This thesis is dedicated to the description of several bitrsitring comparison based remote object authentication protocols and the study of their theoretical security. The proposed protocols are designed to carry out the authentication of a given object while simultaneously guaranteeing that the information sent and received by the server cannot be tampered with by outside adversaries and that the identity of the tested object remains hidden from outside and (certain) inside adversaries. Finally it has been our objective to use elliptic curve cryptography, taking advantage of its useful properties, notably a better security level to key-size ratio. We present several protocols reaching these objectives, establishing for almost each protocol...
With the development of digital networks, such as Internet, communication protocols are omnipresent....
Abstract — the effectiveness of remote client-authentication schemes varies significantly in relatio...
De nos jours, l'authentification dans les réseaux maillés sans fils fait appel aux certificats ou au...
This thesis is dedicated to the description of several bitrsitring comparison based remote object au...
Cette thèse est consacrée à la description et à l'étude de la sécurité de divers protocoles destinés...
International audienceThis paper aims to provide a remote fingerprint object authentication protocol...
Actuellement, la technologie RFID (Radio Frequency Identification) est utilisée dans plusieurs domai...
Cette thèse a pour objet l'amélioration de la sécurité de systèmes à accès distant par l'utilisation...
Les protocoles de sécurité modernes peuvent impliquer un participant humain de façon à ce qu'il comp...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
In this thesis, we propose an original continuous remote attestation framework to improve trust and ...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
De nos jours, l'authentification dans les réseaux maillés sans fils fait appel aux certificats ou au...
With the development of digital networks, such as Internet, communication protocols are omnipresent....
Abstract — the effectiveness of remote client-authentication schemes varies significantly in relatio...
De nos jours, l'authentification dans les réseaux maillés sans fils fait appel aux certificats ou au...
This thesis is dedicated to the description of several bitrsitring comparison based remote object au...
Cette thèse est consacrée à la description et à l'étude de la sécurité de divers protocoles destinés...
International audienceThis paper aims to provide a remote fingerprint object authentication protocol...
Actuellement, la technologie RFID (Radio Frequency Identification) est utilisée dans plusieurs domai...
Cette thèse a pour objet l'amélioration de la sécurité de systèmes à accès distant par l'utilisation...
Les protocoles de sécurité modernes peuvent impliquer un participant humain de façon à ce qu'il comp...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
In this thesis, we propose an original continuous remote attestation framework to improve trust and ...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
De nos jours, l'authentification dans les réseaux maillés sans fils fait appel aux certificats ou au...
With the development of digital networks, such as Internet, communication protocols are omnipresent....
Abstract — the effectiveness of remote client-authentication schemes varies significantly in relatio...
De nos jours, l'authentification dans les réseaux maillés sans fils fait appel aux certificats ou au...