Academic literature on the topic 'Génération de paramètres cryptographiques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Génération de paramètres cryptographiques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Génération de paramètres cryptographiques"
Caron, Jean, Michel Tousignant, Duncan Pedersen, Marie-Josée Fleury, Margaret Cargo, Mark Daniel, Yan Kestin, et al. "La création d’une nouvelle génération d’études épidémiologiques en santé mentale." Santé mentale au Québec 32, no. 2 (March 25, 2008): 225–38. http://dx.doi.org/10.7202/017808ar.
Full textKabouya, M., and C. Michel. "Estimation des ressources en eau superficielle aux pas de temps mensuel et annuel, application à un pays semi-aride." Revue des sciences de l'eau 4, no. 4 (April 12, 2005): 569–87. http://dx.doi.org/10.7202/705116ar.
Full textGaddour, A., S. Najari, and M. Ouni. "Amélioration de la production laitière caprine par le croisement d’absorption dans une oasis du Sud tunisien." Revue d’élevage et de médecine vétérinaire des pays tropicaux 61, no. 1 (January 1, 2008): 57. http://dx.doi.org/10.19182/remvt.10014.
Full textDeblock, Christian, and Guy-Philippe Wells. "Coopération réglementaire et accords de commerce." Études internationales 48, no. 3-4 (April 16, 2018): 319–45. http://dx.doi.org/10.7202/1044623ar.
Full textLascoup, Bertrand, Zoheir Aboura, Kamel Khellil, and Malk Benzeggagh. "Structures sandwich composites 3D de nouvelle génération Incidence des paramètres structuraux de couture sur le comportement mécanique." Revue des composites et des matériaux avancés 16, no. 3 (December 23, 2006): 279–304. http://dx.doi.org/10.3166/rcma.16.279-304.
Full textBoudjaaba, Fabrice. "Mesurer la mobilité sans registre de population en France au xixe siècle : l’apport des registres de successions à l’étude des migrations des ruraux." Articles 41, no. 1 (November 6, 2012): 9–35. http://dx.doi.org/10.7202/1012978ar.
Full textKamga, P., J. N. Mbanya, N. R. Awah, Y. Mbohou, Y. Manjeli, A. Nguemdjom, B. Kamba Pamela, et al. "Effets de la saison de vêlage et de quelques paramètres zootechniques sur la production laitière dans les hauts plateaux de l’ouest du Cameroun." Revue d’élevage et de médecine vétérinaire des pays tropicaux 54, no. 1 (January 1, 2001): 55. http://dx.doi.org/10.19182/remvt.9807.
Full textCOUTU, A., L. ANDRÉ, S. MOTTELET, S. AZIMI, S. GUÉRIN, V. ROCHER, A. PAUSS, and T. RIBEIRO. "Conception de réacteurs et compteurs de gaz innovants pour la méthanisation en voie sèche à l’échelle laboratoire." Techniques Sciences Méthodes, no. 9 (September 21, 2020): 71–82. http://dx.doi.org/10.36904/tsm/202009071.
Full textTernon, Céline, Anne Kaminski, Delphine Constantin, Lionel Claudon, Fabien Volpi, Loïc Vincent, Quentin Rafhay, and Ahmad Bsiesy. "Simulation, élaboration et caractérisation de cellules photovoltaïques." J3eA 13 (2014): 0011. http://dx.doi.org/10.1051/j3ea/2015013.
Full textZahar, Y., and J. P. Laborde. "Une méthode stochastique pour la prédétermination des fluctuations probables des durées de service des réservoirs collinaires en Tunisie." Revue des sciences de l'eau 11, no. 1 (April 12, 2005): 25–42. http://dx.doi.org/10.7202/705295ar.
Full textDissertations / Theses on the topic "Génération de paramètres cryptographiques"
Traore, Mohamed. "Analyse des biais de RNG pour les mécanismes cryptographiques et applications industrielles." Thesis, Université Grenoble Alpes, 2022. http://www.theses.fr/2022GRALM013.
Full textIn this work, we analyze X.509 SSL/TLS certificates (using RSA encryption and from hundreds of millions of connected devices) looking for anomalies and notably extend the work of Hastings, Fried and Heninger (2016). Our study was carried out on three databases from EFF (2010-2011), ANSSI (2011-2017) and Rapid7 (2017-2021). Several vulnerabilities affecting devices from well-known manufacturers were detected: small moduli (strictly less than 1024 bits), redundant moduli (used by several entities), invalid certificates but still in use, moduli vulnerable to the ROCA attack as well as so-called “GCD-vulnerable” moduli (i.e. moduli having common factors). For the Rapid7 database, counting nearly 600 million certificates (and including those for recent devices), we have identified 1,550,382 certificates whose moduli are GCD-vulnerable, that is 0.27% of the total number. This made it possible to factor 14,765 moduli of 2048 bits which, to our knowledge, has never been done.By analyzing certain GCD-vulnerable moduli, we were able to partially reverse-engineer the modulus generator (of 512 bits) used by certain families of firewalls, which allowed the instantaneous factorization of 42 moduli of 512 bits, corresponding certificates from 8,817 IPv4 addresses.After noting that most of the factored moduli had been generated by the OpenSSL library, we analyzed the source codes and the methods in charge of the RSA key generation process of several versions of this library (covering the period 2005 to 2021). Through experiments on platforms based on ARM processors, where we put ourselves in almost the same conditions as the vulnerable devices identified, we managed to trace the causes of the PGCD-vulnerability
Zimmer, Sébastien. "Mécanismes cryptographiques pour la génération de clefs et l'authentification." Phd thesis, Ecole Polytechnique X, 2008. http://pastel.archives-ouvertes.fr/pastel-00004271.
Full textSchaub, Alexander. "Méthodes formelles pour l'analyse de fuites cache-timing et la génération de clés dans les implémentations cryptographiques." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT044.
Full textCryptography is ubiquitous in today's interconnected world, protecting our communications, securing our payment systems. While the cryptographic algorithms are generally well understood, their implementations have been less subject to formal verification. This has lead to successful breakages of implementions of most modern primitives: AES, RSA, ECDSA... In general, cryptographic implementations would benefit from stronger theoretical guarantees.In this thesis, we apply this line of reasoning to two different topics, one in software security, and the other in hardware security. The first half of this thesis explores cache-timing side channel vulnerabilities that arise when the time taken by a cryptographic operation, or the cache state after this operation, depends on sensitive information. This occurs if any branching operation depends on secret information such as a private key, or if memory is accessed at an address that depends on that secret.We developed a tool to detect and prevent such leaks in programs written in the C programming language. This tool is applied on most candidates of NIST's post-quantum standardization process in order to find cache-timing leakages. This process aims at replacing traditional cryptographic primitives such as RSA or ECDSA, broken by quantum computers, by safer alternatives. The development of such primitives is on the way, but the security of their implementations has received less scrutiny. We show how our tool is able to detect potential cache-timing leaks in a majority of the implementations and what mitigations are possible.The subject of the second half of this thesis are the so-called physically unclonable functions, or PUFs: elementary circuits from which stable but unpredictable identifiers can be extracted. They rely on small, uncontrollable changes in the semiconductor properties to exhibit unpredictable behavior. Theoretical guarantees concerning two fundamental characteristics of PUFs are derived in this thesis, for a large family of PUFs: the stability of the identifier, related to circuit noise, and the exploitable entropy, derived from the mathematical PUF model
Elayan, Elamari. "Identification des systèmes non linéaires : Application au processus de génération d'ozone." Caen, 2008. http://www.theses.fr/2008CAEN2053.
Full textThis thesis deals with the non linear systems identification. Two approaches are considered: the multi-models approach and the blocks approach. The multi-models approach consists in representing the system by a set of simple models (generally linear models) valid in certain zones of functioning of the system. The global model of the system is a combination of these local models. The fuzzy models of Takagi-Sugeno recover from this multi-models philosophy. The objective is to research a structure of a multi-model and the estimation of its parameters. The originality of our works is the application of this approach in the modelling and the forecast of the variations of the ozone concentration over the region of city of Caen. In the blocks approach, we consider the case of the nonlinear systems identification of Hammerstein type. The non-linearity is Hystérésis-Backlash, asymmetric, and flanked by two polynômiales lines, (the order of the polynomiales is known). The parametric uncertainty thus concerns the coefficients of polynomes, on one hand, and those of the linear dynamics, on the other hand. The proposed plan of identification contains two phases. During the first phase, we proceed to the estimation of the sub-systems parameters, using an adequate parametrization of the system and an input sequence which masks the memory effect of the non linear gain. These parameters are then used in the second stage to estimate the parameters of the non linear gain (coefficients of both polynomes), using a specific paramétrisation and an input sequence. The used input signals, in the two stages of the identification, are adequate because they are easily practicable constructable du to their periodicity and assure the persistent excitation
Ben, Jdidia Anoire. "Nouvelle méthode de génération de gammes de fabrication prenant en compte des paramètres économiques et environnementaux." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC028/document.
Full textIn manufacturing, the electrical energy consumption is considered as one of the major problems which are systematically related to the gas emission containing carbon dioxide and leading to the greenhouse effect. Studies based on the estimation of the machine tools energy consumption become the interest of researchers in recent decades.As a result, different models for energy estimating are developed in order to minimize the quantity of consumed energy. These models are either empirical or theoretical and are limited to taking into account the dynamic behavior of the cutting system during machining operations. The fundamental contribution of this doctoral thesis is the characterization of the nonlinear behavior of cutting and rolling forces during estimating the consumed energy by a machine tool. The developed approach is based on the determination of the variable cutting forces and bearings forces which are function of time. These forces are deduced by solving the equation of motion based on finite element method using Newark's method coupled with Newton Raphson's algorithm. These forces are used to calculate the power then the consumed energy by the axis feed, the spindle and therefore the machine tool. In order to validate our approach, the power and energy obtained from the model developed are compared with the power and energy obtained with an experimental device. A parametric study is carried out to focus on the impact of the variation of the cutting parameters on the value of the consumed power and energy. An interest is given for different types of defect (innerring spalling, outer ring spalling, eccentricity and unbalance) in order to study their impact on the spindle consumed power during approach and cutting phases under different rotating conditions. Particular attention has also been devoted to develop a global model for optimizing machine too lmovements that minimizes the consumed energy, the production time, the cost and the surface roughness with respect of the technological constraints
Moore, Brian. "Optimisation de la génération symbolique du code et estimation des paramètres dynamiques de structures mécaniques dans SYMOFROS." Thèse, Université du Québec à Trois-Rivières, 2000. http://depot-e.uqtr.ca/3088/1/000671450.pdf.
Full textHalbwachs, Emmanuel. "Estimation à erreur bornée pour la génération d'hypothèses multiples de localisation d'un véhicule." Compiègne, 1997. http://www.theses.fr/1997COMP1021.
Full textChevrier, Christophe. "Test de conformité de protocoles de communication modèle de fautes et génération automatique de séquences de tests." Bordeaux 1, 1996. http://www.theses.fr/1996BOR10503.
Full textCorpace, Fabien. "Soudage par résistance du gainage combustible ODS d'un réacteur nucléaire de 4ème génération." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2011. http://tel.archives-ouvertes.fr/tel-00786263.
Full textGuézou, Marc. "Etude et développement d'un système expert de génération de paramètres de soudage, et d'obtention des lois de variation de ces paramètres en fonction de la géométrie d'accostage des tôles, pour le soudage à l'arc robotisé." Paris 6, 1995. http://www.theses.fr/1995PA066099.
Full textBooks on the topic "Génération de paramètres cryptographiques"
Hartmann, Philippe. Centrales nucléaires et environnement - Prélèvements d'eau et rejets. EDP Sciences, 2014. http://dx.doi.org/10.1051/978-2-7598-0913-4.
Full textBook chapters on the topic "Génération de paramètres cryptographiques"
"Vers une nouvelle génération de paramètres de mesure du développement humain pour l’Anthropocène." In Rapport sur le développement humain, 259–306. United Nations, 2021. http://dx.doi.org/10.18356/9789210055178c010.
Full text