Equipe cascade, ENS, InriaThis thesis is dedicated to the analysis of modes of operation in the context of disk protection usage. Firstly, we give modes of operation secure in the Full Disk Encryption (FDE) model where additional data storage are not allowed. In this context, encryption has to be length preserving which implies length-preserving encryption. However, it is possible to use a value already present in the system, called a diversifier, to randomize the encryption and to have a better security. Then, we introduce two methods to analyse symmetric primitive in the very constraint Key-Dependent Message (KDM) model which is of interest for disk encryption because the encryption key can end up in the disk. It enables to analyse the KD...
Hashing and hash-based data structures are ubiquitous. Apart from their role in thedesign of efficie...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
With the rapid development of optical communications and the increasing amount of data exchanged, it...
Authenticated key exchange is probably the most widely deployed asymmetric cryptographic primitive, ...
Cryptographic protocols are one of the foundations for the trust people put in computer systems nowa...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Computational reproducibility is an unavoidable concept in the 21st century. Computer hardware evolu...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Fully homomorphic encryption is a kind of encryption offering the ability to manipulate encrypted da...
In this thesis, we will focus on the physical implementation of visual cryptography, which consists ...
The increasing availability of smartphone and tablets has given place to the development of a broad ...
This thesis is about symmetric, or private key, cryptography. It has a focus on modes of operation a...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
RÉSUMÉ: Le but de cette recherche est de proposer un algorithme numérique pour la publication en tem...
Hashing and hash-based data structures are ubiquitous. Apart from their role in thedesign of efficie...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
With the rapid development of optical communications and the increasing amount of data exchanged, it...
Authenticated key exchange is probably the most widely deployed asymmetric cryptographic primitive, ...
Cryptographic protocols are one of the foundations for the trust people put in computer systems nowa...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Computational reproducibility is an unavoidable concept in the 21st century. Computer hardware evolu...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Fully homomorphic encryption is a kind of encryption offering the ability to manipulate encrypted da...
In this thesis, we will focus on the physical implementation of visual cryptography, which consists ...
The increasing availability of smartphone and tablets has given place to the development of a broad ...
This thesis is about symmetric, or private key, cryptography. It has a focus on modes of operation a...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
RÉSUMÉ: Le but de cette recherche est de proposer un algorithme numérique pour la publication en tem...
Hashing and hash-based data structures are ubiquitous. Apart from their role in thedesign of efficie...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
With the rapid development of optical communications and the increasing amount of data exchanged, it...