Since the late 70’s, several public key cryptographic algorithms have been proposed. Diffie and Hellman first came with this concept in 1976. Since that time, several other public key cryptosystems were invented, such as the well known RSA, ElGamal or Rabin cryptosystems. Roughly, the scope of these algorithms is to allow the secure exchange of a secret key that will later on be used to encrypt a larger amount of data. All these algorithms share one particularity, namely that their security rely on some mathematical problem which is supposed to be hard (computationally speaking) to solve. For example, it is well known that the ability to factorize easily the product of two large primes without any indication about the primes, would lead to bre...
Conference of 2nd International Conference on Frontiers of Signal Processing, ICFSP 2016 ; Conferenc...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Using Gröbner bases for the construction of public key cryptosystems has been often attempted, but h...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....
AbstractUsing Gröbner bases for the construction of public key cryptosystems has been often attempte...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
International audienceIn PKC'08, Plantard, Susilo and Win proposed a lattice-based signature scheme,...
Abstract—Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based c...
Due to the Nguyen’s attack, the Goldreich-Goldwasser-Halevi (GGH) encryption scheme, simply referred...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, a...
International audienceLattice reduction algorithms have surprisingly many applications in mathematic...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
In recent years, methods based on lattice reduction have been used repeatedly for the cryptanalytic ...
Lattice-based cryptography is a branch of cryptography exploiting the presumed hardness of some well...
Conference of 2nd International Conference on Frontiers of Signal Processing, ICFSP 2016 ; Conferenc...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Using Gröbner bases for the construction of public key cryptosystems has been often attempted, but h...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....
AbstractUsing Gröbner bases for the construction of public key cryptosystems has been often attempte...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
International audienceIn PKC'08, Plantard, Susilo and Win proposed a lattice-based signature scheme,...
Abstract—Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based c...
Due to the Nguyen’s attack, the Goldreich-Goldwasser-Halevi (GGH) encryption scheme, simply referred...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, a...
International audienceLattice reduction algorithms have surprisingly many applications in mathematic...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
In recent years, methods based on lattice reduction have been used repeatedly for the cryptanalytic ...
Lattice-based cryptography is a branch of cryptography exploiting the presumed hardness of some well...
Conference of 2nd International Conference on Frontiers of Signal Processing, ICFSP 2016 ; Conferenc...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Using Gröbner bases for the construction of public key cryptosystems has been often attempted, but h...