Zobrazeno 1 - 10
of 63
pro vyhledávání: '"Antonin Leroux"'
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031305887
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6974c56beeb4435781415458f590cd00
https://doi.org/10.1007/978-3-031-30589-4_23
https://doi.org/10.1007/978-3-031-30589-4_23
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031092336
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ba672797c1e06535b858a07f90916abc
https://doi.org/10.1007/978-3-031-09234-3_28
https://doi.org/10.1007/978-3-031-09234-3_28
Autor:
Antonin Leroux
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229657
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e0db7640dc0eff30b46b1f468ef6e9ad
https://doi.org/10.1007/978-3-031-22966-4_1
https://doi.org/10.1007/978-3-031-22966-4_1
Autor:
Luca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva, Benjamin Wesolowski
Publikováno v:
Advances in Cryptology-ASIACRYPT 2021
Lecture Notes in Computer Science ISBN: 9783030920678
Advances in Cryptology – ASIACRYPT 2021
Advances in Cryptology – ASIACRYPT 2021, 13093, Springer International Publishing, pp.249-278, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-92068-5_9⟩
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2021, Singapour, Singapore. pp.249-278, ⟨10.1007/978-3-030-92068-5_9⟩
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2021
Lecture Notes in Computer Science ISBN: 9783030920678
Advances in Cryptology – ASIACRYPT 2021
Advances in Cryptology – ASIACRYPT 2021, 13093, Springer International Publishing, pp.249-278, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-92068-5_9⟩
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2021, Singapour, Singapore. pp.249-278, ⟨10.1007/978-3-030-92068-5_9⟩
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2021
International audience; We present Séta, 11 a new family of public-key encryption schemes with post-quantum security based on isogenies of supersingular elliptic curves. It is constructed from a new family of trapdoor one-way functions, where the in
Publikováno v:
Open Book Series
ANTS-XIV-14th Algorithmic Number Theory Symposium
ANTS-XIV-14th Algorithmic Number Theory Symposium, Jun 2020, Auckland, New Zealand. pp.39-55, ⟨10.2140/obs.2020.4.39⟩
ANTS-XIV-14th Algorithmic Number Theory Symposium
ANTS-XIV-14th Algorithmic Number Theory Symposium, Jun 2020, Auckland, New Zealand. pp.39-55, ⟨10.2140/obs.2020.4.39⟩
International audience; Let $\mathcal{E}/\mathbb{F}_q$ be an elliptic curve, and $P$ a point in $\mathcal{E}(\mathbb{F}_q)$ of prime order $\ell$.Vélu's formulae let us compute a quotient curve $\mathcal{E}' = \mathcal{E}/\langle{P}\rangle$ and rati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5d40030814fc3fe2b7ddc73a63f02bb9
http://arxiv.org/abs/2003.10118
http://arxiv.org/abs/2003.10118
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030578077
ACNS (1)
ACNS (1)
In Secret Sharing (SS), a dealer shares a secret s among n parties such that an adversary corrupting no more than t parties does not learn s, while any \(t+1\) parties can efficiently recover s. Proactive Secret Sharing (PSS) retains confidentiality
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::32e8b61f4b72b18512d785a0b6dc4208
https://doi.org/10.1007/978-3-030-57808-4_1
https://doi.org/10.1007/978-3-030-57808-4_1
Publikováno v:
ICTAI
Although machine learning models are found in more and more practical applications, stakeholders can be suspicious about the fact that they are not hard-coded and fully specified. To foster trust, it is crucial to provide models whose predictions are
Autor:
Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031313677
We present SCALLOP: SCALable isogeny action based on Oriented supersingular curves with Prime conductor, a new group action based on isogenies of supersingular curves. Similarly to CSIDH and OSIDH, we use the group action of an imaginary quadratic or
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::21d81ac5f43e80e634611b4a175fbd82
https://infoscience.epfl.ch/record/302918
https://infoscience.epfl.ch/record/302918
Publikováno v:
ACM Transactions on Embedded Computing Systems; Mar2024, Vol. 23 Issue 2, p1-25, 25p
Autor:
Qiang Tang, Vanessa Teague
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 p