International audienceMany cryptographic systems based on elliptic curves are proven secure in the Random Oracle Model, assuming there exist probabilistic functions that map elements in some domain (e.g. bitstrings) onto uniformly and independently distributed points in a curve. When implementing such systems, and in order for the proof to carry over to the implementation, those mappings must be instantiated with concrete constructions whose behavior does not deviate significantly from random oracles. In contrast to other approaches to public-key cryptography, where candidates to instantiate random oracles have been known for some time, the first generic construction for hashing into ordinary elliptic curves indifferentiable from a random o...
In the classic Diffie-Hellman protocol based on a generic group $\G$, Alice and Bob agree on a commo...
In this thesis we consider different problems related to provable security and indifferentiability f...
Key derivation refers to the process by which an agreed upon large random number, often named master...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is...
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is...
At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary ellipt...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
The present article explains how to generalize the hash function SwiftEC (in an elementary quasi-uni...
International audienceThis book constitutes the proceedings of the First International Conference on...
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic pa...
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic pa...
In the classic Diffie-Hellman protocol based on a generic group $\G$, Alice and Bob agree on a commo...
In this thesis we consider different problems related to provable security and indifferentiability f...
Key derivation refers to the process by which an agreed upon large random number, often named master...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is...
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is...
At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary ellipt...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
The present article explains how to generalize the hash function SwiftEC (in an elementary quasi-uni...
International audienceThis book constitutes the proceedings of the First International Conference on...
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic pa...
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic pa...
In the classic Diffie-Hellman protocol based on a generic group $\G$, Alice and Bob agree on a commo...
In this thesis we consider different problems related to provable security and indifferentiability f...
Key derivation refers to the process by which an agreed upon large random number, often named master...