In this thesis, we study the security of cryptographic systems against an adversary who has access to a quantum computer. In quantum computing, we studied the hidden period and hidden shift problems, which are among the few known problems that have some applications in cryptogaphy and for which the best known quantum algorithm is more than polynomially faster than the best known classical algorithm. We proposed some improvements, new tradeoffs between classical and quantum time and memory, and extended their scope of applications to cases where only a classical oracle is available. In cryptanalysis, in symmetric cryptography, we proposed some attacks against symmetric constructions based on hidden shifts, and generalized many attacks using ...
International audienceDue to Shor's algorithm, quantum computers are a severe threat for public key ...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
Nous étudions la sécurité de systèmes cryptographiques face à un adversaire muni d'un ordinateur qua...
Nous étudions la sécurité de systèmes cryptographiques face à un adversaire muni d'un ordinateur qua...
Cryptography is widely used and implemented, particularly in a modern-day setting. Of note to the fi...
International audienceAEZ is an authenticated encryption algorithm, submitted to the CAESAR competit...
AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selec...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
Modern cryptography relies on the notion of computational security. The level of security given by a...
Quantum computers, that may become available one day, would impact many scientific fields, most nota...
We present new connections between quantum information and the field of classical cryptography. In p...
Pour la cryptographie moderne, la sécurité d'un système est définie comme la somme des ressources né...
International audienceDue to Shor's algorithm, quantum computers are a severe threat for public key ...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
Nous étudions la sécurité de systèmes cryptographiques face à un adversaire muni d'un ordinateur qua...
Nous étudions la sécurité de systèmes cryptographiques face à un adversaire muni d'un ordinateur qua...
Cryptography is widely used and implemented, particularly in a modern-day setting. Of note to the fi...
International audienceAEZ is an authenticated encryption algorithm, submitted to the CAESAR competit...
AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selec...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
Modern cryptography relies on the notion of computational security. The level of security given by a...
Quantum computers, that may become available one day, would impact many scientific fields, most nota...
We present new connections between quantum information and the field of classical cryptography. In p...
Pour la cryptographie moderne, la sécurité d'un système est définie comme la somme des ressources né...
International audienceDue to Shor's algorithm, quantum computers are a severe threat for public key ...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...