Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Jean-Christophe Deneuville"'
Autor:
Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz
Publikováno v:
Code-Based Cryptography ISBN: 9783031296888
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6b389fe7888c1eb75601b9a6a9c27de9
https://doi.org/10.1007/978-3-031-29689-5_4
https://doi.org/10.1007/978-3-031-29689-5_4
Publikováno v:
IEEE Communications Letters. 25:2829-2833
We propose an attack on the recent attempt by Li, Xing and Yeo to produce a code-based signature scheme using the Schnorr-Lyubashevsky approach in the Hamming metric, and verify its effectiveness through numerical simulations. Differently from other
Publikováno v:
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, 2022, pp.1-1. ⟨10.1109/TIT.2022.3168439⟩
IEEE Transactions on Information Theory, 2022, pp.1-1. ⟨10.1109/TIT.2022.3168439⟩
International audience; In this paper we introduce Ouroboros, a new family of Key Exchange protocols based on coding theory. The protocols propose a middle ground between the cryptosystems based on QC-MDPC codes, which feature small parameter sizes,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1d2f72d245f91511ccfd9470cf293cd0
https://hal-enac.archives-ouvertes.fr/hal-03679752
https://hal-enac.archives-ouvertes.fr/hal-03679752
Publikováno v:
Designs, Codes and Cryptography
Designs, Codes and Cryptography, Springer Verlag, 2020, ⟨10.1007/s10623-020-00737-8⟩
Designs, Codes and Cryptography, Springer Verlag, 2020, ⟨10.1007/s10623-020-00737-8⟩
International audience; In 2012, Lyubashevsky introduced a new framework for building lattice-based signature schemes without resorting to any trapdoor (such as GPV [6] or NTRU [7]). The idea is to sample a set of short lattice elements and construct
Autor:
Jean-Christophe Deneuville, Terry Shue Chien Lau, Chik How Tan, Olivier Blazy, Philippe Gaborit, Keita Xagawa, Nicolas Aragon
Publikováno v:
Designs, Codes and Cryptography
Designs, Codes and Cryptography, Springer Verlag, 2020, 88 (4), pp.643-653. ⟨10.1007/s10623-019-00702-0⟩
Designs, Codes and Cryptography, Springer Verlag, 2020, 88 (4), pp.643-653. ⟨10.1007/s10623-019-00702-0⟩
International audience; Following Schnorr framework for obtaining digital signatures, Song et al. recently proposed a new instantiation of a signature scheme featuring small public keys from coding assumptions in rank metric, which was accepted at PK
Many threshold systems require some kind of secret sharing during their set-up phase. There has been several recent work in doing secret sharing in a distributed manner through the use of Blockchain so that one does not have to rely on trusted third
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a027021e1bd2c68b37a6e17168e6057
https://oatao.univ-toulouse.fr/29332/
https://oatao.univ-toulouse.fr/29332/
Autor:
Nicolas Aragon, Marco Baldi, Jean-Christophe Deneuville, Karan Khathuria, Edoardo Persichetti, Paolo Santini
We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in the SHMWW scheme contains columns coming in part from an identity mat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::57ed6867f983a7bc9931cf8d7877c949
https://hal-enac.archives-ouvertes.fr/hal-03034660
https://hal-enac.archives-ouvertes.fr/hal-03034660
Autor:
Jean-Christophe Deneuville
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.The 8 papers presented in this volume were carefully reviewed and selected
Autor:
Jérôme Lacan, Hassan Jameel Asghar, Marina Dehez-Clementi, Dali Kaafar, Jean-Christophe Deneuville
Publikováno v:
CBT 2020, 4th International Workshop on Cryptocurrencies and Blockchain Technology
CBT 2020, 4th International Workshop on Cryptocurrencies and Blockchain Technology, Sep 2020, Guildford, United States. pp.437-446, ⟨10.1007/978-3-030-66172-4_28⟩
Lecture Notes in Computer Science ISBN: 9783030661717
DPM/CBT@ESORICS
CBT 2020, 4th International Workshop on Cryptocurrencies and Blockchain Technology, Sep 2020, Guildford, United States. pp.437-446, ⟨10.1007/978-3-030-66172-4_28⟩
Lecture Notes in Computer Science ISBN: 9783030661717
DPM/CBT@ESORICS
Over the past two decades, group signature schemes have been developed and used to enable authenticated and anonymous peer-to-peer communications. Initial protocols rely on two main authorities, Issuer and Opener, which are given substantial capabili
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eddc8b3fdc91836c529eae2d54cbfaa3
https://hal-enac.archives-ouvertes.fr/hal-03094641/document
https://hal-enac.archives-ouvertes.fr/hal-03094641/document
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030314996
DPM/CBT@ESORICS
DPM/CBT@ESORICS
Cryptocurrencies enable users to send and receive value in a trust-less manner. Unfortunately trading the associated assets usually happens on centralized exchange which becomes a trusted third party. This defeats the purpose of a trust-less system.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0e0799a5be901664e82ed7f0df437d5d
https://doi.org/10.1007/978-3-030-31500-9_14
https://doi.org/10.1007/978-3-030-31500-9_14