This thesis presents new results in three fundamental areas of public-key cryptography: integrity, authentication and confidentiality. In each case we design new primitives or improve the features of existing ones. The first chapter, dealing with integrity, introduces a non-interactive proof for proper RSA public key generation and a contract co-signature protocol in which a breach in fairness provides the victim with transferable evidence against the cheater. The second chapter, focusing on authentication, shows how to use time measurements to shorten zeroknowledge commitments and how to exploit bias in zero-knowledge challenges to gain efficiency. This chapter also generalizes Fiat-Shamir into a one-to-many protocol and describes a very s...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
Cette thèse présente des résultats appartenant aux trois thèmes fondamentaux de la cryptographie à c...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
Trusted parties are fundamental for the establishment of secure communication among users. Such is t...
Trusted parties are fundamental for the establishment of secure communication among users. Such is t...
Trusted parties are fundamental for the establishment of secure communication among users. Such is t...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
Cette thèse présente des résultats appartenant aux trois thèmes fondamentaux de la cryptographie à c...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
Trusted parties are fundamental for the establishment of secure communication among users. Such is t...
Trusted parties are fundamental for the establishment of secure communication among users. Such is t...
Trusted parties are fundamental for the establishment of secure communication among users. Such is t...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...