Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Cryptanalyse algébrique"'
Autor:
Trimoska, Monika
Publikováno v:
Cryptography and Security [cs.CR]. Université de Picardie-Jules Verne, 2021. English
In this thesis, we explore the use of combinatorial techniques, such as graph-based algorithms and constraint satisfaction, in cryptanalysis. Our main focus is on the elliptic curve discrete logarithm problem. First, we tackle this problem in the cas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::529fd1b7a023e50c61db7c64bb23fea5
https://hal.archives-ouvertes.fr/tel-03168389
https://hal.archives-ouvertes.fr/tel-03168389
Autor:
Chakraborty, Olive
Publikováno v:
Cryptography and Security [cs.CR]. Sorbonne Université, 2020. English
Polynomial system solving is one of the oldest and most important problems in computational mathematics and has many applications in computer science. It is intrinsically a hard problem with complexity at least single exponential in the number of var
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::e93e8c1c26fd50f38f3a72a9de948ca2
https://tel.archives-ouvertes.fr/tel-03135217/file/Thesis_Olive_TEL_HAL.pdf
https://tel.archives-ouvertes.fr/tel-03135217/file/Thesis_Olive_TEL_HAL.pdf
Autor:
Chakraborty, Olive
Publikováno v:
Cryptography and Security [cs.CR]. Sorbonne Université, 2020. English. ⟨NNT : 2020SORUS283⟩
Polynomial system solving is one of the oldest and most important problems incomputational mathematics and has many applications in computer science. Itis intrinsically a hard problem with complexity at least single exponential in the number of varia
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3c55b308df24f598c9a179d1100b5c23
https://tel.archives-ouvertes.fr/tel-03460923v2/document
https://tel.archives-ouvertes.fr/tel-03460923v2/document
Autor:
Chakraborty, Olive
Publikováno v:
Cryptography and Security [cs.CR]. Sorbonne Université, 2020. English
Polynomial system solving is one of the oldest and most important problems in computational mathematics and has many applications in computer science. It is intrinsically a hard problem with complexity at least single exponential in the number of var
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::e93e8c1c26fd50f38f3a72a9de948ca2
https://tel.archives-ouvertes.fr/tel-03135217/file/Thesis_Olive_TEL_HAL.pdf
https://tel.archives-ouvertes.fr/tel-03135217/file/Thesis_Olive_TEL_HAL.pdf
Autor:
Nitaj, Abderrahmane
Publikováno v:
Cryptography and Security [cs.CR]. Université de Caen Normandie, 2016
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::fad26358097a275cca1146a6979fbb75
https://hal-normandie-univ.archives-ouvertes.fr/tel-02321087
https://hal-normandie-univ.archives-ouvertes.fr/tel-02321087
Autor:
Wallet, Alexandre
Le problème du logarithme discret est une brique fondamentale de nombreux protocoles de communication sécurisée. Son instantiation sur les courbes elliptiques a permis, grâce à la petite taille des opérandes considérées, le déploiement de pr
Externí odkaz:
http://www.theses.fr/2016PA066438/document
Autor:
Wallet, Alexandre
Publikováno v:
Data Structures and Algorithms [cs.DS]. Université Pierre et Marie Curie-Paris VI, 2016. English. ⟨NNT : 2016PA066438⟩
The discrete logarithm problem is a fundamental brick for several protocols for secured communications. Its instantiation over elliptic curves allows the deployment of efficient asymmetric primitives in embedded systems, because of the small size of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::4b43471de5e2a11d8708f650e0d07cb0
https://theses.hal.science/tel-01407675
https://theses.hal.science/tel-01407675
La cryptographie à base de codes correcteurs, introduite par Robert McEliece en 1978, est un candidat potentiel au remplacement des primitives asymétriques vulnérables à l'émergence d'un ordinateur quantique. Elle possède de plus une sécurité
Externí odkaz:
http://www.theses.fr/2015PA066106/document
Publikováno v:
Other [cs.OH]. Université Pierre et Marie Curie-Paris VI, 2015. English. ⟨NNT : 2015PA066106⟩
Cryptography and Security [cs.CR]. Université Pierre et Marie Curie-Paris VI, 2015. English. ⟨NNT : 2015PA066106⟩
Cryptography and Security [cs.CR]. Université Pierre et Marie Curie-Paris VI, 2015. English. ⟨NNT : 2015PA066106⟩
Code-based cryptography, introduced by Robert McEliece in 1978, is a potential candidate to replace the asymetric primitives which are threatened by quantum computers. More generral, it has been considered secure for more than thirty years, and allow
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::c48c20fe41d14ca610fae4d5b0ac6433
https://theses.hal.science/tel-01187916
https://theses.hal.science/tel-01187916
Autor:
Huot, Louise
Depuis ces dix dernières années, les attaques sur le logarithme discret sur les courbes elliptiques (ECDLP) mettant en jeu la résolution de systèmes polynomiaux connaissent un large succès. C'est dans ce contexte que s'inscrit cette thèse dont
Externí odkaz:
http://tel.archives-ouvertes.fr/tel-00925271
http://tel.archives-ouvertes.fr/docs/00/92/52/71/PDF/these.pdf
http://tel.archives-ouvertes.fr/docs/00/92/52/71/PDF/these.pdf