The construction of large quantum computers would endanger most of the public-key cryptographic schemes in use today. Therefore, there is currently a large research effort to develop new post-quantum secure schemes. In particular, we are interested in post-quantum cryptographic schemes whose security relies on the hardness of solving some mathematical problems such as thePermuted Kernel Problem (PKP) and the Hidden Field Equations (HFE). This work investigates first the complexity of PKP. And after a thorough analysis of the State-of-theart attacks of PKP, we have been able to update some results that were not accurate, and to provide an explicit complexity formula which allows us to identify hard instances and secure sets of parameters of ...
Modern cryptography relies on the notion of computational security. The level of security given by a...
Ever since Shor\u27s algorithm was introduced in 1994, cryptographers have been working to develop c...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
La construction d’un ordinateur quantique remettrait en cause la plupart des schémas à clef publique...
We present a generic forgery attack on signature schemes constructed from 5-round identification sch...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
Polynomial system solving is one of the oldest and most important problems incomputational mathemati...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
Hard lattice problems are predominant in constructing post-quantum cryptosystems. However, we need t...
In the light of technological advances, scientists expect that quantum computers will be generated a...
The MPC-in-the-head introduced in [IKOS07] has established itself as an important paradigm to design...
This paper presents MQ on my Mind (MQOM), a digital signature scheme based on the difficulty of solv...
This thesis is concerned with the study and analysis of two quantum cryptographic protocols: quantum...
We present the first general-purpose digital signature scheme based on supersingular elliptic curve...
Modern cryptography relies on the notion of computational security. The level of security given by a...
Ever since Shor\u27s algorithm was introduced in 1994, cryptographers have been working to develop c...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
La construction d’un ordinateur quantique remettrait en cause la plupart des schémas à clef publique...
We present a generic forgery attack on signature schemes constructed from 5-round identification sch...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
In an age of explosive growth of digital communications and electronic data storage, cryptography pl...
Polynomial system solving is one of the oldest and most important problems incomputational mathemati...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
Hard lattice problems are predominant in constructing post-quantum cryptosystems. However, we need t...
In the light of technological advances, scientists expect that quantum computers will be generated a...
The MPC-in-the-head introduced in [IKOS07] has established itself as an important paradigm to design...
This paper presents MQ on my Mind (MQOM), a digital signature scheme based on the difficulty of solv...
This thesis is concerned with the study and analysis of two quantum cryptographic protocols: quantum...
We present the first general-purpose digital signature scheme based on supersingular elliptic curve...
Modern cryptography relies on the notion of computational security. The level of security given by a...
Ever since Shor\u27s algorithm was introduced in 1994, cryptographers have been working to develop c...
For modern cryptography, the security of a system is defined as the sum of the resources required to...