Affordable Access

Advances in public-key cryptology and computer exploitation

Authors
  • Géraud, Rémi
Publication Date
Sep 05, 2017
Source
HAL-UPMC
Keywords
Language
English
License
Unknown
External links

Abstract

Information security relies on the correct interaction of several abstraction layers: hardware, operating systems, algorithms, and networks. However, protecting each component of the technological stack has a cost; for this reason, many devices are left unprotected or under-protected. This thesis addresses several of these aspects, from a security and cryptography viewpoint. To that effect we introduce new cryptographic algorithms (such as extensions of the Naccache–Stern encryption scheme), new protocols (including a distributed zero-knowledge identification protocol), improved algorithms (including a new error-correcting code, and an efficient integer multiplication algorithm), as well as several contributions relevant to information security and network intrusion. Furthermore, several of these contributions address the performance of existing and newly-introduced constructions.

Report this publication

Statistics

Seen <100 times