This thesis is about block ciphers and cryptographic hash functions, which are two essential primitives of symmetric-key cryptography. In the first part of this manuscript, we study useful building blocks for block cipher design. We first consider large diffusion matrices builtfrom algebraic-geometry codes, and then construct a small S-box with good diffusion. In the second case, we show how the S-box can be used to define a compact and efficient block cipher targetting small processors. In the second part, we focus on the SHA-1 hash function, for which we develop a free start collision attack. We show how classical collision attacks can be made more efficient by exploiting the additional freedom provided by the model. This allows us in par...
La sécurité en cryptographie symétrique semble être une notion très floue pour des non-spécialistes ...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
Nous traitons dans cette thèse de la sécurité de fonctions cryptographiques symétriques. Dans une pr...
This thesis is about block ciphers and cryptographic hash functions, which are two essential primiti...
Cette thèse a pour objet d'étude les algorithmes de chiffrement par blocet les fonctions de hachage ...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
In this paper we analyze the security of the compression function of SHA-1 against collision attack...
Abstract. The main contributions of this paper are two-fold. Firstly, we present a novel direction i...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
Abstract. The design principle of Merkle-Damg˚ard construction is collision resistance of the compre...
We have found an operation between permutations in the symmetric group Sn upon which we have experim...
La sécurité en cryptographie symétrique semble être une notion très floue pour des non-spécialistes ...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
Nous traitons dans cette thèse de la sécurité de fonctions cryptographiques symétriques. Dans une pr...
This thesis is about block ciphers and cryptographic hash functions, which are two essential primiti...
Cette thèse a pour objet d'étude les algorithmes de chiffrement par blocet les fonctions de hachage ...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
In this paper we analyze the security of the compression function of SHA-1 against collision attack...
Abstract. The main contributions of this paper are two-fold. Firstly, we present a novel direction i...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
Abstract. The design principle of Merkle-Damg˚ard construction is collision resistance of the compre...
We have found an operation between permutations in the symmetric group Sn upon which we have experim...
La sécurité en cryptographie symétrique semble être une notion très floue pour des non-spécialistes ...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
Nous traitons dans cette thèse de la sécurité de fonctions cryptographiques symétriques. Dans une pr...