Contents
Academic literature on the topic 'Calcul – Authentification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Calcul – Authentification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Calcul – Authentification"
Nabeneza, Serge, Vincent Porphyre, and Fabrice Davrieux. "Caractérisation des miels de l’océan Indien par spectrométrie proche infrarouge : étude de faisabilité." Revue d’élevage et de médecine vétérinaire des pays tropicaux 67, no. 3 (June 27, 2015): 130. http://dx.doi.org/10.19182/remvt.10181.
Full textDissertations / Theses on the topic "Calcul – Authentification"
Varrette, Sébastien. "Sécurité des architectures de calcul distribué : authentification et certification de résultats." Grenoble INPG, 2007. http://www.theses.fr/2007INPG0103.
Full textSince their advent in the 90s, distributed computing platforms known as grids focus more and more research interests. This phD thesis deals with authentication and integrity issues on such architectures. Coneerning the fiist tapie, we deseribe and justify the construction of an authentication system adapted to cluster grids and validated sin ce 2005 on the Grid'5000 platform. Our contribution in the field of integrity is related to the correctness certification of parallel executions through result checking. Using an abstract representation of a parallel execution called macro-dataflow graph, partial duplication mechanisms are extended to provide probabilistic certification algorithms that are particularly efficient on trees and Fork-Join graphs. Such graphs appear frequently met in distributed computing as they represent the execution of Divide & Conquer algorithms. Our contributions are finally confronted in a medical application of image-based computer assisted diagnosis
Keuffer, Julien. "Calcul vérifiable et vérification biométrique." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS156.
Full textThis thesis deals with the notion of verifiable computation, which aims at adding a proof of correctness to the result of a computation. Besides, verifying the proof should be more efficient than executing it. Verifiable computation protocols pave the way for delegation of computations to an untrusted party. The first part of this thesis introduces the background required to understand the most important verifiable computation protocols and describes their construction. Many protocols have been proposed since 2012 and some are nearly practical, but the prover often lacks efficiency. Even though several specialized protocols are very efficient, it seems more appropriate to consider protocols that can verify a large class of computations, in order to avoid the multiplications of proofs for each sub-computation. In the second part of this thesis, we leverage proof composition to obtain a non-interactive verifiable computation protocol with a more efficient prover while keeping the expressiveness of the scheme. Some of the existing verifiable computation systems reach additional properties and provide zero-knowledge for the proof with little overhead for the prover. We propose two applications that leverage this property to design new primitives. This first one enables to modify a signed document while keeping a form of authenticity. The second one allows for a privacy-preserving biometric authentication
Kourjieh, Mounira. "Analyse logique et vérification des protocoles cryptographiques." Toulouse 3, 2009. http://thesesups.ups-tlse.fr/781/.
Full textThis thesis is developed in the framework of symbolic analysis of cryptographic protocols. The contributions of this thesis can be split into three mains parts: 1- We analyse the three classes of cryptographic protocols using respectively collision vulnerable hash functions, key substitution vulnerable digital signature schemes, and cryptographic primitives represented by convergent equational theories having the finite variant property. A- We conjecture that the verification problem of the first class of protocols can be reduced to the verification problem of the class of cryptographic protocols using an associative symbol of concatenation, and we show the decidability of the verification problem for the last class. B- We show the decidability of the verification problem for the second two classes of protocols. 2- We show the decidability of the ground entailment problem for a new fragment of first order logic, and we show the application of this result on the verification problem of cryptographic protocols. 3- We analyse the electronic-voting protocols, and we give a formal definition for the voter-verifiability property. We also show that some well-known electronic voting protocols satisfy this property
Leurent, Gaëtan. "Construction et Analyse de fonctions de Hachage." Paris 7, 2010. http://www.theses.fr/2010PA077124.
Full textHash fonctions are cryptographic fonctions with no structural properties. It is an essential primitive in modem cryptography, used in many protocols and standards, including signature schemes, authentication codes, and key derivation. Hash fonction study is a very active topic currently because of the SHA-3 competition. This competition is organised by NIST to select a new hash fonction standard, after devastating attacks against the most widely used hash fonction : MD4, MD5, and SHA-1. My work has been organized around this competition. In the part, I studied the new attacks of Wang et. Al. Against MD4 and MD5. 1 describe some improvements of these attacks, and new applications to higher-level constructions. In the second part, I describe a new hash fonction, SIMD, which has been submitted to NIST for the SHA-3 competition. The design of SIMD follows ideas from the MD4 family, but I used my knowledge of this family to make it resistant to most attacks. Finally, in the third part, I describe new attacks against SHA-3 candidates. I describe new attacks techniques which are general enough to apply to several hash fonctions or block ciphers. Thus, this thesis covers the two main realms of symmetric cryptography: design and analysis
Hussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.
Full textRecently, the 3rd Group Project Partnership (3GPP) has developed Long Term Evolution/ Long Term Evolution-Advanced (LTE/LTE-A) systems which have been approved by the International Telecommunication Union (ITU) as 4th Generation (4G) mobile telecommunication networks. Security is one of critical issues which should be handled carefully to protect user's and mobile operator's information. Thus, the 3GPP has standardized algorithms and protocols in order to secure the communications between different entities of the mobile network. However, increasing the security level in such networks should not compel heavy constrains on these networks such as complexity and energy. Indeed, energy efficiency has become recently a critical need for mobile network operators for reduced carbon emissions and operational costs. The security services in mobile networks such as authentication, data confidentiality and data integrity are mostly performed using cryptographic techniques.However, most of the standardized solutions already adopted by the3GPP depend on encryption algorithms which possess high computational complexity which in turn contributes in consuming further energy at the different network communication parties.Data confidentiality which mainly refers to the protection of the user’s information privacy is achieved at the Packet Data Convergence Protocol (PDCP) sub-layer in the LTE/LTE-A protocol stack by one of the three standardized algorithms (EEA1, EEA2 and EEA3). However, each of the three algorithms requires high computational complexity since they rely on Shannon’s theory of encryption algorithms by applying confusion and diffusion for several rounds. In our thesis we propose a novel confidentiality algorithm using the concept of substitution and diffusion in which the required security level is attained in only one round. Consequently the computational complexity is considerably reduced which in return results in reducing the energy consumption during both encryption and decryption procedures. Similarly, the same approach is used to reduce the complexity of 3GPP data integrity algorithms (EIA1, EIA2 and EIA3) which the core cipher rely on the same complex functions. Finally, we investigate in this thesis the authentication issue in Device to Device paradigms proposal in 4G systems. Device to Device communications refer to direct communications between two mobile devices without passing through the core network. They constitute a promising mean to increase the performance and reduce energy consumptions in LTE/LTE-A networks. In such context, the authentication and key derivation between two mobile devices have not been well investigated. Thus, a novel lightweight authentication and key derivation protocol is proposed to authenticate two communicating devices during session establishments as well as deriving necessary keys for both data encryption and integrity protection
Peyrin, Thomas. "Analyse de fonctions de hachage cryptographiques." Versailles-St Quentin en Yvelines, 2008. http://www.theses.fr/2008VERS0010.
Full textHash functions are one of the most useful primitives in cryptography, for example in authentication or message integrity solutions. Even if we also sat ourselves in the design side during this research time, we will mostly concentrate on hash functions cryptanalysis in this thesis. Firstly, we study and extend recent attacks on the standardized hash functions from the SHA family, by far the most utilized candidate in practice. We present the best known practical attacks against SHA-0 and SHA-1. Then, we describe the first algorithm that finds collisions for the GRINDAHL family of hash functions, a new candidate based on innovative design concepts. Finally, we analyse the hash function FORK-256 and show that it can not be considered as cryptographically strong
Zimmer, Sébastien. "Mécanismes cryptographiques pour la génération de clefs et l'authentification." Phd thesis, Ecole Polytechnique X, 2008. http://pastel.archives-ouvertes.fr/pastel-00004271.
Full text