Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Rotella, Yann"'
Autor:
Rotella, Yann
Dans cette thèse, nous étudions la sécurité de primitives cryptographiques. Ces systèmes sont fondés sur des transformations utilisant des objets mathématiques représentés de multiples manières. Nous utilisons alors certaines structures inh
Externí odkaz:
http://www.theses.fr/2018SORUS092/document
Publikováno v:
Journées codage et cryptographie 2017
Journées codage et cryptographie 2017, Apr 2017, La Bresse, France. pp.1
Journées codage et cryptographie 2017, Apr 2017, La Bresse, France. pp.1
National audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::e3633a88f3463446a59369501820a5a8
https://hal.inria.fr/hal-01633519/document
https://hal.inria.fr/hal-01633519/document
Publikováno v:
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology, 2018, 2018 (1), pp.29-56. ⟨10.13154/tosc.v2018.i1.29-56⟩
IACR Trans. Symmetric Cryptol.
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2018, 2018 (1), pp.29-56. ⟨10.13154/tosc.v2018.i1.29-56⟩
IACR Transactions on Symmetric Cryptology, Pp 29-56 (2018)
IACR Transactions on Symmetric Cryptology; Volume 2018, Issue 1; 29-56
IACR Transactions on Symmetric Cryptology, 2018, 2018 (1), pp.29-56. ⟨10.13154/tosc.v2018.i1.29-56⟩
IACR Trans. Symmetric Cryptol.
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2018, 2018 (1), pp.29-56. ⟨10.13154/tosc.v2018.i1.29-56⟩
IACR Transactions on Symmetric Cryptology, Pp 29-56 (2018)
IACR Transactions on Symmetric Cryptology; Volume 2018, Issue 1; 29-56
In this article we study the security of the authenticated encryption algorithm Ketje against divide-and-conquer attacks. Ketje is a third-round candidate in the ongoing CAESAR competition, which shares most of its design principles with the SHA-3 ha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bbcd74909ade4d78b6eb1905f33cd452
Publikováno v:
Symmetric Cryptography (Dagstuhl Seminar 18021)
Dagstuhl Seminar 18021 Symmetric Cryptography
Dagstuhl Seminar 18021 Symmetric Cryptography, Jan 2018, Dagstuhl, Germany. ⟨10.4230/DagRep.8.1.1⟩
Dagstuhl Seminar 18021 Symmetric Cryptography
Dagstuhl Seminar 18021 Symmetric Cryptography, Jan 2018, Dagstuhl, Germany. ⟨10.4230/DagRep.8.1.1⟩
International audience; This report documents the program and the outcomes of Dagstuhl Seminar 18021 "Symmetric Cryptography", which was held on January 7-12, 2018 in Schloss Dagstuhl-Leibniz Center for Informatics. The seminar was the sixth in a ser
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::0128f01febb9887ea3eee7219588d338
https://hal.archives-ouvertes.fr/hal-01953975
https://hal.archives-ouvertes.fr/hal-01953975
Autor:
Ashur, T., Eichlseder, M., Lauridsen, M.M., Leurent, G., Minaud, B., Rotella, Yann, Sasaki, Yu, Viguier, B.G.P., Peyrin, T., Galbraith, S.D.
Publikováno v:
Peyrin, T.; Galbraith, S.D. (ed.), Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, pp. 35-64
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. pp.35-64, ⟨10.1007/978-3-030-03329-3_2⟩
Peyrin, T.; Galbraith, S.D. (ed.), Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 35-64. Cham : Springer
STARTPAGE=35;ENDPAGE=64;ISSN=0302-9743;TITLE=Peyrin, T.; Galbraith, S.D. (ed.), Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030033286
ASIACRYPT (2)
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. pp.35-64, ⟨10.1007/978-3-030-03329-3_2⟩
Peyrin, T.; Galbraith, S.D. (ed.), Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 35-64. Cham : Springer
STARTPAGE=35;ENDPAGE=64;ISSN=0302-9743;TITLE=Peyrin, T.; Galbraith, S.D. (ed.), Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030033286
ASIACRYPT (2)
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, and recently selected as a finalist. There are three versions of MORUS: MORUS-640 with a 128-bit key, and MORUS-1280 with 128-bit or 256-bit keys. For
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::216f8f3cdef388bbed1caef4fb8d544c
https://hdl.handle.net/2066/200769
https://hdl.handle.net/2066/200769
Autor:
Couteau, Geoffroy, Dupin, Aurélien, Méaux, Pierrick, Rossi, Melissa, Rotella, Yann, 24th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2018)
Publikováno v:
Advances in Cryptology-ASIACRYPT 2018-Proceedings, Vol. 2018, no.Part II, p. 96-124 (2018)
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. pp.96-124, ⟨10.1007/978-3-030-03329-3_4⟩
Dynamics and Control of Industrial Cranes
Lecture Notes in Computer Science ISBN: 9783030033286
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2018
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. pp.96-124, ⟨10.1007/978-3-030-03329-3_4⟩
Dynamics and Control of Industrial Cranes
Lecture Notes in Computer Science ISBN: 9783030033286
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2018
International audience; Local pseudorandom generators allow to expand a short random string into a long pseudo-random string, such that each output bit depends on a constant number d of input bits. Due to its extreme efficiency features, this intrigu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ffb371cc030b2cb1e8cfae5db1953c99
https://hdl.handle.net/2078.1/210996
https://hdl.handle.net/2078.1/210996
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 192-227 (2017)
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2017, 2017 (3), pp.192--227. ⟨10.13154/tosc.v2017.i3.192-227⟩
IACR Transactions on Symmetric Cryptology, 2017, 2017 (3), pp.192--227. ⟨10.13154/tosc.v2017.i3.192-227⟩
IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 3; 192-227
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2017, 2017 (3), pp.192--227. ⟨10.13154/tosc.v2017.i3.192-227⟩
IACR Transactions on Symmetric Cryptology, 2017, 2017 (3), pp.192--227. ⟨10.13154/tosc.v2017.i3.192-227⟩
IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 3; 192-227
We study the main cryptographic features of Boolean functions (balancedness, nonlinearity, algebraic immunity) when, for a given number n of variables, the input to these functions is restricted to some subset E of 𝔽n2. We study in particular the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8b331973164e4cd3ec24863d8199d07e
https://tosc.iacr.org/index.php/ToSC/article/view/771
https://tosc.iacr.org/index.php/ToSC/article/view/771
Publikováno v:
BFA 2017-Boolean Functions and their Applications
BFA 2017-Boolean Functions and their Applications, Jul 2017, Os, Norway
BFA 2017-Boolean Functions and their Applications, Jul 2017, Os, Norway
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::720ba9effebd889302f61f38b36f4fe2
https://hal.inria.fr/hal-01649990
https://hal.inria.fr/hal-01649990
Publikováno v:
ESC 2017-Early Symmetric Crypto
ESC 2017-Early Symmetric Crypto, Jan 2017, Canach, Luxembourg
ESC 2017-Early Symmetric Crypto, Jan 2017, Canach, Luxembourg
International audience; Many lightweight block ciphers use a very simple key-schedule where the round-keys only differ by a round-constant. However, several of those schemes were recently broken using invariant attacks, i.e. invariant subspace attack
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::e755bddf709eaeece3671a28a2a2d548
https://hal.inria.fr/hal-01649994/document
https://hal.inria.fr/hal-01649994/document
Autor:
Canteaut, Anne, Rotella, Yann
Publikováno v:
Journées codage et cryptographie 2015
Journées codage et cryptographie 2015, Oct 2015, La Londe-les-Maures, France
Journées codage et cryptographie 2015, Oct 2015, La Londe-les-Maures, France
National audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::ae1917d11c2ec655bd25f65e018cb912
https://hal.inria.fr/hal-01240743
https://hal.inria.fr/hal-01240743