Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
706 résultats
-
-
Séminaire
-
Cryptographie
Algebraic geometry meets microcontrollers: Efficient, compact key
Orateur : Ben Smith - Ecole polytechnique
This talk will describe how we have applied the theory of Kummer surfaces --classic objects in algebraic geometry-- to produce compact, high-speed software for secure key exchange and signatures on microcontrollers. This is joint work with Brian Chung, Craig Costello, Joost Renes, Peter Schwabe, and Lejla Batina. -
-
-
Séminaire
-
Cryptographie
Lilliput: Advances in Security and Performance Analysis
Orateur : Julien Francq - Airbus CyberSecurity
Lilliput is a block cipher that has been published in 2015 in IEEE Transactions in Computers with Thierry Berger and Marine Minier, and the seminal paper has been cited 6 times for now. This talk will summarize the results of the third-party cryptanalysis and implementations, and will show that Lilliput is still an efficient and secure cryptographic primitives. -
-
-
Séminaire
-
Cryptographie
Coercion-resistant Internet voting made practical
Orateur : Jacques Traore - Orange Labs
Internet voting offers a better voting experience since voters can cast their votes from their computers or even smartphones. By eliminating the need to visit polling places, it may attract more voters and thus increase voter turnout. However, it is still not widely spread owing to many inherent concerns such as risks entailed by the lack of private polling booths. Indeed, this may ease coercion[…] -
-
-
-
Séminaire
-
Cryptographie
Fonction de hachage et protection de la vie privée
Orateur : Cédric Lauradoux - INRIA
Les fonctions de hachage à sens unique sont très utilisées pour générer des pseudonymes et anonymiser des données. Le résultat obtenu est rarement à la hauteur des espoirs mis dans le hachage. Dans de nombreux cas, on a pu ré-identifier des bases de données anonymiser avec des fonctions de hachage. Dans cet exposé, nous reviendrons sur les garanties d'anonymat (anonymity-set-size ou k-anonymity)[…] -
-
-
Séminaire
-
Cryptographie
Cryptography, Encryption, and Big Data
Orateur : Hoeteck Wee - ENS
We live in an era of "Big Data", wherein a deluge of data is being generated, collected, and stored all around us. In order to protect this data, we need to encrypt it. This raises a fundamentally new challenge in cryptography: Can we encrypt data while enabling fine-grained access control and selective computation, as is necessary to protect big, complex data? In this talk, I will present my work[…] -