Trusted parties are fundamental for the establishment of secure communication among users. Such is the case, for example, when establishing a trusted relationship between users and certain public information in a public-key infrastructure for public-key encryption and signature schemes or when storing high-entropy secret keys in a cryptographic device. Clearly, if the trusted party misbehaves in either of these situations, then the overall security of the scheme or protocol in which we are interested can be adversely affected. There are several ways in which one can try to reduce the amount of trust in third parties, such as making the task of recovering the secret key harder for the adversary, as in distributed cryptosystems or minimizing ...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
Cette thèse présente des résultats appartenant aux trois thèmes fondamentaux de la cryptographie à c...
Trusted parties are fundamental for the establishment of secure communication among users. Such is t...
Trusted parties are fundamental for the establishment of secure communication among users. Such is t...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
Avec l’utilisation massive du stockage dématérialisé, l’homomorphisme est devenu l’une des propriété...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
Cette thèse présente des résultats appartenant aux trois thèmes fondamentaux de la cryptographie à c...
Trusted parties are fundamental for the establishment of secure communication among users. Such is t...
Trusted parties are fundamental for the establishment of secure communication among users. Such is t...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
Avec l’utilisation massive du stockage dématérialisé, l’homomorphisme est devenu l’une des propriété...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
Cette thèse présente des résultats appartenant aux trois thèmes fondamentaux de la cryptographie à c...