seminar

    • Cryptography

    Theta identities and Thomae formulas

    • December 16, 2005

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Yaacov Kopeliovich

    In this talk we apply Thomae formulas to obtain algebraic relations satisfied by Riemann surfaces that are cyclic covers of the Sphere. We focus on the genus 2 case and then give an example of a higher genus case (g=4) that was not known before. The conjectural connection of these identities as well as Thomae formulas to the moduli action of the Braid group is explained.<br/> We present a[…]
    • Seminar

    • Cryptography

    Group Signatures for Federated Systems

    • June 02, 2006

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Mark Manulis - Ruhr-University of Bochum

    For many mutli-party applications group signatures are important cryptographic primitives that can be used for the purpose of anonymity and privacy. In classical group signatures members of a group are able to sign messages anonymously on behalf of the group. However, there exists a designated authority, called group manager, that initializes the scheme, adds new group members, and is able to open[…]
    • Seminar

    • Cryptography

    Efficient Multi-Party Computation with Dispute Control

    • July 01, 2005

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Zuzana Beerliova - ETH Zurich

    Secure multi-party computation (MPC) allows a set of $n$ players to securely compute an agreed function of their inputs, even when up to $t$ of the players are under complete adversarial control. We consider secure MPC in the information-theoretic model with broadcast channels (PKI setup) and present an efficient protocol with optimal resilience ($t< n/2$), using a new technique technique[…]
    • Seminar

    • Cryptography

    Signatures à vérification contrôlée

    • February 03, 2006

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Fabien Laguillaumie - LIX

    Les signatures indéniables ont été introduites par Chaum et van Antwerpen en 1989 pour permettre au signataire de contrôler la vérification d'un signature qu'il a émise. En effet, la propriété de vérification universelle satisfaite par les signatures numériques classiques n'est pas souhaitable dans certaines applications électroniques (licence de logiciel, vote électronique,...).[…]