Gotowa bibliografia na temat „Chiffrement à bas coût”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Chiffrement à bas coût”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Chiffrement à bas coût"
Moliton, Jean-Pierre, i Thierry Trigaud. "Vers l'optoélectronique organique bas coût". J3eA 4 (2005): 006. http://dx.doi.org/10.1051/j3ea:2006010.
Pełny tekst źródła-ZOLESIO, J. L. "Radar à balayage électronique bas coût". Revue de l'Electricité et de l'Electronique -, nr 01 (2000): 57. http://dx.doi.org/10.3845/ree.2000.004.
Pełny tekst źródłaTouam, Malik, Nhân Luong i Nguyen Khoa Man. "Générateur de dialyse et hémodialyse à bas coût". Néphrologie & Thérapeutique 15 (kwiecień 2019): S109—S113. http://dx.doi.org/10.1016/j.nephro.2019.02.006.
Pełny tekst źródłaLe Bras, Yannick. "Instrumentation à bas coût pour l’électrotechnique en TBT". J3eA 22 (2023): 1028. http://dx.doi.org/10.1051/j3ea/20231028.
Pełny tekst źródłaDort, Aurélie. "L’incertain remboursement de la dette publique". Gestion & Finances Publiques, nr 4 (lipiec 2021): 17–24. http://dx.doi.org/10.3166/gfp.2021.4.003.
Pełny tekst źródłaGodon, Alain, Rémy Guyonneau i Franck Mercier. "Une arène bas coût pour l’enseignement de la robotique". J3eA 22 (2023): 1026. http://dx.doi.org/10.1051/j3ea/20231026.
Pełny tekst źródłaAuriol, Emmanuelle. "Une note sur l'effet d'échantillonnage." Revue économique 47, nr 5 (1.09.1996): 1179–201. http://dx.doi.org/10.3917/reco.p1996.47n5.1179.
Pełny tekst źródłaL’Horty, Yannick. "Quand les hausses du SMIC réduisent le coût du travail". Revue économique 51, nr 3 (1.05.2000): 499–512. http://dx.doi.org/10.3917/reco.p2000.51n3.0499.
Pełny tekst źródłaJoulain, Karl, Refet Ali Yalçin, Jérémie Drévillon i Etienne Blandre. "Refroidissement radiatif diurne par revêtement de fibres de silice". Photoniques, nr 105 (listopad 2020): 28–31. http://dx.doi.org/10.1051/photon/202010528.
Pełny tekst źródłaHanine, Ilyas. "Le nucléaire et ses « externalités »". Revue Générale Nucléaire, nr 3 (2023): 58–61. http://dx.doi.org/10.1051/rgn/20233058.
Pełny tekst źródłaRozprawy doktorskie na temat "Chiffrement à bas coût"
Coggia, Daniel. "Techniques de cryptanalyse dédiées au chiffrement à bas coût". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS217.
Pełny tekst źródłaThis thesis contributes to the cryptanalysis effort needed to trust symmetric-key primitives like block-ciphers or pseudorandom generators. In particular, it studies a family of distinguishers based on subspace trails against SPN ciphers. This thesis also provides methods for modeling frequent cryptanalysis problems into MILP (Mixed-Integer Linear Programming) problems to allow cryptographers to benefit from the existence of very efficient MILP solvers. Finally, it presents techniques to analyze algebraic properties of symmetric-key primitives which could be useful to mount cube attacks
Duval, Sébastien. "Constructions pour la cryptographie à bas coût". Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS078.
Pełny tekst źródłaThis thesis explores the construction of symmetric cryptography primitives. We reach better constructions than that of the literature, we a focus on the reduction of implementation costs. We study three types of primitives: block ciphers, which are the most commonly used in symmetric cryptography, a stream cipher designed for a specific application and a message authentication algorithm. We reduce the costs of the two main components of block ciphers: S-boxes and diffusion matrices. Feistel and MISTY-like structures appear to be a good choice to design secure S-boxes at a low cost, and lead us to new S-boxes with the best known trade-off between security and implementation cost. We also study the Butterfly structure which yields S-boxes with an excellent security. As for diffusion matrices, we develop an algorithm to look for formal matrices in a polynomial ring, then we instantiate its outputs to obtain matrices which are optimal in terms of diffusion at a lower cost than those of the literature. We also identify a weakness in the stream cipher FLIP, designed to fit some very specific cost constraints. We show that FLIP requires a different analysis than other stream ciphers and deduce from it an attack, which led to an update in FLIP to get a more resilient cipher. Finally, we study MAC algorithms, which are used to authenticate messages. Combining works from the literature, we build a MAC which is less costly than those used in practice with an equivalent security, aiming at an implementation on 32-bit micro-controllers
Huynh, Le-Phuc. "Analyse et conception d’algorithmes de chiffrement légers". Electronic Thesis or Diss., Université de Lorraine, 2020. http://www.theses.fr/2020LORR0223.
Pełny tekst źródłaThe work presented in this thesis has been completed as part of the FUI PACLDIO project, whose aim is to provide new security protocols and algorithms for the Internet of Things, and more specifically wireless sensor networks. As a result, this thesis investigates so-called lightweight authenticated encryption algorithms, which are designed to fit into the limited resources of constrained environments.The first main contribution focuses on the design of a lightweight cipher called Lilliput-AE, which is based on the extended generalized Feistel network (EGFN) structure and was submitted to the Lightweight Cryptography (LWC) standardization project initiated by NIST (National Institute of Standards and Technology).Another part of the work concerns theoretical attacks against existing solutions, including some candidates of the NIST LWC standardization process. Therefore, some specific analyses of the Skinny and Spook algorithms are presented, along with a more general study of boomerang attacks against ciphers following a Feistel construction
Lallemand, Virginie. "Cryptanalyse de chiffrements symétriques". Electronic Thesis or Diss., Paris 6, 2016. http://www.theses.fr/2016PA066657.
Pełny tekst źródłaThe main subject of this thesis is the security analysis of symmetric key ciphers. Specifically, we study several recently proposed block and stream ciphers and prove that the level of security stated by their designers is overestimated. The ciphers we study were all designed in order to meet the needs of one of the new applications of symmetric cryptography, which include symmetric ciphers for very constrained environments.The first part of the thesis is dedicated to the analysis of block ciphers with techniques based on differential cryptanalysis. We start with the description of a truncated differential attack on the family of lightweight ciphers KLEIN. Next, we analyse two ciphers that were designed in such a way that they could be easily and effectively protected against side-channel attacks: Zorro and Picaro. We show that the design choices made by their designers lead to weak diffusion properties. We exploit these imperfections to devise a differential cryptanalysis of Zorro and a related key attack on Picaro.The second part of this thesis deals with stream ciphers and gives an analysis of two innovative designs: Sprout and Flip. Sprout was designed in order to limit its hardware area size and to suit very constrained environments, while Flip reaches efficient performances when used in FHE schemes. In both cases, we find flaws that lead to attacks of the particular set of parameters proposed for these ciphers
Lallemand, Virginie. "Cryptanalyse de chiffrements symétriques". Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066657/document.
Pełny tekst źródłaThe main subject of this thesis is the security analysis of symmetric key ciphers. Specifically, we study several recently proposed block and stream ciphers and prove that the level of security stated by their designers is overestimated. The ciphers we study were all designed in order to meet the needs of one of the new applications of symmetric cryptography, which include symmetric ciphers for very constrained environments.The first part of the thesis is dedicated to the analysis of block ciphers with techniques based on differential cryptanalysis. We start with the description of a truncated differential attack on the family of lightweight ciphers KLEIN. Next, we analyse two ciphers that were designed in such a way that they could be easily and effectively protected against side-channel attacks: Zorro and Picaro. We show that the design choices made by their designers lead to weak diffusion properties. We exploit these imperfections to devise a differential cryptanalysis of Zorro and a related key attack on Picaro.The second part of this thesis deals with stream ciphers and gives an analysis of two innovative designs: Sprout and Flip. Sprout was designed in order to limit its hardware area size and to suit very constrained environments, while Flip reaches efficient performances when used in FHE schemes. In both cases, we find flaws that lead to attacks of the particular set of parameters proposed for these ciphers
Schrottenloher, André. "Quantum Algorithms for Cryptanalysis and Quantum-safe Symmetric Cryptography". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS271.
Pełny tekst źródłaModern cryptography relies on the notion of computational security. The level of security given by a cryptosystem is expressed as an amount of computational resources required to break it. The goal of cryptanalysis is to find attacks, that is, algorithms with lower complexities than the conjectural bounds.With the advent of quantum computing devices, these levels of security have to be updated to take a whole new notion of algorithms into account. At the same time, cryptography is becoming widely used in small devices (smart cards, sensors), with new cost constraints.In this thesis, we study the security of secret-key cryptosystems against quantum adversaries.We first build new quantum algorithms for k-list (k-XOR or k-SUM) problems, by composing exhaustive search procedures. Next, we present dedicated cryptanalysis results, starting with a new quantum cryptanalysis tool, the offline Simon's algorithm. We describe new attacks against the lightweight algorithms Spook and Gimli and we perform the first quantum security analysis of the standard cipher AES.Finally, we specify Saturnin, a family of lightweight cryptosystems oriented towards post-quantum security. Thanks to a very similar structure, its security relies largely on the analysis of AES
Bouhamri, Zine-Abidine. "Transmission multi-standards sur lien optique bas-coût". Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-00957588.
Pełny tekst źródłaCoisel, Iwen. "Authentification et Anonymat à Bas-coût : Modélisations et Protocoles". Caen, 2009. http://www.theses.fr/2009CAEN2041.
Pełny tekst źródłaIn our daily life, security of many applications are based on cryptographic mechanisms. In some of them, privacy issues are a major concern. For example in internet context, a user expects the service provider not to divulgate his identity. In this thesis, I first give a formal definition of zero-knowledge proofs of knowledge (ZKPK), very useful for designing digital signatures. I prove the security of a generic construction of proofs of knowledge of discrete logarithm relations set. Then, I present state of the art of different signature schemes ensuring users' anonymity. Afterwards I adapt these protocols to the cooperative set-up, in which an intermediary helps the user perform some computations during the protocol. I also define a formal security model which is robust against corruption of the intermediary, while improving protocol efficiency. In the second part of this thesis, I present the security requirements for RFID tags authentication protocols. As these small embedded devices are potentially integrated into many various products, they must be intraceable so that nobody can trace their holder. As anonymity does not provide this property on its own, it must be included in the security model. Finally, I describe two authentication protocols which provide this security level. The first one uses a secret key infrastructure and a key update mechanism. The other one uses a public key infrastructure and an encryption algorithm
Lefranc, David. "Authentification asymétrique à bas coût et vérification assistée par ordinateur". Caen, 2005. http://www.theses.fr/2005CAEN2024.
Pełny tekst źródłaPassault, Grégoire. "Optimisation de la locomotion de robots bas coût à pattes". Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0297/document.
Pełny tekst źródłaA promise of legged robots is being able walking on irregular or uneven floor. It is already used nowadays in education and entertainment applications. We introduce the Metabot platform, an open-source quadruped robot developped for education. This takes place in current technological context which allows, thanks to an access to fast prototyping and off-shelf components, building legged robots that were formerly only present in laboratories. This platform was used for teaching in secondary schools, allowing students to discover robotics, and especially programming. We then describe an environment designed to study legged robots locomotion, extending the expert controller designed for Metabot. We realized some physics simulation experiments and analyzed it to get a better understanding of the legged locomotion underlying rules. At last, we get a closer look at biped locomotion, for which stability problems arise. When developping our Sigmaban platform, a small-sized humanoid robot created to participate in RoboCup soccer, we designed foot pressure sensors that allow us to estimate the robot center of pressure. We exploit these sensors to improve the lateral stability on the robot, creating a closed-loop walk
Raporty organizacyjne na temat "Chiffrement à bas coût"
Meunier, Valérie, i Eric Marsden. Analyse coût-bénéfices: guide méthodologique. Fondation pour une culture de sécurité industrielle, grudzień 2009. http://dx.doi.org/10.57071/492acb.
Pełny tekst źródłaDufour, Quentin, David Pontille i Didier Torny. Contracter à l’heure de la publication en accès ouvert. Une analyse systématique des accords transformants. Ministère de l'enseignement supérieur et de la recherche, kwiecień 2021. http://dx.doi.org/10.52949/2.
Pełny tekst źródła