Zobrazeno 1 - 10
of 40
pro vyhledávání: '"André Chailloux"'
Autor:
Rémi Bricout, André Chailloux
Publikováno v:
Cryptography, Vol 1, Iss 2, p 14 (2017)
In this paper, we study relativistic bit commitment, which uses timing and location constraints to achieve information theoretic security. Using those constraints, we consider a relativistic bit commitment scheme introduced by Lunghi et al. This prot
Externí odkaz:
https://doaj.org/article/21743ffed9e14d909bc3e318a7d993ce
Publikováno v:
New Journal of Physics, Vol 18, Iss 4, p 045003 (2016)
Random access coding is an information task that has been extensively studied and found many applications in quantum information. In this scenario, Alice receives an n -bit string x , and wishes to encode x into a quantum state ${\rho }_{x}$ , such t
Externí odkaz:
https://doaj.org/article/78531eb8d78246cd9997ce23987f17f9
Utilisation du froid pour la stérilisation des viandes ladres à l'abattoir frigorifique de Fort-Lamy
Publikováno v:
Revue d’Elevage et de Médecine Vétérinaire des Pays Tropicaux, Vol 24, Iss 2 (1971)
cf. fichier PDF de l'article.
Externí odkaz:
https://doaj.org/article/ee1ec9c11b3d4c4287f0bd532a39fc0f
Autor:
M. Graber, André Chailloux
Publikováno v:
Revue d’Elevage et de Médecine Vétérinaire des Pays Tropicaux, Vol 23, Iss 1 (1970)
cf. fichier PDF de l'article.
Externí odkaz:
https://doaj.org/article/c383f8d94b30469480edd3bac0bb6b8a
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031305887
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5a1f9e41c28088d6d141f3cea79baae3
https://doi.org/10.1007/978-3-031-30589-4_8
https://doi.org/10.1007/978-3-031-30589-4_8
Autor:
Thomas Debris-Alazard, André Chailloux
Publikováno v:
PKC 2020-IACR International Conference on Public-Key Cryptography
PKC 2020-IACR International Conference on Public-Key Cryptography, Jun 2020, Edinburgh / Virtual, United Kingdom. pp.453-479, ⟨10.1007/978-3-030-45388-6_16⟩
Lecture Notes in Computer Science ISBN: 9783030453879
Public Key Cryptography (2)
PKC 2020-IACR International Conference on Public-Key Cryptography, Jun 2020, Edinburgh / Virtual, United Kingdom. pp.453-479, ⟨10.1007/978-3-030-45388-6_16⟩
Lecture Notes in Computer Science ISBN: 9783030453879
Public Key Cryptography (2)
International audience; The GPV construction [GPV08] presents a generic construction of signature schemes in the Hash and Sign paradigm and is used in some lattice based signatures. This construction requires a family F of trapdoor preimage sampleabl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::199f8de87cd9ee87456f96648c32a666
https://hal.inria.fr/hal-03138441
https://hal.inria.fr/hal-03138441
Publikováno v:
Munich Workshop on Coding and Cryptography (MWCC)
Munich Workshop on Coding and Cryptography (MWCC), Jul 2019, Munich, Germany
Lecture Notes in Computer Science ISBN: 9783030384708
SAC
Munich Workshop on Coding and Cryptography (MWCC), Jul 2019, Munich, Germany
Lecture Notes in Computer Science ISBN: 9783030384708
SAC
The Syndrome Decoding problem is at the core of many code-based cryptosystems. In this paper, we study ternary Syndrome Decoding in large weight. This problem has been introduced in the Wave signature scheme but has never been thoroughly studied. We
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::53a9a30d4ba94c1690e42660be2bb453
Publikováno v:
Chicago Journal of Theoretical Computer Science. 22:1-17
Oblivious transfer is a fundamental cryptographic primitive in which Bob transfers one of two bits to Alice in such a way that Bob cannot know which of the two bits Alice has learned. We present an optimal security bound for quantum oblivious transfe
Publikováno v:
Asiacrypt 2017-Advances in Cryptology
Asiacrypt 2017-Advances in Cryptology, Dec 2017, Hong Kong, China. pp.211--240, ⟨10.1007/978-3-319-70697-9_8⟩
Advances in Cryptology – ASIACRYPT 2017 ISBN: 9783319706962
ASIACRYPT (2)
Advances in Cryptology – ASIACRYPT 2017
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2017
Asiacrypt 2017-Advances in Cryptology, Dec 2017, Hong Kong, China. pp.211--240, ⟨10.1007/978-3-319-70697-9_8⟩
Advances in Cryptology – ASIACRYPT 2017 ISBN: 9783319706962
ASIACRYPT (2)
Advances in Cryptology – ASIACRYPT 2017
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2017
International audience; The cryptographic community has widely acknowledged that the emergence of large quantum computers will pose a threat to most current public-key cryptography. Primitives that rely on order-finding problems, such as factoring an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::03f4f6cce5cf13a2a3826a2654bed40c
https://hal.inria.fr/hal-01651007
https://hal.inria.fr/hal-01651007
Publikováno v:
computational complexity. 25:103-151
Bit commitment schemes are at the basis of modern cryptography. Since information-theoretic security is impossible both in the classical and the quantum regime, we need to look at computationally secure commitment schemes. In this paper, we study wor