The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case of elliptic curves, which is now well advanced. Most of the algorithms known for elliptic curves and their applications to cryptography can be more or less easily extended to Jacobians of hyperelliptic curves. In a first part, we investigate some aspects of Igusa's invariants which generalize the j-invariant of elliptic curves. For (2,2)-reducible Jacobians, we relate by explicit formulae the Igusa's invariants to the j-invariants of the quotient elliptic curves. Besides, we study these invariants by the way of Siegel modular forms with a view toward computing modular equations. The second part is dedicated to algorithms for computing the card...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
The goal of this work is to propose some approaches that solve functional constraint hierarchies. Fi...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
This thesis deals with computations of cardinality of elliptic curves which are defined over a finit...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
In this thesis, we study several cryptographic primitives of use in Diffie-Hellman like protocols. W...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Beware, this abstract comports irony and humor. In this dissertation, we defend the idea that, for a...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Discrete logarithm-based cryptography has sustained many studies in the last decade. Lenstra and Ver...
This thesis deals with secure digital broadcast designed with elliptic curves. The first chapter is ...
In this PhD thesis I propose coprocessors architectures for high performance computations of asymmet...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
The goal of this work is to propose some approaches that solve functional constraint hierarchies. Fi...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
This thesis deals with computations of cardinality of elliptic curves which are defined over a finit...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
In this thesis, we study several cryptographic primitives of use in Diffie-Hellman like protocols. W...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Beware, this abstract comports irony and humor. In this dissertation, we defend the idea that, for a...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
Discrete logarithm-based cryptography has sustained many studies in the last decade. Lenstra and Ver...
This thesis deals with secure digital broadcast designed with elliptic curves. The first chapter is ...
In this PhD thesis I propose coprocessors architectures for high performance computations of asymmet...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
The goal of this work is to propose some approaches that solve functional constraint hierarchies. Fi...