Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blockchain applications, and to current scalability problems that blockchains suffer from. The most efficient circuit-based zero-knowledge proofs use a pairing-friendly elliptic curve to generate and validate proofs. In particular, the circuits are built connecting wires that carry elements from a large prime field, whose order is determined by the number of elements of the pairing-friendly elliptic curve. In this context, it is important to generate an inner curve using this field, because it allows to create circuits that can verify public-key cryptography primitives, such as digital signatures and encryption schemes. To this purpose, in this ...
International audienceEven if recent advances in public key cryptography tend to focus on algorithms...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blo...
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in bl...
We propose an approach using elliptic curve-based zero-knowledge proofs in e-commerce applications. ...
International audienceThe elliptic curve cryptography plays a central role in various cryptographic ...
to appearInternational audienceA zero-knowledge proof is a method by which one can prove knowledge o...
Elliptic curves have found widespread use in number theory and applications thereof, such as cryptog...
International audienceElliptic curves have become key ingredients for instantiating zero-knowledge p...
As the Internet of Things (IOT) arises, the use of low-end devices on a daily basis increases. The w...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of ...
Edwards curves are a new normal form for elliptic curves that exhibit some cryp- tographically desir...
More than 25 years ago, elliptic curves over finite fields were suggested as a group in which the Di...
International audienceEven if recent advances in public key cryptography tend to focus on algorithms...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blo...
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in bl...
We propose an approach using elliptic curve-based zero-knowledge proofs in e-commerce applications. ...
International audienceThe elliptic curve cryptography plays a central role in various cryptographic ...
to appearInternational audienceA zero-knowledge proof is a method by which one can prove knowledge o...
Elliptic curves have found widespread use in number theory and applications thereof, such as cryptog...
International audienceElliptic curves have become key ingredients for instantiating zero-knowledge p...
As the Internet of Things (IOT) arises, the use of low-end devices on a daily basis increases. The w...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of ...
Edwards curves are a new normal form for elliptic curves that exhibit some cryp- tographically desir...
More than 25 years ago, elliptic curves over finite fields were suggested as a group in which the Di...
International audienceEven if recent advances in public key cryptography tend to focus on algorithms...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...