Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Sonia Bogos"'
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030783747
ACNS (2)
ACNS (2)
Due to the rapidly growing number of devices that need to communicate securely, there is still significant interest in the development of efficient encryption schemes. It is important to maintain a portfolio of different constructions in order to ena
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::88dc5410f0db103f6858b53c6760e246
https://doi.org/10.1007/978-3-030-78375-4_9
https://doi.org/10.1007/978-3-030-78375-4_9
Publikováno v:
Cryptography and Communications. 8:331-369
The Learning Parity with Noise problem (L P N) is appealing in cryptography as it is considered to remain hard in the post-quantum world. It is also a good candidate for lightweight devices due to its simplicity. In this paper we provide a comprehens
Autor:
Sonia Bogos, Serge Vaudenay
Publikováno v:
Advances in Cryptology – ASIACRYPT 2016 ISBN: 9783662538869
ASIACRYPT (1)
ASIACRYPT (1)
In this article we focus on constructing an algorithm that automatizes the generation of \(\mathsf {LPN}\) solving algorithms from the considered parameters. When searching for an algorithm to solve an \(\mathsf {LPN}\) instance, we make use of the e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::23272e266fbfc0d84d9ad6bc129cbbeb
https://doi.org/10.1007/978-3-662-53887-6_26
https://doi.org/10.1007/978-3-662-53887-6_26
Autor:
Sonia Bogos, Serge Vaudenay
Publikováno v:
International Journal of Communications, Network and System Sciences. :834-838
In this article we present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in [1]. We show how, based on the relation between the public and private key, we can construct an attack which allows any passive adversary to decrypt th
Autor:
Sonia Bogos, Serge Vaudenay
Publikováno v:
Advances in Cryptology – ASIACRYPT 2015 ISBN: 9783662487990
ASIACRYPT (2)
ASIACRYPT (2)
We assume a scenario where an attacker can mount several independent attacks on a single CPU. Each attack can be run several times in independent ways. Each attack can succeed after a given number of steps with some given and known probability. A nat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d0226ebca5e962b1e02299e6c5f54a10
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783642389795
ACNS
ACNS
Factoring based public key cryptosystems have an overall complexity which is dominated by the key production algorithm which requires the generation of prime numbers. This is most inconvenient in settings where the key generation is not an one off pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::68f9fae93aeb5e45ca181b368ba78b66
https://doi.org/10.1007/978-3-642-38980-1_35
https://doi.org/10.1007/978-3-642-38980-1_35
Homomorphic encryption allows to make specific operations on private data which stays encrypted. While applications such as cloud computing require to have a practical solution, the encryption scheme must be secure. In this article, we detail and ana
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dfc31999310de92847f32990b27dee04
https://infoscience.epfl.ch/record/258609
https://infoscience.epfl.ch/record/258609