This thesis investigates the realizability of white-box implementations for secure pseudorandom permutations. Concretely, we show that multi-input functional encryption achieving a natural definition of one-wayness is instrumental in building implementations that are secure against key-extraction attacks. As a contribution of independent interest, we extend the notion of robustness to a larger set of primitives. Roughly speaking, robust encryption guarantees that a ciphertext cannot be decrypted under different keys. Initially formalized in a public-key context, we introduce compelling definitions for authentication and functional encryption schemes.Cette thèse s’intéresse à la faisabilité des implémentations en boîte blanche de permutation...
As the number of devices able to communicate grows, so does the need to secure their interactions. T...
Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-t...
National audienceEtude du crible de Kuperberg et de l'utilisation d'un oracle probabiliste pour l'al...
The security of Internet applications relies crucially on the secure design and robust implementatio...
Machine Learning (ML) algorithms have proven themselves very powerful. Especially classification, en...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
This habilitation thesis deals with cryptographic primitives that preserve the algebraic structure o...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Cryptography studies how to secure communications and information. The security of a cryptosystem de...
In this thesis, we study the algebraic structure underlying number-theoretic pseudorandom functions....
Contrairement aux protocoles cryptographiques fondés sur la théorie des nombres, les systèmes de chi...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
Les architectures des processeurs et coprocesseurs cryptographiques se montrent fréquemment vulnérab...
The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a c...
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modula...
As the number of devices able to communicate grows, so does the need to secure their interactions. T...
Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-t...
National audienceEtude du crible de Kuperberg et de l'utilisation d'un oracle probabiliste pour l'al...
The security of Internet applications relies crucially on the secure design and robust implementatio...
Machine Learning (ML) algorithms have proven themselves very powerful. Especially classification, en...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
This habilitation thesis deals with cryptographic primitives that preserve the algebraic structure o...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Cryptography studies how to secure communications and information. The security of a cryptosystem de...
In this thesis, we study the algebraic structure underlying number-theoretic pseudorandom functions....
Contrairement aux protocoles cryptographiques fondés sur la théorie des nombres, les systèmes de chi...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
Les architectures des processeurs et coprocesseurs cryptographiques se montrent fréquemment vulnérab...
The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a c...
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modula...
As the number of devices able to communicate grows, so does the need to secure their interactions. T...
Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-t...
National audienceEtude du crible de Kuperberg et de l'utilisation d'un oracle probabiliste pour l'al...