The design of a quantum computer would have a tremendous impact on the cryptography used nowadays, particularly in the asymetric cryptography do-main. Moreover, the increasing use of connected objects in our everyday lifeand their limitations in term of computation capabilities and available memory make them a key target. This thesis was focused on those two problematics, and is divided into three independent axis. The first one proposes the conception of a cryptographic primitive called Hash Proof System (HPS). Based on the language of RQC ciphertexts, we will show how to construct such a primitive and will present two applications of it : a witness encryption scheme in one hand and a password authenticated key exchange protocol on the oth...
The emergence of quantum computer research increasingly poses a threat to currently used asymmetric ...
Dans cette thèse nous nous intéressons à la cryptographie utilisant des codes correcteurs. Cette pro...
This thesis is about algorithmic problems arising when someone wants to imple-ment a cryptosystem ba...
The design of a quantum computer would have a tremendous impact on the cryptography used nowadays, p...
La conception d’ordinateurs quantiques aura un impact majeur sur la cryptographie que nous utilisons...
Code-based cryptography is one of the fields allowing to build post-quantum cryptosystems, i.e secur...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
Avec la possibilité de l’existence d’un ordinateur quantique, les primitives cryptographiques basées...
Security of public keys cryptography is based on difficult mathematic problems, especially in number...
L'émergence de la recherche sur l'ordinateur quantique représente de plus en plus une menace pour la...
La cryptographie à clé publique a prouvé son importance depuis l'émergence de RSA et ECC (Cryptograp...
This thesis is about algorithmic problems arising when someone wants to implement a cryptosystem bas...
Shor's quantum algorithm can be used to efficiently solve the integer factorisation problem and the ...
The emergence of quantum computer research increasingly poses a threat to currently used asymmetric ...
Dans cette thèse nous nous intéressons à la cryptographie utilisant des codes correcteurs. Cette pro...
This thesis is about algorithmic problems arising when someone wants to imple-ment a cryptosystem ba...
The design of a quantum computer would have a tremendous impact on the cryptography used nowadays, p...
La conception d’ordinateurs quantiques aura un impact majeur sur la cryptographie que nous utilisons...
Code-based cryptography is one of the fields allowing to build post-quantum cryptosystems, i.e secur...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
Avec la possibilité de l’existence d’un ordinateur quantique, les primitives cryptographiques basées...
Security of public keys cryptography is based on difficult mathematic problems, especially in number...
L'émergence de la recherche sur l'ordinateur quantique représente de plus en plus une menace pour la...
La cryptographie à clé publique a prouvé son importance depuis l'émergence de RSA et ECC (Cryptograp...
This thesis is about algorithmic problems arising when someone wants to implement a cryptosystem bas...
Shor's quantum algorithm can be used to efficiently solve the integer factorisation problem and the ...
The emergence of quantum computer research increasingly poses a threat to currently used asymmetric ...
Dans cette thèse nous nous intéressons à la cryptographie utilisant des codes correcteurs. Cette pro...
This thesis is about algorithmic problems arising when someone wants to imple-ment a cryptosystem ba...