In this thesis we present our contribution in the field of post-quantum cryptography. We introduce a new notion of weakly Random-Self-Reducible public-key cryptosystem and show how it can be used to implement secure Oblivious Transfer. We also show that two recent (Post-quantum) cryptosystems can be considered as weakly Random-Self-Reducible. We introduce a new problem called Isometric Lattice Problem and reduce graph isomorphism and linear code equivalence to this problem. We also show that this problem has a perfect zero-knowledge interactive proof with respect to a malicious verifier; this is the only hard problem in lattices that is known to have this property.Dans cette thèse nous exposons nos contributions au domaine de la cryptograph...
Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. O...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
We introduce a computational problem of distinguishing between two specific quantum states as a new ...
Abstract. In this work, we define a new notion of weakly Random-Self-Reducibile cryptosys-tems and s...
Because of the concise functionality of oblivious transfer (OT) protocols, they have been widely use...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
Avec la possibilité de l’existence d’un ordinateur quantique, les primitives cryptographiques basées...
htmlabstractThe interest in post-quantum cryptography - classical systems that remain secure in the ...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
AbstractModern cryptography is based on various building blocks such as one way functions with or wi...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
Our main result is a reduction from worst-case lattice prob-lems such as SVP and SIVP to a certain l...
Lattice-based cryptography aims at harnessing the security of cryptographic primitives in the conjec...
The research covered in this thesis is dedicated to provable post-quantum security of hash functions...
Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. O...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
We introduce a computational problem of distinguishing between two specific quantum states as a new ...
Abstract. In this work, we define a new notion of weakly Random-Self-Reducibile cryptosys-tems and s...
Because of the concise functionality of oblivious transfer (OT) protocols, they have been widely use...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
Avec la possibilité de l’existence d’un ordinateur quantique, les primitives cryptographiques basées...
htmlabstractThe interest in post-quantum cryptography - classical systems that remain secure in the ...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
AbstractModern cryptography is based on various building blocks such as one way functions with or wi...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
Our main result is a reduction from worst-case lattice prob-lems such as SVP and SIVP to a certain l...
Lattice-based cryptography aims at harnessing the security of cryptographic primitives in the conjec...
The research covered in this thesis is dedicated to provable post-quantum security of hash functions...
Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. O...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
We introduce a computational problem of distinguishing between two specific quantum states as a new ...