With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic primitives such as signature or authentication. Indeed, we propose an authentication protocol, a Secret Handshake, offering anonymity to the users in case of failure ; it is round-optimal and efficient both in computation and communication. We also present a Blind Signature, e-voting being an almost direct application. It has three properties rarely found combined : round-optimal, constante size and proved secure under classical assumptions in the standard model. Then, an Oblivious Transfer protocol from Code-based cryptography is detailed giving a quantum-resistant and practical algorithm. All the constructions were achieved following a mod...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
Ce manuscrit propose des nouveaux protocoles cryptographiques qui sont respectueux de la vie privée ...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
Ce manuscrit propose des nouveaux protocoles cryptographiques qui sont respectueux de la vie privée ...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...