Lattice-based cryptography is considered as a quantum-safe alternative for the replacement of currently deployed schemes based on RSA and discrete logarithm on prime fields or elliptic curves. It offers strong theoretical security guarantees, a large array of achievable primitives, and a competitive level of efficiency. Nowadays, in the context of the NIST post-quantum standardization process, future standards may ultimately be chosen and several new lattice-based schemes are high-profile candidates. The cryptographic research has been encouraged to analyze lattice-based cryptosystems, with a particular focus on practical aspects. This thesis is rooted in this effort.In addition to black-box cryptanalysis with classical computing resources,...
In the last decade, there has been significant progress in the development of quantum computers, wit...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
Lattice-based cryptography is considered as a quantum-safe alternative for the replacement of curren...
A quantum computer powerful enough to run Shor's algorithm could emerge and thus threaten the securi...
The emergence of quantum computer research increasingly poses a threat to currently used asymmetric ...
Lattice-based cryptography is a branch of cryptography exploiting the presumed hardness of some well...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
Current public key cryptosystems that are based on the hardness of integer factorization and discret...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
In the last decade, there has been significant progress in the development of quantum computers, wit...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
Lattice-based cryptography is considered as a quantum-safe alternative for the replacement of curren...
A quantum computer powerful enough to run Shor's algorithm could emerge and thus threaten the securi...
The emergence of quantum computer research increasingly poses a threat to currently used asymmetric ...
Lattice-based cryptography is a branch of cryptography exploiting the presumed hardness of some well...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
Current public key cryptosystems that are based on the hardness of integer factorization and discret...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
In the last decade, there has been significant progress in the development of quantum computers, wit...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...