This habilitation thesis deals with cryptographic primitives that preserve the algebraic structure of underlying objects (messages, keys, etc) and their applications to the design of non-interactive zero-knowledge proofs and privacy-enhancing cryptographic primitives.In 2008, Groth and Sahai showed how to make these proof systems relatively efficient in abelian groups endowed with a bilinear map. These techniques, however, require to work with lower-level primitives where handled objects all live in a cyclic abelian group. Among other things, we need to sign messages without destroying their algebraic structure (in particular, without hashing them first) so as to be able to efficiently prove properties about hidden signed messages. The firs...
The advent of information technology, the dramatic increase of computational and storage capacities ...
Proof systems are tools used to formally prove theorems, and in particular that software is bug-free...
In the recent time, the field of image steganalysis and steganography became more important due to t...
Machine Learning (ML) algorithms have proven themselves very powerful. Especially classification, en...
The security of image and video data is important formany applications which require in real-time a ...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
This thesis investigates the realizability of white-box implementations for secure pseudorandom perm...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at s...
The security of Internet applications relies crucially on the secure design and robust implementatio...
Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-t...
The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a c...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Alice and Bob want to exchange information and make sure that an eavesdropper will not be able to li...
Colorings of the discrete plane (i.e., tilings) are a geometrical model which is intimately linked w...
This PhD project takes place in List MAPS, a Horizon 2020-funded Marie Curie Actions InnovativeTrain...
The advent of information technology, the dramatic increase of computational and storage capacities ...
Proof systems are tools used to formally prove theorems, and in particular that software is bug-free...
In the recent time, the field of image steganalysis and steganography became more important due to t...
Machine Learning (ML) algorithms have proven themselves very powerful. Especially classification, en...
The security of image and video data is important formany applications which require in real-time a ...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
This thesis investigates the realizability of white-box implementations for secure pseudorandom perm...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at s...
The security of Internet applications relies crucially on the secure design and robust implementatio...
Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-t...
The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a c...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Alice and Bob want to exchange information and make sure that an eavesdropper will not be able to li...
Colorings of the discrete plane (i.e., tilings) are a geometrical model which is intimately linked w...
This PhD project takes place in List MAPS, a Horizon 2020-funded Marie Curie Actions InnovativeTrain...
The advent of information technology, the dramatic increase of computational and storage capacities ...
Proof systems are tools used to formally prove theorems, and in particular that software is bug-free...
In the recent time, the field of image steganalysis and steganography became more important due to t...