The goal of this work is to obtain implementations of security protocols proved in the computational model. We implemented a compiler that takes as input a specification of a protocol in the input language of the protocol verifier CryptoVerif and compiles it into an implementation in OCaml. We proved the secrecy of exchanged keys and authentication of the server in the SSH (Secure SHell) key exchange protocol, and used our compiler on this protocol. We proved that this compiler is correct: if an adversary can break a security property on the generated code with a probability p, then there exists an adversary that can break this property on the specification with the same probability p. Hence, if a specification is proved secure in the compu...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-t...
Despite being long regarded as merely an amusement for researchers, quantum cryptography has now bee...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
The security of Internet applications relies crucially on the secure design and robust implementatio...
Machine Learning (ML) algorithms have proven themselves very powerful. Especially classification, en...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
As the number of devices able to communicate grows, so does the need to secure their interactions. T...
The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a c...
National audienceEtude du crible de Kuperberg et de l'utilisation d'un oracle probabiliste pour l'al...
The security of image and video data is important formany applications which require in real-time a ...
As quantum computers become more and more plausible, it is important to redesign cryptography in ord...
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modula...
This thesis investigates the realizability of white-box implementations for secure pseudorandom perm...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-t...
Despite being long regarded as merely an amusement for researchers, quantum cryptography has now bee...
The goal of this work is to obtain implementations of security protocols proved in the computational...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
The security of Internet applications relies crucially on the secure design and robust implementatio...
Machine Learning (ML) algorithms have proven themselves very powerful. Especially classification, en...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
As the number of devices able to communicate grows, so does the need to secure their interactions. T...
The 10th Hilbert problem, which consists in finding integer solutions to polynomial equations is a c...
National audienceEtude du crible de Kuperberg et de l'utilisation d'un oracle probabiliste pour l'al...
The security of image and video data is important formany applications which require in real-time a ...
As quantum computers become more and more plausible, it is important to redesign cryptography in ord...
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modula...
This thesis investigates the realizability of white-box implementations for secure pseudorandom perm...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
Cryptosystems are present in a lot of everyday life devices, such as smart cards, smartphones, set-t...
Despite being long regarded as merely an amusement for researchers, quantum cryptography has now bee...