Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
719 résultats
-
-
Séminaire
-
Cryptographie
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
Orateur : Daniel De Almeida Braga - Université Rennes 1
Protocols for password-based authenticated key exchange (PAKE) allow two users sharing only a short, low-entropy password to establish a secure session with a cryptographically strong key. The challenge in designing such protocols is that they must resist offline dictionary attacks in which an attacker exhaustively enumerates the dictionary of likely passwords in an attempt to match the used[…] -
-
-
Séminaire
-
Cryptographie
Practical Strategy-Resistant Privacy-Preserving Elections
Orateur : Quentin Santos - Orange
Recent advances in cryptography promise to let us run com- plex algorithms in the encrypted domain. However, these results are still mostly theoretical since the running times are still much larger than their equivalents in the plaintext domain. In this context, Majority Judgment is a recent proposal for a new voting system with several interesting practical advantages, but which implies a more[…] -
-
-
Séminaire
-
Cryptographie
Quantum security of the Fiat-Shamir transform of commit and open protocols
Orateur : André Chailloux - INRIA
Applying the Fiat-Shamir transform on identification schemes is one of the main ways of constructing signature schemes. While the classical security of this transformation is well understood, there are still many cases for which we do not know whether the quantum security holds or not. In this paper, we show that if we start from a commit-and-open identification scheme, where the prover first[…] -
-
-
Séminaire
-
Cryptographie
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble
Orateur : Michele Orru - ENS
-
-
-
Séminaire
-
Cryptographie
Cocks-Pinch curves of embedding degree five to eight and optimal ate pairing computation
Orateur : Simon Masson - Loria, Nancy
Recent algorithmic improvements of discrete logarithm computation in special extension fields threaten the security of pairing-friendly curves used in practice. A possible answer to this delicate situation is to propose alternative curves that are immune to these attacks, without compromising the efficiency of the pairing computation too much. We follow this direction, and focus on embedding[…] -
-
-
Séminaire
-
Cryptographie
Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem
Orateur : Benjamin WESOLOWSKI - École Polytechnique Federale de Lausanne
An isogeny graph is a graph whose vertices are abelian varieties (typically elliptic curves, or Jacobians of genus 2 hyperelliptic curves) and whose edges are isogenies between them. Such a graph is "horizontal" if all the abelian varieties have the same endomorphism ring. We study the connectivity and the expander properties of these graphs. We use these results, together with a recent algorithm[…] -