A fundamental goal in theoretical cryptography is to identify the conceptually simplest abstractions that generically imply a collection of other cryptographic primitives. For symmetric-key primitives, this goal has been accomplished by showing that one-way functions are necessary and sufficient to realize primitives ranging from symmetric-key encryption to digital signatures. By contrast, for asymmetric primitives, we have no (known) unifying simple abstraction even for a few of its most basic objects. Moreover, even for public-key encryption (PKE) alone, we have no unifying abstraction that all known constructions follow. The fact that almost all known PKE constructions exploit some algebraic structure suggests considering abstractions th...
The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memor...
This dissertation presents new cryptographic protocols, which can be divided into two families. Prot...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...
This material intends to be a brief introduction to symmetric and asymmetric cryptographic primitive...
Since Kilian showed in 1988 that oblivious transfer (OT) is complete in the sense that every secure ...
This thesis contributes two results to the research area of secure two-party computation. The first ...
We analyse transformations between cryptographic primitives and, for each transformation, we do two ...
The main goal of asymmetric cryptography is to provide confidential communication, which allows two ...
The asymmetric-key (public-key) encryption scheme is considered to be the most important discovery i...
We live in an age where we willingly provide our social security number, credit card information, ho...
Cryptographic primitives are the basic building blocks of various cryptographic systems and protocol...
International audienceCryptographic protocols are successfully analyzed using formal methods. Howeve...
International audienceThe main efficiency metrics for a cryptographic primitive are its speed, its c...
While traditional symmetric algorithms like AES and SHA3 are optimized for efficient hardware and so...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...
The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memor...
This dissertation presents new cryptographic protocols, which can be divided into two families. Prot...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...
This material intends to be a brief introduction to symmetric and asymmetric cryptographic primitive...
Since Kilian showed in 1988 that oblivious transfer (OT) is complete in the sense that every secure ...
This thesis contributes two results to the research area of secure two-party computation. The first ...
We analyse transformations between cryptographic primitives and, for each transformation, we do two ...
The main goal of asymmetric cryptography is to provide confidential communication, which allows two ...
The asymmetric-key (public-key) encryption scheme is considered to be the most important discovery i...
We live in an age where we willingly provide our social security number, credit card information, ho...
Cryptographic primitives are the basic building blocks of various cryptographic systems and protocol...
International audienceCryptographic protocols are successfully analyzed using formal methods. Howeve...
International audienceThe main efficiency metrics for a cryptographic primitive are its speed, its c...
While traditional symmetric algorithms like AES and SHA3 are optimized for efficient hardware and so...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...
The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memor...
This dissertation presents new cryptographic protocols, which can be divided into two families. Prot...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...