This thesis deals with secure digital broadcast designed with elliptic curves. The first chapter is devoted to the computation of l-torsion points on elliptic curves defined over a finite field of characteristic p. More precisely, we combine a fast algorithm for computing isogenies due to Bostan, Morain, Salvy and Schost with the p-adic approach used by Joux and Lercier. We obtain the first algorithm valid without any limitation on l and p, the complexity of which is similar to the one of Bostan et al.'s algorithm. In the second chapter, we develop a generic group model with pairing which generalizes the models seen so far in the literature. We provide then a general framework: cryptographic assumptions related to the discrete logarithm pro...
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 20...
In the paper presents the mathematics of elliptic curves. As well as the derivation of addition form...
The security of many cryptographic schemes and protocols rests on the conjectured computational intr...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
In our day to day life, information security is a predominant topic. More specifically, (online) use...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...
The goal of this thesis is to study cryptographic applications of elliptic curves over the ring Fp["...
In today\u27s digital age of conducting large portions of daily life over the Internet, privacy in c...
This thesis deals with issues related to the implementation of cryptography on elliptic curves in a ...
International audienceAt PKC 2006, Chevallier-Mames, Paillier, and Pointcheval proposed a very elega...
This thesis is a basic overview of elliptic curves and their applications to Cryptography. We begin ...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
Public key cryptography aims at providing efficient, versatile, and secure solutions to protect comp...
At its core, cryptography relies on problems that are simple to construct but difficult to solve unl...
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 20...
In the paper presents the mathematics of elliptic curves. As well as the derivation of addition form...
The security of many cryptographic schemes and protocols rests on the conjectured computational intr...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
In our day to day life, information security is a predominant topic. More specifically, (online) use...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...
The goal of this thesis is to study cryptographic applications of elliptic curves over the ring Fp["...
In today\u27s digital age of conducting large portions of daily life over the Internet, privacy in c...
This thesis deals with issues related to the implementation of cryptography on elliptic curves in a ...
International audienceAt PKC 2006, Chevallier-Mames, Paillier, and Pointcheval proposed a very elega...
This thesis is a basic overview of elliptic curves and their applications to Cryptography. We begin ...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
Public key cryptography aims at providing efficient, versatile, and secure solutions to protect comp...
At its core, cryptography relies on problems that are simple to construct but difficult to solve unl...
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 20...
In the paper presents the mathematics of elliptic curves. As well as the derivation of addition form...
The security of many cryptographic schemes and protocols rests on the conjectured computational intr...