Cedric Tavernier - Academia.edu (original) (raw)

Uploads

Papers by Cedric Tavernier

Research paper thumbnail of Polynomial direct sum masking to protect against both SCA and FIA

Journal of Cryptographic Engineering, Aug 31, 2018

Side Channel Attacks (SCA) and Fault Injection Attacks (FIA) allow an opponent to have partial ac... more Side Channel Attacks (SCA) and Fault Injection Attacks (FIA) allow an opponent to have partial access to the internal behavior of the hardware. Since the end of the nineties, many works have shown that this type of attacks constitute a serious threat to cryptosystems implemented in embedded devices. In the state of the art, there exist several countermeasures to protect symmetric encryption (especially AES-128). Most of them protect only against one of these two attacks (SCA or FIA). A method called ODSM has been proposed to withstand SCA and FIA , but its implementation in the whole algorithm is a big open problem when no particular hardware protection is possible. In the present paper, we propose a practical masking scheme specifying ODSM which makes it possible to protect the symmetric encryption against these two attacks.

Research paper thumbnail of A constructive approach to multimedia codes with complete traceability resistant to δ-noise

Research paper thumbnail of A new code-based public-key cryptosystem resistant to quantum computer attacks

Journal of physics, Feb 1, 2019

We propose a new type of public-key cryptosystems (PKC) which is based on repetition of different... more We propose a new type of public-key cryptosystems (PKC) which is based on repetition of different error-correcting codes. We give a brief analysis of some well known attacks on code-based PKC, including structural ones and show that the scheme could be used as a perspective post-quantum PKC.

Research paper thumbnail of Combinatorial Unsourced Random Access Coding

2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)

Research paper thumbnail of Information transmission security method

Research paper thumbnail of Data encoding method

Research paper thumbnail of Method of Structuring a Database of Objects

Research paper thumbnail of A new code-based public-key cryptosystem resistant to quantum computer attacks

Journal of Physics: Conference Series, 2019

We propose a new type of public-key cryptosystems (PKC) which is based on repetition of different... more We propose a new type of public-key cryptosystems (PKC) which is based on repetition of different error-correcting codes. We give a brief analysis of some well known attacks on code-based PKC, including structural ones and show that the scheme could be used as a perspective post-quantum PKC.

Research paper thumbnail of Method for secures the transmission of information

Research paper thumbnail of Data Coding Method

Research paper thumbnail of Information Transmission Security Method

Research paper thumbnail of Data Encoding Method

Research paper thumbnail of An efficient certificateless key management architecture to solve IBE and PKI issues

Among the key management infrastructures, we distinguish certificate based infrastructure (public... more Among the key management infrastructures, we distinguish certificate based infrastructure (public key infrastructure (PKI), SPKI, PGP...) and IBE (Identity Based Encryption). Each one has its own advantages and disadvantages. For PKI, huge drawbacks come from the management of certificates, revocation, confidence...[8, 7]. Regarding the Boneh and Franklin’s IBE [6] two main drawbacks were: the key escrow problem and the fact that all the authority is attributed to a single entity which is the PKG (Private Key Generator) that could usurp the identity of each user. In this article we present a new key management architecture which combines the advantages of a PKI and Boneh and Franklin IBE scheme. This architecture is based on known mathematical operations on elliptic curves pairing (Optimal-Ate pairing [9] on the Barreto Naehrig curve [3]), and basic operations in finite fields.

Research paper thumbnail of Procede de codage de donnees

Procede de codage d'une information circulant dans un reseau comprenant au moins un nœud emet... more Procede de codage d'une information circulant dans un reseau comprenant au moins un nœud emetteur de l'information, un nœud destinataire, utilisant un systeme de chiffrement a cle publique, caracterise en ce qu'il comporte au moins les etapes suivantes : generer une cle publique en utilisant une matrice de generation de cle publique NG constituee de u colonnes et u lignes, un element d'une colonne ou d'une ligne etant un bloc forme par la matrice G de generation de code, et en executant l'operation suivante : soit Rl une matrice inversible aleatoire constituant une cle privee et RP une matrice obtenue par permutation aleatoire constituant une cle privee NG, la matrice la cle publique est donnee par la matrice PUK = Rl(multiplication matricielle par bloc) NG(multiplication matricielle)RP utiliser la cle privee et la cle publique obtenue pour coder et decoder les informations transmises dans le reseau.

Research paper thumbnail of Reed-Solomon codes and multi-path strategies to improve privacy performance over ad hoc networks

2008 3rd International Symposium on Wireless Pervasive Computing, 2008

This paper presents a privacy protection scheme, suitable for devices limited in CPU and/or in me... more This paper presents a privacy protection scheme, suitable for devices limited in CPU and/or in memory capabilities, which not only ensures anonymity and confidentiality but has also a limited impact on end-to-end network performance. Such an approach for anonymous communications, inspired by network coding techniques, benefits from recent improvements in list decoding algorithms for Reed-Solomon codes, and takes advantage of multi-path routing capabilities. The combination of these techniques is adapted for constrained and pervasive environments, such as wireless ad hoc networks, as it decreases the processing complexity of the cryptographic/decoding operations and as it ensures better tolerance to packet losses (due to mobility or to bad quality of the radio channel).

Research paper thumbnail of Testeurs, problemes de reconstruction univaries et multivaries, et application a la cryptanalyse du DES

Http Www Theses Fr, 2004

HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific re... more HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Research paper thumbnail of New Results - Étude et analyse de structures discrètes

Research paper thumbnail of On Bent and Semi-Bent Quadratic Boolean Functions

IEEE Transactions on Information Theory, 2005

Research paper thumbnail of Cryptanalysis of Block Ciphers via Decoding of Long Reed-Muller Codes

Research paper thumbnail of List decoding of Reed-Muller codes up to the Johnson bound with almost linear complexity

2006 IEEE International Symposium on Information Theory, 2006

A new deterministic list decoding algorithm is proposed for general Reed-Muller codes RM (s, m) o... more A new deterministic list decoding algorithm is proposed for general Reed-Muller codes RM (s, m) of length n = 2 m and distance d = 2 m−s. Given n and d, the algorithm performs beyond the bounded distance threshold of d/2 and has a low complexity order of nm s−1 for any decoding radius T that is less than the Johnson bound.

Research paper thumbnail of Polynomial direct sum masking to protect against both SCA and FIA

Journal of Cryptographic Engineering, Aug 31, 2018

Side Channel Attacks (SCA) and Fault Injection Attacks (FIA) allow an opponent to have partial ac... more Side Channel Attacks (SCA) and Fault Injection Attacks (FIA) allow an opponent to have partial access to the internal behavior of the hardware. Since the end of the nineties, many works have shown that this type of attacks constitute a serious threat to cryptosystems implemented in embedded devices. In the state of the art, there exist several countermeasures to protect symmetric encryption (especially AES-128). Most of them protect only against one of these two attacks (SCA or FIA). A method called ODSM has been proposed to withstand SCA and FIA , but its implementation in the whole algorithm is a big open problem when no particular hardware protection is possible. In the present paper, we propose a practical masking scheme specifying ODSM which makes it possible to protect the symmetric encryption against these two attacks.

Research paper thumbnail of A constructive approach to multimedia codes with complete traceability resistant to δ-noise

Research paper thumbnail of A new code-based public-key cryptosystem resistant to quantum computer attacks

Journal of physics, Feb 1, 2019

We propose a new type of public-key cryptosystems (PKC) which is based on repetition of different... more We propose a new type of public-key cryptosystems (PKC) which is based on repetition of different error-correcting codes. We give a brief analysis of some well known attacks on code-based PKC, including structural ones and show that the scheme could be used as a perspective post-quantum PKC.

Research paper thumbnail of Combinatorial Unsourced Random Access Coding

2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)

Research paper thumbnail of Information transmission security method

Research paper thumbnail of Data encoding method

Research paper thumbnail of Method of Structuring a Database of Objects

Research paper thumbnail of A new code-based public-key cryptosystem resistant to quantum computer attacks

Journal of Physics: Conference Series, 2019

We propose a new type of public-key cryptosystems (PKC) which is based on repetition of different... more We propose a new type of public-key cryptosystems (PKC) which is based on repetition of different error-correcting codes. We give a brief analysis of some well known attacks on code-based PKC, including structural ones and show that the scheme could be used as a perspective post-quantum PKC.

Research paper thumbnail of Method for secures the transmission of information

Research paper thumbnail of Data Coding Method

Research paper thumbnail of Information Transmission Security Method

Research paper thumbnail of Data Encoding Method

Research paper thumbnail of An efficient certificateless key management architecture to solve IBE and PKI issues

Among the key management infrastructures, we distinguish certificate based infrastructure (public... more Among the key management infrastructures, we distinguish certificate based infrastructure (public key infrastructure (PKI), SPKI, PGP...) and IBE (Identity Based Encryption). Each one has its own advantages and disadvantages. For PKI, huge drawbacks come from the management of certificates, revocation, confidence...[8, 7]. Regarding the Boneh and Franklin’s IBE [6] two main drawbacks were: the key escrow problem and the fact that all the authority is attributed to a single entity which is the PKG (Private Key Generator) that could usurp the identity of each user. In this article we present a new key management architecture which combines the advantages of a PKI and Boneh and Franklin IBE scheme. This architecture is based on known mathematical operations on elliptic curves pairing (Optimal-Ate pairing [9] on the Barreto Naehrig curve [3]), and basic operations in finite fields.

Research paper thumbnail of Procede de codage de donnees

Procede de codage d'une information circulant dans un reseau comprenant au moins un nœud emet... more Procede de codage d'une information circulant dans un reseau comprenant au moins un nœud emetteur de l'information, un nœud destinataire, utilisant un systeme de chiffrement a cle publique, caracterise en ce qu'il comporte au moins les etapes suivantes : generer une cle publique en utilisant une matrice de generation de cle publique NG constituee de u colonnes et u lignes, un element d'une colonne ou d'une ligne etant un bloc forme par la matrice G de generation de code, et en executant l'operation suivante : soit Rl une matrice inversible aleatoire constituant une cle privee et RP une matrice obtenue par permutation aleatoire constituant une cle privee NG, la matrice la cle publique est donnee par la matrice PUK = Rl(multiplication matricielle par bloc) NG(multiplication matricielle)RP utiliser la cle privee et la cle publique obtenue pour coder et decoder les informations transmises dans le reseau.

Research paper thumbnail of Reed-Solomon codes and multi-path strategies to improve privacy performance over ad hoc networks

2008 3rd International Symposium on Wireless Pervasive Computing, 2008

This paper presents a privacy protection scheme, suitable for devices limited in CPU and/or in me... more This paper presents a privacy protection scheme, suitable for devices limited in CPU and/or in memory capabilities, which not only ensures anonymity and confidentiality but has also a limited impact on end-to-end network performance. Such an approach for anonymous communications, inspired by network coding techniques, benefits from recent improvements in list decoding algorithms for Reed-Solomon codes, and takes advantage of multi-path routing capabilities. The combination of these techniques is adapted for constrained and pervasive environments, such as wireless ad hoc networks, as it decreases the processing complexity of the cryptographic/decoding operations and as it ensures better tolerance to packet losses (due to mobility or to bad quality of the radio channel).

Research paper thumbnail of Testeurs, problemes de reconstruction univaries et multivaries, et application a la cryptanalyse du DES

Http Www Theses Fr, 2004

HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific re... more HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Research paper thumbnail of New Results - Étude et analyse de structures discrètes

Research paper thumbnail of On Bent and Semi-Bent Quadratic Boolean Functions

IEEE Transactions on Information Theory, 2005

Research paper thumbnail of Cryptanalysis of Block Ciphers via Decoding of Long Reed-Muller Codes

Research paper thumbnail of List decoding of Reed-Muller codes up to the Johnson bound with almost linear complexity

2006 IEEE International Symposium on Information Theory, 2006

A new deterministic list decoding algorithm is proposed for general Reed-Muller codes RM (s, m) o... more A new deterministic list decoding algorithm is proposed for general Reed-Muller codes RM (s, m) of length n = 2 m and distance d = 2 m−s. Given n and d, the algorithm performs beyond the bounded distance threshold of d/2 and has a low complexity order of nm s−1 for any decoding radius T that is less than the Johnson bound.