Ces dernières années la cryptographie a été chamboulée par l'arrivée des ordinateurs quantiques. En effet ceux-ci possèdent un très fort avantage pour casser les schémas cryptographique utilisés actuellement dans la quasi-totalité des communications sécurisées. Nous proposons dans cette thèse plusieurs constructions cryptographiques basées sur des outils mathématiques résistants à ces ordinateurs quantique, que sont les réseaux euclidiens. Tout d'abord nous construisons une signature de groupe, permettant à chaque membre composant un groupe donné de signer au nom du groupe tout en conservant son anonymat. Nous rajoutons une propriété supplémentaire qui est la "forward secrecy" qui sépare le temps en périodes durant lesquelles les clés secrè...
This thesis examines the intersection of two modern and growing branches of cryptography, namely pri...
In order to mitigate the potential threat that the rise of quantum computers could pose to many of t...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
Avec la possibilité de l’existence d’un ordinateur quantique, les primitives cryptographiques basées...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
National audienceCryptography is used to protect everyone's privacy on a daily basis whenbrowsing th...
This thesis examines the intersection of two modern and growing branches of cryptography, namely pri...
In order to mitigate the potential threat that the rise of quantum computers could pose to many of t...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
Avec la possibilité de l’existence d’un ordinateur quantique, les primitives cryptographiques basées...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
National audienceCryptography is used to protect everyone's privacy on a daily basis whenbrowsing th...
This thesis examines the intersection of two modern and growing branches of cryptography, namely pri...
In order to mitigate the potential threat that the rise of quantum computers could pose to many of t...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...