Des systèmes de numération pour le calcul modulaire
Le calcul modulaire est utilisé dans de nombreuses applications des mathématiques...
Mon compte
Pas encore inscrit ?
Le calcul modulaire est utilisé dans de nombreuses applications des mathématiques...
Exposé de Vanessa Vitse (Institut Fourier) : Nombres de Sophie Germain et codes secrets
Information Structures for Privacy and Fairness
This seminar will talk about some of the privacy risks of these systems and will describe some recent attacks. It will also discuss why they sometimes fail to deliver. Finally, we will also show that
Dans cet exposé, Daniel Augot, aborde à partir du petit jeu Marienbad et la fonction "ou exclusif", les mécanismes algébriques et algorithmiques qui fondent les mécanismes de chiffrage et de codage
In this session, we will talk about another family of codes that have an efficient decoding algorithm: the Goppa codes. One limitation of the generalized Reed-Solomon codes is the fact that the
In this session, we will present the Stern algorithm for decoding. In fact, the idea is to combine two algorithms that we have seen before, the Lee and Brickell algorithm and the Birthday Decoding.
In this session, we will have a look at the attacks against the CFS signature scheme. As for public-key encryption, there are two kinds of attacks against signature schemes. First kind of attack is
Les mots de passe sont partout en informatique. Ils sont la principale défense offerte à tous les utilisateurs d'Internet (de l'expert au néophyte) pour protéger leurs informations (vos mails ou
This is the last session of the first week of this MOOC. We have already all the ingredients to talk about code-based cryptography. Recall that in 1976 Diffie and Hellman published their famous
So, with the session 7 we are entering the most advanced part of that course. The idea of what I called the Improved Birthday Decoding is to use the so-called "representation technique" introduced
In this session, I will present a variant of the CFS signature scheme called parallel-CFS. We start from a simple question: what happens if you try to use two different hash functions and compute
À l'ère du tout connecté, la question de la sécurité de nos données personnelles est devenue primordiale. Comment faire pour garder le contrôle de nos données ? Comment déjouer les pièges de plus en