Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

658 résultats

    • Séminaire

    • Cryptographie

    Implicit proofs of membership

    • 13 mars 2020

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Olivier Blazy - Université Limoges

    Smooth hash proof systems have been introduced by Cramer and shoup to build compact efficient cca2 encryption in the standard model. Since then, they found applications in a broad range of protocols from oblivious transfer to authenticated key exchange, passing by witness examples.<br/> In this talk, we will start by a panorama of languages that can be managed by such a primitive and then show how[…]
    • Séminaire

    • Cryptographie

    A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs

    • 19 novembre 2021

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Thomas Prest - PQShield

    Continuous group key agreements (CGKAs) are a class of protocols that can provide strong security guarantees to secure group messaging protocols such as Signal and MLS. Protection against device compromise is provided by commit messages: at a regular rate, each group member may refresh their key material by uploading a commit message, which is then downloaded and processed by all the other members[…]
    • Séminaire

    • Cryptographie

    Middle-Product Learning with Rounding Problem and its Applications

    • 17 avril 2020

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Katharina Boudgoust - Univ Rennes, CNRS, IRISA

    This talk focuses on a new variant of the Learning With Errors (LWE) problem, a fundamental computational problem used in lattice-based cryptography.<br/> At Crypto17, Roşca et al. introduced the Middle-Product LWE problem (MP-LWE), whose hardness is based on the hardness of the Polynomial LWE (P-LWE) problem parameterized by a large set of polynomials, making it more secure against the possible[…]
    • Séminaire

    • Cryptographie

    Soutenance de thèse: Conception de courbes elliptiques et applications

    • 16 décembre 2021

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Rémi Clarisse - Rennes

    Le thème de la sécurité de l’information est prédominant dans nos vies actuelles. En particulier, les utilisateurs de service, plus précisément en ligne, s’attendent de plus en plus à ce que leurs données à caractère personnel soient traitées dignement et avec leur consentement. Cela incite donc à concevoir des systèmes se pliant à de telles exigences. Le recours à la cryptographie permet de[…]
    • Séminaire

    • Cryptographie

    Computing isogenies from modular equations in genus 2

    • 10 janvier 2020

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Jean Kieffer - Université Bordeaux 1

    Given two l-isogenous elliptic curves, a well-known algorithm of Elkies uses modular polynomials to compute this isogeny explicitly. In this work, we generalize his ideas to Jacobians of genus 2 curves. Our algorithms works for both l-isogenies and (in the RM case) cyclic isogenies, and uses Siegel or Hilbert type modular equations respectively. This has applications for point counting in genus 2:[…]
    • Séminaire

    • Cryptographie

    Key recovery from partial information

    • 01 octobre 2021

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Gabrielle De Michelli - UC San Diego

    The security of deployed protocols not only relies on the hardness of the underlying mathematical problem but also on the implementation of the algorithms involved. Many fast modular exponentiation algorithms have piled up over the years and some implementations have brought vulnerabilities that are exploitable by side-channel attacks, in particular cache attacks.<br/> In this talk, we consider[…]