This thesis explores two different approaches to reduce the size of the public key cryptosystems based on error correcting codes. One idea that meaning is the use of families of codes with high correction capability, such as geometric codes. Since the attack Sidelnikov and Shestakov, we know that an attacker can find the structure of a Reed-Solomon code used in the public key. We have managed to adapt to the hyperelliptic curves attack method developed by cons Minder elliptic codes. We are particularly able to attack in polynomial time system Janwa and Moreno on codes developed geometric genus 2 or more. A second idea is the use of error correcting codes for the rank metric. This enormously complicates the decoding attacks, which can no lon...
In this PhD thesis I propose coprocessors architectures for high performance computations of asymmet...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
This thesis deals with secure digital broadcast designed with elliptic curves. The first chapter is ...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
In this thesis, we study the security of symmetric cryptographic primitives. These systems are based...
Fully homomorphic encryption is a kind of encryption offering the ability to manipulate encrypted da...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
In this PhD thesis I propose coprocessors architectures for high performance computations of asymmet...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
This thesis deals with secure digital broadcast designed with elliptic curves. The first chapter is ...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
In this thesis, we study the security of symmetric cryptographic primitives. These systems are based...
Fully homomorphic encryption is a kind of encryption offering the ability to manipulate encrypted da...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
In this PhD thesis I propose coprocessors architectures for high performance computations of asymmet...
Cryptography and security market is growing up at a annual rate of 17% according to some recent stud...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...