Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Cyprien Delpech de Saint Guilhem"'
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031147906
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4c335f69dcfa33fe3aea96c9c402bbf0
https://doi.org/10.1007/978-3-031-14791-3_27
https://doi.org/10.1007/978-3-031-14791-3_27
Autor:
Luca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva, Benjamin Wesolowski
Publikováno v:
Advances in Cryptology-ASIACRYPT 2021
Lecture Notes in Computer Science ISBN: 9783030920678
Advances in Cryptology – ASIACRYPT 2021
Advances in Cryptology – ASIACRYPT 2021, 13093, Springer International Publishing, pp.249-278, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-92068-5_9⟩
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2021, Singapour, Singapore. pp.249-278, ⟨10.1007/978-3-030-92068-5_9⟩
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2021
Lecture Notes in Computer Science ISBN: 9783030920678
Advances in Cryptology – ASIACRYPT 2021
Advances in Cryptology – ASIACRYPT 2021, 13093, Springer International Publishing, pp.249-278, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-92068-5_9⟩
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2021, Singapour, Singapore. pp.249-278, ⟨10.1007/978-3-030-92068-5_9⟩
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2021
International audience; We present Séta, 11 a new family of public-key encryption schemes with post-quantum security based on isogenies of supersingular elliptic curves. It is constructed from a new family of trapdoor one-way functions, where the in
Publikováno v:
ACM CCS 2021
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
CCS
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
CCS
Secure multiparty generation of an RSA biprime is a challenging task, which increasingly receives attention, due to the numerous privacy-preserving applications that require it. In this work, we construct a new protocol for the RSA biprime generation
Publikováno v:
ACM CCS 2021
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
CCS
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
CCS
This work introduces a new interactive oracle proof system based on the MPC-in-the-Head paradigm. To improve concrete efficiency and offer flexibility between computation time and communication size, a generic proof construction based on multi-round
Publikováno v:
Advances in Cryptology-EUROCRYPT 2021
Lecture Notes in Computer Science ISBN: 9783030778699
EUROCRYPT (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2021
Lecture Notes in Computer Science ISBN: 9783030778699
EUROCRYPT (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2021
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block for almost all secure multiparty functionalities. The strongest security notion against malicious adversaries is universal composability (UC-secure). An imp
Autor:
Nigel P. Smart, Cyprien Delpech de Saint Guilhem, Karim Baghery, Emmanuela Orsini, Titouan Tanguy
Publikováno v:
Topics in Cryptology-CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
This paper introduces M-Circuits, a program representation which generalizes arithmetic and binary circuits. This new representation is motivated by the way modern multi-party computation (MPC) systems based on linear secret sharing schemes actually
Autor:
Daniel Kales, Greg Zaverucha, Peter Scholl, Carsten Baum, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2021
Baum, C, de Saint Guilhem, C D, Kales, D, Orsini, E, Scholl, P & Zaverucha, G 2021, Banquet : Short and Fast Signatures from AES . in J A Garay (ed.), Public-Key Cryptography – PKC 2021 : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I . Springer, Lecture Notes in Computer Science, vol. LNCS 12710, pp. 266-297, 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, Virtual, Online, 10/05/2021 . https://doi.org/10.1007/978-3-030-75245-3_11
Public-Key Cryptography – PKC 2021-24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I
Public-Key Cryptography – PKC 2021 ISBN: 9783030752446
Public Key Cryptography (1)
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2021
Baum, C, de Saint Guilhem, C D, Kales, D, Orsini, E, Scholl, P & Zaverucha, G 2021, Banquet : Short and Fast Signatures from AES . in J A Garay (ed.), Public-Key Cryptography – PKC 2021 : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I . Springer, Lecture Notes in Computer Science, vol. LNCS 12710, pp. 266-297, 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, Virtual, Online, 10/05/2021 . https://doi.org/10.1007/978-3-030-75245-3_11
Public-Key Cryptography – PKC 2021-24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I
Public-Key Cryptography – PKC 2021 ISBN: 9783030752446
Public Key Cryptography (1)
This work introduces Banquet, a digital signature scheme with post-quantum security, constructed using only symmetric-key primitives. The design is based on the MPC-in-head paradigm also used by Picnic (CCS 2017) and BBQ (SAC 2019). Like BBQ, Banquet
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6272fcecaac1e879ed9127a8ad1820c7
https://hdl.handle.net/11565/4054444
https://hdl.handle.net/11565/4054444
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030384708
SAC
Selected Areas in Cryptography – SAC 2019-26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Selected Areas in Cryptography – SAC 2019
SAC
Selected Areas in Cryptography – SAC 2019-26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Selected Areas in Cryptography – SAC 2019
This works studies the use of the AES block-cipher for Picnic-style signatures, which work in the multiparty-computation-in-the-head model. It applies advancements to arithmetic circuits for the computation of the AES S-box over multiparty computatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5d23b13fda0577ae288e40a3d1bf2e49
https://doi.org/10.1007/978-3-030-38471-5_27
https://doi.org/10.1007/978-3-030-38471-5_27
Publikováno v:
ISC 2017
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information Security
Lecture Notes in Computer Science ISBN: 9783319696584
ISC
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information Security
Lecture Notes in Computer Science ISBN: 9783319696584
ISC
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticated key exchange protocol from a two-move passively secure unauthenticated key agreement scheme (such as standard Diffie–Hellman or Frodo or NewHope)
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Post-Quantum Cryptography
Post-Quantum Cryptography-11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings
Post-Quantum Cryptography ISBN: 9783030442224
PQCrypto
Lecture Notes in Computer Science-Post-Quantum Cryptography
Post-Quantum Cryptography-11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings
Post-Quantum Cryptography ISBN: 9783030442224
PQCrypto
We introduce an efficient post-quantum signature scheme that relies on the one-wayness of the Legendre PRF. This “LEGendRe One-wAyness SignaTure” (LegRoast) builds upon the MPC-in-the-head technique to construct an efficient zero-knowledge proof,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::91f3f01d44176ebf832bda6705af6126