This thesis is about algorithmic problems arising when someone wants to imple-ment a cryptosystem based on error correcting codes or a cryptanalysis of such asystem. The benefits of these systems come from their excellent algorithmic com-plexity, better of several orders than the classical public key schemes. They also bringa credible alternative to the current systems that for most of them rely on numbertheory and on the problems of factorisation and discrete logarithm. P.Shor showedthat these two problems could be solved in polynomial time in the quantum computermodel. This computer is far from being operational but we will need alternatives wecan trust and that have efficient implementations.After an introductive section bringing require...
Security of public keys cryptography is based on difficult mathematic problems, especially in number...
International audienceMcEliece proposed the first public-key cryptosystem based on linear error-corr...
In this PhD thesis, we focus on cryptography based on error-correcting codes, and more specifically ...
This thesis is about algorithmic problems arising when someone wants to implement a cryptosystem bas...
Cette thèse porte sur les problèmes algorithmiques qui apparaissent lorsque l'on souhaite mettre en ...
Le premier protocole cryptographique basé sur les codes correcteurs d'erreurs a été proposé en 1978 ...
La plupart des algorithmes de chiffrement à clé publique actuellement utilisés pour assurer la confi...
Tout d’abord, mon sujet de recherche porte sur le cryptographie à clé publique, plus précisément la ...
Dans cette thèse nous nous intéressons à la cryptographie utilisant des codes correcteurs. Cette pro...
In this thesis we study code-based cryptography. By this term we mean the crypto-systems whose secur...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
La cryptographie moderne est fondée sur la notion de sécurité computationnelle. Les niveaux de sécur...
Error-correcting codes are used to reconstitute digital data, which are proned to alterations during...
Security of public keys cryptography is based on difficult mathematic problems, especially in number...
International audienceMcEliece proposed the first public-key cryptosystem based on linear error-corr...
In this PhD thesis, we focus on cryptography based on error-correcting codes, and more specifically ...
This thesis is about algorithmic problems arising when someone wants to implement a cryptosystem bas...
Cette thèse porte sur les problèmes algorithmiques qui apparaissent lorsque l'on souhaite mettre en ...
Le premier protocole cryptographique basé sur les codes correcteurs d'erreurs a été proposé en 1978 ...
La plupart des algorithmes de chiffrement à clé publique actuellement utilisés pour assurer la confi...
Tout d’abord, mon sujet de recherche porte sur le cryptographie à clé publique, plus précisément la ...
Dans cette thèse nous nous intéressons à la cryptographie utilisant des codes correcteurs. Cette pro...
In this thesis we study code-based cryptography. By this term we mean the crypto-systems whose secur...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
La cryptographie moderne est fondée sur la notion de sécurité computationnelle. Les niveaux de sécur...
Error-correcting codes are used to reconstitute digital data, which are proned to alterations during...
Security of public keys cryptography is based on difficult mathematic problems, especially in number...
International audienceMcEliece proposed the first public-key cryptosystem based on linear error-corr...
In this PhD thesis, we focus on cryptography based on error-correcting codes, and more specifically ...