Zobrazeno 1 - 10
of 573
pro vyhledávání: '"VAUDENAY, SERGE"'
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error correction. This requires assigning an acceptable threshold for the number
Externí odkaz:
http://arxiv.org/abs/1009.0278
Publikováno v:
The Computer Journal. 66:987-1016
To mitigate state exposure threats to long-lived instant messaging sessions, ratcheting was introduced, which is used in practice in protocols like Signal. However, existing ratcheting protocols generally come with a high cost. Recently, Caforio et a
Publikováno v:
In Computers & Security September 2014 45:199-209
Publikováno v:
Computer Journal; Apr2023, Vol. 66 Issue 4, p987-1016, 30p
Autor:
Tran, Bénédikt, Vaudenay, Serge
Publikováno v:
Progress in Cryptology-AFRICACRYPT 2022 ISBN: 9783031174322
The Learning Parity with Noise (LPN) problem is a famous cryptographic problem consisting in recovering a secret from noised samples. This problem is usually solved via reduction techniques, that is, one reduces the original instance to a smaller one
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b2361a481b48acb75b59d2c3335cf931
https://doi.org/10.1007/978-3-031-17433-9_13
https://doi.org/10.1007/978-3-031-17433-9_13
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920777
We propose a new construction for format-preserving encryption. Our design provides the flexibility for use in format-preserving encryption (FPE) and for static table-driven tokenization. Our algorithm is a substitution-permutation network based on r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::157fc942932bdf167b6bac4b591a5f1f
https://doi.org/10.1007/978-3-030-92078-4_16
https://doi.org/10.1007/978-3-030-92078-4_16
In self-encryption, a device encrypts some piece of information for itself to decrypt in the future. We are interested in security of self-encryption when the state occasionally leaks. Applications that use self-encryption include cloud storage, when
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2ff3927e25b2a81279114675dee9843d
Autor:
VAUDENAY, SERGE, VUAGNOUX, MARTIN
Publikováno v:
Digital Threats: Research & Practice; Sep2022, Vol. 3 Issue 3, p1-17, 17p
Autor:
Boutet, Antoine, Castelluccia, Claude, Cunche, Mathieu, Dmitrienko, Alexandra, Iovino, Vincenzo, Miettinen, Markus, Nguyen, Thien, Roca, Vincent, Sadeghi, Ahmad-Reza, Vaudenay, Serge, Visconti, Ivan, Vuagnoux, Martin
Publikováno v:
[University works] EPFL, Switzerland; Inria, France; JMU Würzburg, Germany; University of Salerno, Italy; base23, Geneva, Switzerland; Technical University of Darmstadt, Germany. 2020
Many countries have introduced digital contact tracing apps to fight the COVID-19 pandemic. Such apps help to identify contacts between potentially infectious persons automatically and thus bear the promise of reducing the burden on manual contact tr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::6033c26871f043683ad0843a3c62341b
https://hal.inria.fr/hal-03116024
https://hal.inria.fr/hal-03116024