International audienceWe present here a new family of trapdoor one-way Preimage Sampleable Functions (PSF) based on codes, the Wave-PSF family. The trapdoor function is one-way under two computational assumptions: the hardness of generic decoding for high weights and the indistinguishability of generalized (U,U+V)-codes. Our proof follows the GPV strategy [GPV08]. By including rejection sampling, we ensure the proper distribution for the trapdoor inverse output. The domain sampling property of our family is ensured by using and proving a variant of the left-over hash lemma. We instantiate the new Wave-PSF family with ternary generalized (U,U+V)-codes to design a “hash-and-sign” signature scheme which achieves existential unforgeabi...
Trapdoor functions (TDFs) are one of the fundamental building blocks in cryptography. Studying the u...
Over the last few years, there has been a surge of new cryptographic results, including Laconic obli...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
International audienceWe present here a new family of trapdoor one-way Preimage Sampleable Functions...
Wave is a recent digital signature scheme [3]. It is based on a family of trapdoor one-way Preimage ...
preprint IACR disponible sur https://eprint.iacr.org/2018/996/20181022:154324We present here Wave th...
International audienceThe GPV construction [GPV08] presents a generic construction of signature sche...
In this thesis we study code-based cryptography. By this term we mean the crypto-systems whose secur...
In this paper, we propose the notion of adaptive all-but-one lossy trapdoor functions (aABO-LTFs), a...
Despite having evolved as two distinct research areas, cryptography and coding theory have matured i...
International audienceWe develop and implement efficient Gaussian preimage sampling techniques on mo...
Abstract. Password-authenticated key exchange (PAKE) protocols allow two players to agree on a share...
In this thesis, we study two different primitives: lossy trapdoor functions and zero-knwoledge proof...
Dans cette thèse nous nous intéressons à la cryptographie utilisant des codes correcteurs. Cette pro...
International audiencePassword-authenticated key exchange (PAKE) protocols allow two players to agre...
Trapdoor functions (TDFs) are one of the fundamental building blocks in cryptography. Studying the u...
Over the last few years, there has been a surge of new cryptographic results, including Laconic obli...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
International audienceWe present here a new family of trapdoor one-way Preimage Sampleable Functions...
Wave is a recent digital signature scheme [3]. It is based on a family of trapdoor one-way Preimage ...
preprint IACR disponible sur https://eprint.iacr.org/2018/996/20181022:154324We present here Wave th...
International audienceThe GPV construction [GPV08] presents a generic construction of signature sche...
In this thesis we study code-based cryptography. By this term we mean the crypto-systems whose secur...
In this paper, we propose the notion of adaptive all-but-one lossy trapdoor functions (aABO-LTFs), a...
Despite having evolved as two distinct research areas, cryptography and coding theory have matured i...
International audienceWe develop and implement efficient Gaussian preimage sampling techniques on mo...
Abstract. Password-authenticated key exchange (PAKE) protocols allow two players to agree on a share...
In this thesis, we study two different primitives: lossy trapdoor functions and zero-knwoledge proof...
Dans cette thèse nous nous intéressons à la cryptographie utilisant des codes correcteurs. Cette pro...
International audiencePassword-authenticated key exchange (PAKE) protocols allow two players to agre...
Trapdoor functions (TDFs) are one of the fundamental building blocks in cryptography. Studying the u...
Over the last few years, there has been a surge of new cryptographic results, including Laconic obli...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...