Machine Learning (ML) algorithms have proven themselves very powerful. Especially classification, enabling to efficiently identify information in large datasets. However, it raises concerns about the privacy of this data. Therefore, it brought to the forefront the challenge of designing machine learning algorithms able to preserve confidentiality.This thesis proposes a way to combine some cryptographic systems with classification algorithms to achieve privacy preserving classifier. The cryptographic system family in question is the functional encryption one. It is a generalization of the traditional public key encryption in which decryption keys are associated with a function. We did some experimentations on that combination on realistic sc...
Over the last years, the massive deployment of computing devices over disparate interconnected infra...
The advent of information technology, the dramatic increase of computational and storage capacities ...
The concern over the security of the infrastructure of a company is only growing deeper and became a...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
The security of Internet applications relies crucially on the secure design and robust implementatio...
The security of image and video data is important formany applications which require in real-time a ...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modula...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
This habilitation thesis deals with cryptographic primitives that preserve the algebraic structure o...
This thesis dissertation revisits state-of-the-art fragmentation techniques making them faster and c...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
This PhD project takes place in List MAPS, a Horizon 2020-funded Marie Curie Actions InnovativeTrain...
In the recent time, the field of image steganalysis and steganography became more important due to t...
This thesis investigates the realizability of white-box implementations for secure pseudorandom perm...
Over the last years, the massive deployment of computing devices over disparate interconnected infra...
The advent of information technology, the dramatic increase of computational and storage capacities ...
The concern over the security of the infrastructure of a company is only growing deeper and became a...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
The security of Internet applications relies crucially on the secure design and robust implementatio...
The security of image and video data is important formany applications which require in real-time a ...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modula...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
This habilitation thesis deals with cryptographic primitives that preserve the algebraic structure o...
This thesis dissertation revisits state-of-the-art fragmentation techniques making them faster and c...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
This PhD project takes place in List MAPS, a Horizon 2020-funded Marie Curie Actions InnovativeTrain...
In the recent time, the field of image steganalysis and steganography became more important due to t...
This thesis investigates the realizability of white-box implementations for secure pseudorandom perm...
Over the last years, the massive deployment of computing devices over disparate interconnected infra...
The advent of information technology, the dramatic increase of computational and storage capacities ...
The concern over the security of the infrastructure of a company is only growing deeper and became a...