Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Cryptographie symétrique"'
Autor:
Florez Gutierrez, Antonio
Publikováno v:
Cryptography and Security [cs.CR]. Sorbonne Université, 2022. English. ⟨NNT : 2022SORUS281⟩
This thesis proposes improvements which can be applied to several techniques for the cryptanalysis of symmetric primitives. Special attention is given to linear cryptanalysis, for which a technique based on the fast Walsh transform was already known
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______165::d17d4b3e6d6acf3bcec3867ecde8eef6
https://inria.hal.science/tel-03878739
https://inria.hal.science/tel-03878739
Autor:
Sibleyras, Ferdinand
Publikováno v:
Cryptography and Security [cs.CR]. Sorbonne Université, 2020. English. ⟨NNT : 2020SORUS477⟩
Computer Science [cs]. Sorbonne Université, 2020. English
Computer Science [cs]. Sorbonne Université, 2020. English
This thesis is about symmetric, or private key, cryptography. It has a focus on modes of operation and, more generally, on all cryptographic schemes that admit a formal proof of security with an accent on the cryptanalysis of such constructions. Ther
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::999fa4368e9c65890e9348c776d9338c
https://hal.archives-ouvertes.fr/tel-03058306
https://hal.archives-ouvertes.fr/tel-03058306
Autor:
Bordes, Nicolas
Publikováno v:
SSTIC (Symposium sur la sécurité des technologies de l'information et des communications) 2021
SSTIC (Symposium sur la sécurité des technologies de l'information et des communications) 2021, Association STIC, Jun 2021, Rennes, France. pp.177
SSTIC (Symposium sur la sécurité des technologies de l'information et des communications) 2021, Association STIC, Jun 2021, Rennes, France. pp.177
National audience; Les attaques par canaux auxiliaires sont des attaques particulièrement adaptée aux systèmes embarqués. Celles-ci, grâce à l'observation de grandeurs physiques lors de l'exécution d'un programme, peuvent permettre d'extraire
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::7d539e63c0ba85edd601bbbad71bb416
https://hal.archives-ouvertes.fr/hal-03250605/file/BordesMasquage.pdf
https://hal.archives-ouvertes.fr/hal-03250605/file/BordesMasquage.pdf
Autor:
Schrottenloher, André
Publikováno v:
Cryptography and Security [cs.CR]. Sorbonne Université, 2021. English
Modern cryptography relies on the notion of computational security. The level of security given by a cryptosystem is expressed as an amount of computational resources required to break it. The goal of cryptanalysis is to find attacks, that is, algori
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::64a78a3211bd91483926797adcb3fbb6
https://hal.inria.fr/tel-03142366
https://hal.inria.fr/tel-03142366
Autor:
Bonnetain, Xavier
Publikováno v:
Cryptography and Security [cs.CR]. Sorbonne Université, 2019. English. ⟨NNT : 2019SORUS181⟩
In this thesis, we study the security of cryptographic systems against an adversary who has access to a quantum computer. In quantum computing, we studied the hidden period and hidden shift problems, which are among the few known problems that have s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::6e1e6d498ef5c075887076bb8569751b
https://tel.archives-ouvertes.fr/tel-02400328v2/document
https://tel.archives-ouvertes.fr/tel-02400328v2/document
Autor:
Thiry-Atighehchi, Kevin
Publikováno v:
[Rapport de recherche] GREYC CNRS UMR 6072, Universite de Caen. 2019
La cryptographie incrémentale est un outil permettant d'obtenir des applications plus performantes et plus économes en ressources énergétiques (serveurs, appareils sur batterie). Elle se place dans le vaste contexte où des documents dont nous di
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::b19741d14b705f8230accdf6ae5441d0
https://hal.science/hal-03502346
https://hal.science/hal-03502346
Autor:
Chaigneau, Colin
Publikováno v:
Cryptography and Security [cs.CR]. Université Paris-Saclay, 2018. English. ⟨NNT : 2018SACLV086⟩
Nowadays, cryptology is heavily used to protect stored and transmitted data against malicious attacks, by means of security algorithms. Cryptology comprises cryptography, the design of these algorithms, and cryptanalysis, the analysis of their securi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::551a62cf0d464b619f5555fc75da8b4e
https://tel.archives-ouvertes.fr/tel-02012149
https://tel.archives-ouvertes.fr/tel-02012149
Autor:
Portella, Rodrigo
Publikováno v:
Cryptography and Security [cs.CR]. Université Paris sciences et lettres, 2016. English. ⟨NNT : 2016PSLEE036⟩
This thesis addresses lightweight hardware design and countermeasures to improve cryptographic computation. Because cryptography (and cryptanalysis) is nowadays becoming more and more ubiquitous in our daily lives, it is crucial that newly developed
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::f769753fb77082653898183844a1299a
https://tel.archives-ouvertes.fr/tel-01743786
https://tel.archives-ouvertes.fr/tel-01743786
Autor:
Lallemand, Virginie
Publikováno v:
Cryptographie et sécurité [cs.CR]. Université Pierre et Marie Curie-Paris VI, 2016. Français. ⟨NNT : 2016PA066657⟩
The main subject of this thesis is the security analysis of symmetric key ciphers. Specifically, we study several recently proposed block and stream ciphers and prove that the level of security stated by their designers is overestimated. The ciphers
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::c976699b3ed790bbe433b53484331922
https://hal.inria.fr/tel-01405436v2/document
https://hal.inria.fr/tel-01405436v2/document
Autor:
Cogliati, Benoît-Michel
Publikováno v:
Cryptographie et sécurité [cs.CR]. Université Paris-Saclay, 2016. Français. ⟨NNT : 2016SACLV064⟩
Tweakable block ciphers are a generalization of classical block ciphers which, in addition to a key and a plaintext or a ciphertext, take an additionnal parameter called a tweak. The goal of this new parameter is to bring variability to the block cip
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::cd158e8b5338426d7a3dfcbc7cc775ab
https://tel.archives-ouvertes.fr/tel-01482669/file/70542_COGLIATI_2016_archivage.pdf
https://tel.archives-ouvertes.fr/tel-01482669/file/70542_COGLIATI_2016_archivage.pdf