Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
716 results
-
-
Seminar
-
Cryptography
Bilinear Structures induced by the Lichtenbaum pairing and the
Speaker : Gerhard Frey - Essen University
Groups of prime order with a bilinear structure are interesting objects for public key cryptography. In the first part of the lecture we shall explain how the pairing on points of the Jacobian variety which is usually called "Tate-pairing" can be got in a p- adic setting by the Lichtenbaum pairing. On the one hand side this setting gives us more freedom for its computation which leads to more[…] -
-
-
Seminar
-
Cryptography
Computationally Sound Security Proof using Formal Models
Speaker : Véronique Cortier - LORIA
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which[…] -
-
-
Seminar
-
Cryptography
Introduction to Secure Multi-Party Computation
Speaker : Martin Hirt - ETH Zurich
Consider a set of $n$ players, each holding a value $x_1,...,x_n$, and an $n$-ary function $f$, specified as an arithmetic circuit over a finite field. How can the players compute $y=f(x_1,...,x_n)$ in such a way that no (small enough) set of dishonest players obtains any joint information about the input values of the honest players (beyond of what they can infer from $y$)? In this talk, we[…] -
-
-
Seminar
-
Cryptography
Interpolation polynomiale multivariée, codes et cryptographie (travail en collaboration avec O. Ruatta)
Speaker : Philippe Gaborit - Université de Limoges
Dans cet exposé nous nous intéressons à l'interpolation polynomiale multivariée et à ses applications. Nous présenterons tout d'abord des applications connues comme le décodage en liste des codes de Reed-Solomon (pour lequel Madhu Sudan a recu le prix Nevanlinna), mais aussi des applications nouvelles comme le décodage en liste des effacements des codes de Reed-Muller ou encore l'application au[…] -
-
-
Seminar
-
Cryptography
Sur le rang de tordues quadratiques de courbes elliptiques sur
Speaker : Emmanuel Kowalski - Université Bordeaux I
La distribution du rang de familles de courbes elliptiques sur un corps de fonction sur un corps fini est théoriquement mieux comprise que dans le cas d'un corps de nombre. En particulier, dans le cas de familles de tordues quadratiques d'une courbe fixée, il est possible de montrer que le nombre de tordues dont le rang est plus grand que ce qu'impose l'équation fonctionnelle est trés petit. Les[…] -
-
-
Seminar
-
Cryptography
Cryptography in the Bounded Quantum-Storage Model
Speaker : Serge Fehr - CWI Amsterdam
Most of todays cryptography relies on the assumption that a potential attacker cannot solve some computational problem (e.g. factor a large integer). It has been shown in the early 80's that with the use of quantum-mechanical effects, certain cryptographic tasks can be done unconditionally, i.e., secure against computationally unbounded attackers: Quantum-cryptography, and with it the hope that (m[…] -