The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a crucial problem in cryptanalysis, which has been proven to be undecidable. However, Coppersmith published in 1996 a method based on lattice reduction, which allows to efficiently find all small solutions to some polynomial equations. Many applications of this method have risen in public key cryptanalysis, especially when the cryptosystem is executed on embedded systems and part of the secret key is revealed through physical attacks performed on the device. In this context, we propose in this thesis a physical attack on the RSA signature scheme when the CRT mode is used, where an application of Coppersmith's method allows to complete the inform...
The growing popularity of Wireless Sensor Networks (WSN) makes the spectrum of their applications ve...
Rigorous numerics aims at providing certified representations for solutions of various problems, not...
Technological limitations faced by the semi-conductor manufacturers in the early 2000's restricted t...
The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a c...
Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-t...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
The efficiency of devices performing arithmetic operations in finite field is crucial for the effici...
The security of Internet applications relies crucially on the secure design and robust implementatio...
The concern over the security of the infrastructure of a company is only growing deeper and became a...
La evolución de las tecnologías conlleva el aumento de las capacidades de cómputo y procesamiento, ...
In the recent time, the field of image steganalysis and steganography became more important due to t...
The goal of this work is to obtain implementations of security protocols proved in the computational...
The security of image and video data is important formany applications which require in real-time a ...
Parallel programs need to manage the trade-off between the time spent in synchronisation and computa...
The growing popularity of Wireless Sensor Networks (WSN) makes the spectrum of their applications ve...
Rigorous numerics aims at providing certified representations for solutions of various problems, not...
Technological limitations faced by the semi-conductor manufacturers in the early 2000's restricted t...
The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a c...
Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-t...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
The efficiency of devices performing arithmetic operations in finite field is crucial for the effici...
The security of Internet applications relies crucially on the secure design and robust implementatio...
The concern over the security of the infrastructure of a company is only growing deeper and became a...
La evolución de las tecnologías conlleva el aumento de las capacidades de cómputo y procesamiento, ...
In the recent time, the field of image steganalysis and steganography became more important due to t...
The goal of this work is to obtain implementations of security protocols proved in the computational...
The security of image and video data is important formany applications which require in real-time a ...
Parallel programs need to manage the trade-off between the time spent in synchronisation and computa...
The growing popularity of Wireless Sensor Networks (WSN) makes the spectrum of their applications ve...
Rigorous numerics aims at providing certified representations for solutions of various problems, not...
Technological limitations faced by the semi-conductor manufacturers in the early 2000's restricted t...