Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles et Sendrier, Nicolas et Roblot, XavierComputing discrete logarithms is a fundamental task for public key cryptanalysis. The mere existence of a subexponential algorithm for this purpose is not su±cient to de¯nitely rule on the security level provided by some cryptosystem. Assessing state-of-the-art cryptanalysis calls for a thorough evaluation process. This dissertation contributes to such an evaluation. In particular, a record computation for discrete logarithms over F2607 is described.The first part of this thesis focuses on our study and use of Coppersmith's algorithm for computing discrete logarithms in finite fields of characteristic two...
Cryptography is taking an ever more important part in the life of societies since the users are real...
This thesis deals with secure digital broadcast designed with elliptic curves. The first chapter is ...
The security of public-key cryptographic primitives relies on the computational difficulty of solvin...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
Discrete logarithm-based cryptography has sustained many studies in the last decade. Lenstra and Ver...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
In computer science, a lot of applications use distances. In the context of structured data, strings...
In computer science, a lot of applications use distances. In the context of structured data, strings...
This thesis deals with computations of cardinality of elliptic curves which are defined over a finit...
This thesis studies the algorithmic techniques of list decoding, first proposed by Guruswami and Sud...
This thesis studies the algorithmic techniques of list decoding, first proposed by Guruswami and Sud...
Nowadays, more and more applications deal with increasing dimensions. Thus, it seems relevant to exp...
Cryptography is taking an ever more important part in the life of societies since the users are real...
Cryptography is taking an ever more important part in the life of societies since the users are real...
This thesis deals with secure digital broadcast designed with elliptic curves. The first chapter is ...
The security of public-key cryptographic primitives relies on the computational difficulty of solvin...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
Discrete logarithm-based cryptography has sustained many studies in the last decade. Lenstra and Ver...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
This thesis is at the crossroads between cryptography and computer arithmetic. It deals with enhance...
In computer science, a lot of applications use distances. In the context of structured data, strings...
In computer science, a lot of applications use distances. In the context of structured data, strings...
This thesis deals with computations of cardinality of elliptic curves which are defined over a finit...
This thesis studies the algorithmic techniques of list decoding, first proposed by Guruswami and Sud...
This thesis studies the algorithmic techniques of list decoding, first proposed by Guruswami and Sud...
Nowadays, more and more applications deal with increasing dimensions. Thus, it seems relevant to exp...
Cryptography is taking an ever more important part in the life of societies since the users are real...
Cryptography is taking an ever more important part in the life of societies since the users are real...
This thesis deals with secure digital broadcast designed with elliptic curves. The first chapter is ...
The security of public-key cryptographic primitives relies on the computational difficulty of solvin...