Índice
Literatura académica sobre el tema "Algorithmes symétriques"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Algorithmes symétriques".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Algorithmes symétriques"
Ferreira, Jeffrey. "A Littlewood-Richardson type rule for row-strict quasisymmetric Schur functions". Discrete Mathematics & Theoretical Computer Science DMTCS Proceedings vol. AO,..., Proceedings (1 de enero de 2011). http://dx.doi.org/10.46298/dmtcs.2914.
Texto completoAbou El Majd, B., J. A. Desideri y A. Habbal. "Optimisation de forme fluide-structure par un jeu de Nash". Revue Africaine de la Recherche en Informatique et Mathématiques Appliquées Volume 13 - 2010 - Special... (29 de noviembre de 2010). http://dx.doi.org/10.46298/arima.1933.
Texto completoBürgisser, Peter y Christian Ikenmeyer. "The complexity of computing Kronecker coefficients". Discrete Mathematics & Theoretical Computer Science DMTCS Proceedings vol. AJ,..., Proceedings (1 de enero de 2008). http://dx.doi.org/10.46298/dmtcs.3622.
Texto completoGiraudo, Samuele. "Algebraic and combinatorial structures on Baxter permutations". Discrete Mathematics & Theoretical Computer Science DMTCS Proceedings vol. AO,..., Proceedings (1 de enero de 2011). http://dx.doi.org/10.46298/dmtcs.2919.
Texto completoPang, C. Y. Amy. "A Hopf-power Markov chain on compositions". Discrete Mathematics & Theoretical Computer Science DMTCS Proceedings vol. AS,..., Proceedings (1 de enero de 2013). http://dx.doi.org/10.46298/dmtcs.2316.
Texto completoTesis sobre el tema "Algorithmes symétriques"
Landry, Simon. "Étude de la résistance des algorithmes cryptographiques symétriques face à la cryptanalyse moderne". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS287.
Texto completoThe goal of this thesis is to contribute to the state-of-the-art by proposing new areas of research in order to secure cryptographic algorithms within an embedded device.Our main focal axis is organized around the countermeasure called threshold implementations which is known to be resistant against side-channel analysis attacks in the presence of glitches.These latter phenomenon occur randomly within an electronic circuit and lead to numerous attacks in cryptanalysis. We study the application of threshold implementations on symmetric-key cryptography.In a first phase, we participate to the cryptographic litterature by designing new threshold implementations easily applicable on a large variety of symmetric-key algorithms. Our countermeasures are provable mathematically secured against side-channel analysis attacks in the presence of glitches. In comparison with the recent publications of the state-of-the-art, we adress new issues and we assure similar or better performances. Therefore, our research has resulted in two patents within STMicroelectronics, thereby contributing to the industrial innovation process.In a second phase, we are interested in the study of the symmetric-key algorithm SM4 and its resistance against side-channel analysis attacks. The works obtained allow to centralize the proposed SM4 countermeasures against side-channel analysis attacks of the state-of-the-art and offer a visibility on the software performances of these constructions. We finally introduce the first threshold implementation of the SM4 algorithm. Our construction is provably mathematically resistant against side-channel analysis attacks in the presence of glitches
Koster, Jacobus. "Systèmes linéaires creux et non symétriques : résolution en parallèle et reordonnancement". Toulouse, INPT, 1997. http://www.theses.fr/1997INPT108H.
Texto completoVideau, Marion. "Critères de sécurité des algorithmes de chiffrement à clé secrète". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2005. http://tel.archives-ouvertes.fr/tel-00011927.
Texto completoalgorithmes de chiffrement à clé secrète et ont été menés suivant deux
axes. Le premier concerne la sécurité des chiffrements symétriques
itératifs par blocs contre les attaques par distingueur sur le dernier
tour. Les résultats portent en particulier sur la généralisation d'une
attaque différentielle d'ordre supérieur menée sur l'algorithme
MISTY1. L'origine de cette attaque ainsi que de sa généralisation a pu
être expliquée grâce aux propriétés du spectre de Walsh des fonctions
de non-linéarité maximale utilisées. Ainsi il a été possible
d'élaborer une attaque générique sur tous les chiffrements de Feistel
à cinq tours utilisant des fonctions dont le spectre de Walsh est
divisible par une grande puissance de 2 car cette propriété permet
d'obtenir une borne supérieure sur le degré de la composition de
telles fonctions, nettement plus faible que la borne
triviale. Cette attaque suggère ainsi un nouveau critère de sécurité
qui porte sur la divisibilité du spectre de Walsh des fonctions de
tour utilisées dans les chiffrements itératifs par blocs. La deuxième
partie de la thèse porte sur l'étude des fonctions booléennes
symétriques, et en particulier sur l'existence éventuelle de
propriétés cryptographiques. À partir d'une propriété structurelle de
périodicité d'une représentation d'une fonction booléenne symétrique,
les propriétés de degré algébrique, d'équilibre, de résilience, de
critère de propagation et de non-linéarité ont été étudiées, ce qui a
permis d'améliorer les résultats existants. Par ailleurs, le calcul
explicite du spectre de Walsh des fonctions booléennes symétriques de
degré 2 et 3 a été réalisé, ainsi que la détermination de toutes les
fonctions symétriques équilibrées de degré inférieur ou égal à 7,
indépendamment du nombre de variables.
Toumazet, Frédéric. "Algorithmes combinatoires pour le calcul des caractères de groupes non compacts intervenant en physique". Université de Marne-la-Vallée, 1999. http://www.theses.fr/1999MARN0077.
Texto completoLe, Trung Dung. "Contribution des moyens de production dispersés aux courants de défaut. Modélisation des moyens de production et algorithmes de détection de défaut". Thesis, Supélec, 2014. http://www.theses.fr/2014SUPL0009/document.
Texto completoThis research focuses on the protection of MV distribution networks with Distributed Generators (DGs), such as wind farms or photovoltaic farms, etc. First, the state of art is carried out on fault behaviour of DGs, their impacts on protection system and the mitigation solutions. Next, algorithms are developed for directional relays without voltage sensors. Based on the symmetrical component method, these algorithms help the overcurrent protections to avoid the false tripping issue due to fault contribution of DGs. With the suppression of voltage sensors, such directional relays become cheaper in comparison with the traditional ones. Following the fault detection (the phase or residual current reaches the pick-up value) and depending on fault type (line-to-ground or line-to-line fault), the ratios between the variation (before and during fault) of negative-zero sequence or negative-positive sequence currents are calculated. From these ratios, a SVM (Support Vector Machines) classifier estimates the fault direction (upstream or downstream the detector). The classifier is trained beforehand from transient simulations. This survey shows good performances of the directional algorithms with different network parameters and different kinds of DGs. Such algorithms could be implemented in protections along the feeders in the future smart grids
Le, Pivert Xavier. "Développement de nouveaux algorithmes de protection et de localisation de défauts monophasés et biphasés pour les réseaux de distribution moyenne tension, basés sur les composantes symétriques et harmoniques des courants et des tensions". Paris 11, 2003. http://www.theses.fr/2003PA112147.
Texto completoThe medium voltage distribution networks are victims of faults which must be detected and eliminated as soon as possible, then more precisely localised in order to allow repairing staff to operate. This research work relates to the use of the symmetrical (homopolar, positive and onegative sequence) and harmonic components by protection and localization algorithms. A first theoretical part made it possible to highlight the properties of the symmetrical and harmonic decomposition of the voltage and current signals, and to calculate the components of the currents resulting from the various faults considered. The directional protection algorithms developed thereafter have as principal advantage of being able to work without voltage sensors in most configurations. Harmonic information, when it is available, leads to an improvement of the performances of these algorithms, without being really essential. The algorithms of localization developed require to function only the topological knowledge of the network and not that of the electric characteristics of each section. They also lead to a reduction in the number of sensors necessary. Their generalization leads us to a total system of applicable localization whatever the number and situation of the sensors. All these algorithms were tested and validated by simulation on a great number of configurations and cases. We thus clearly identified their limits and their performances. Two kind of neutral grounding were taken into account: resistive neutral and compensated neutral, like two types of fault : single-phase current and two-phase
Boussicault, Adrien. "Action du groupe symétrique sur certaines fractions rationnelles ; suivi de Puissances paires du Vandermonde". Phd thesis, Université Paris-Est, 2009. http://tel.archives-ouvertes.fr/tel-00502471.
Texto completoChaigneau, Colin. "Cryptanalyse des algorithmes de chiffrement symétrique". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLV086/document.
Texto completoNowadays, cryptology is heavily used to protect stored and transmitted data against malicious attacks, by means of security algorithms. Cryptology comprises cryptography, the design of these algorithms, and cryptanalysis, the analysis of their security.In this thesis, we focus on the cryptanalysis of symmetric encryption algorithms, that is cryptographic algorithms that rely on a secret value shared beforehand between two parties to ensure both encryption and decryption. We present three attacks against symmetric encryption algorithms. The first two cryptanalyses target two high profile candidates of the CAESAR cryptographic competition, the AEZ and NORX algorithms, while the last one targets the Kravatte algorithm, an instance of the Farfalle construction based on the Keccak permutation. Farfalle is multipurpose a pseudo-random function (PRF) developed by the same designers' team as the permutation Keccak used in the SHA-3 hash function.The CAESAR competition, that began in 2015, aims at selecting a portfolio of algorithms recommended for authenticated encryption. The two candidates analysed, AEZ and NORX, reached the third round of the CAESAR competition but were not selected to be part of the finalists. These two results contributed to the cryptanalysis effort required in such a competition. This effort did not establish enough confidence to justify that AEZ and NORX accede to the final round of the competition.AEZ is a construction based on the AES primitive, that aims at offering an optimal resistance against more permissive attack scenarios than those usually considered for authenticated encryption algorithms. We show here that one can recover all the secret material used in AEZ with an abnormal success probability.NORX is an authenticated encryption algorithm based on a variant of the so-called sponge construction used for instance in the SHA-3 hash function. The internal permutation is inspired from the one of BLAKE and ChaCha. We show that one can leverage a strong structural property of this permutation to recover the secret key, thanks to the designers' non-conservative choice of reducing the security margin in the sponge construction.Finally, the last cryptanalysis reconsiders the robustness of the Kravatte algorithm. Kravatte is an efficient and parallelizable PRF with input and output of variable length. In this analysis, we exploit the low algebraic degree of the permutation Keccak used in Kravatte to mount three key-recovery attacks targeting different parts of the construction: a higher order differential attack, an algebraic meet-in-the-middle attack and an attack based on a linear recurrence distinguisher
Giraudo, Samuele. "Combinatoire algébrique des arbres". Phd thesis, Université Paris-Est, 2011. http://pastel.archives-ouvertes.fr/pastel-00674619.
Texto completoGouget, Aline. "Etude de propriétés cryptographiques des fonctions booléennes et algorithme de confusion pour le chiffrement symétrique". Caen, 2004. http://www.theses.fr/2004CAEN2023.
Texto completo