References of "Leprévost, Franck 50002201"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailHardened Bloom Filters, with an Application to Unobservability
Bernard, Nicolas UL; Leprévost, Franck UL

in Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica (2013), 12(4), 11-22

Classical Bloom filters may be used to elegantly check if an element e belongs to a set S, and, if not, to add e to S. They do not store any data and only provide boolean answers regarding the membership ... [more ▼]

Classical Bloom filters may be used to elegantly check if an element e belongs to a set S, and, if not, to add e to S. They do not store any data and only provide boolean answers regarding the membership of a given element in the set, with some probability of false positive answers. Bloom filters are often used in caching system to check that some requested data actually exist before doing a costly lookup to retrieve them. However, security issues may arise for some other applications where an active attacker is able to inject data crafted to degrade the filters’ algorithmic properties, resulting for instance in a Denial of Service (DoS) situation. This leads us to the concept of hardened Bloom filters, combining classical Bloom filters with cryptographic hash functions and secret nonces. We show how this approach is successfully used in the TrueNyms unobservability system and protects it against replay attacks. [less ▲]

Detailed reference viewed: 92 (18 UL)
Full Text
Peer Reviewed
See detailBeyond Tor: The TrueNyms Protocol
Bernard, Nicolas UL; Leprévost, Franck UL

in Security and Intelligent Information Systems (2012)

Detailed reference viewed: 286 (33 UL)
See detailSecurity and Intelligent Information Systems
Klopotek, Mieczyslaw; Leprévost, Franck UL; Marciniak, Malgorzata et al

Book published by Springer (2012)

Detailed reference viewed: 47 (4 UL)
Full Text
Peer Reviewed
See detailOn the Computation of Class Polynomials with "Thetanullwerte" and Its Applications to the Unit Group Computation
Leprévost, Franck UL; Pohst, Michael; Uzunkol, Osmanbey

in Experimental Mathematics (2011), 20(3), 271-281

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailJacobians of genus 2 curves with a rational point of order 11
Leprévost, Franck UL; Bernard, Nicolas UL; Pohst, Michael

in Experimental Mathematics (2009), 18(1), 65-70

On the one hand, it is well-known that Jacobians of (hyper)elliptic curves defined over $\Q$ having a rational point of order $l$ can be used in many applications, for instance in the construction of ... [more ▼]

On the one hand, it is well-known that Jacobians of (hyper)elliptic curves defined over $\Q$ having a rational point of order $l$ can be used in many applications, for instance in the construction of class groups of quadratic fields with a non-trivial $l$-rank. On the other hand, it is also well-known that $11$ is the least prime number which is not the order of a rational point of an elliptic curve defined over $\Q$. It is therefore interesting to look for curves of higher genus, whose Jacobians have a rational point of order $11$. This problem has already been addressed, and Flynn found such a family $\Fl_t$ of genus $2$ curves. Now, it turns out, that the Jacobian $J_0(23)$ of the modular genus $2$ curve $X_0(23)$ has the required property, but does not belong to $\Fl_t$. The study of $X_0(23)$ leads to a method to partially solving the considered problem. Our approach allows us to recover $X_0(23)$, and to construct another $18$ distinct explicit curves of genus $2$ defined over $\Q$ and whose Jacobians have a rational point of order $11$. Of these $19$ curves, $10$ do not have any rational Weierstrass point, and $9$ have a rational Weierstrass point. None of these curves are $\Qb$-isomorphic to each other, nor $\Qb$-isomorphic to an element of Flynn's family $\Fl_t$. Finally, the Jacobians of these new curves are absolutely simple. [less ▲]

Detailed reference viewed: 45 (9 UL)
Full Text
Peer Reviewed
See detailUnits in some parametric families of quartic fields
Leprévost, Franck UL; Pohst, Michael; Schöpp, Andreas

in Acta Arithmetica (2007), 127(3), 205-216

Detailed reference viewed: 18 (0 UL)
Peer Reviewed
See detailCryptographie à Clef Publique
Dumas, J.-G.; Leprévost, Franck UL; Roch, Jean-Louis et al

in Ebrahimi, Touradj; Leprévost, Franck; Warusfel, Bertrand (Eds.) Cryptographie et sécurité des systèmes et réseaux, 2 (2007)

Les briques de construction des systèmes sécurisés d'information font appel aux notions de cryptologie, qui recouvre la cryptographie (la construction de cryptosystèmes) et la cryptanalyse (la recherche ... [more ▼]

Les briques de construction des systèmes sécurisés d'information font appel aux notions de cryptologie, qui recouvre la cryptographie (la construction de cryptosystèmes) et la cryptanalyse (la recherche de failles dans les cryptosystèmes). Les cryptosystèmes reposent sur le principe de Kerckhoff, qui affirme que la sécurité d'un cryptosystème ne doit pas reposer sur l'ignorance de l'algorithme pour sa mise en œuvre, mais sur l'ignorance que l'attaquant a d'une information secrète. Ce volume, organisé en chapitres indépendants, traite de la cryptographie à clef secrète, en particulier de l'AES, et des méthodes de cryptanalyse linéaire et différentielle , de la cryptographie à clef publique, en particulier de RSA, du protocole d'échange de clefs de Diffie-Hellman, et des signatures électroniques. Il assemble ces briques de construction dans le cadre des architectures à clef publique (X.509, PGP, DNSSEC) et traite de la sécurité des systèmes (essentiellement Unix), et des réseaux. [less ▲]

Detailed reference viewed: 44 (0 UL)
Peer Reviewed
See detailchap "Architectures PKI"
Leprévost, Franck UL; Varrette, Sébastien UL; Roch, Jean-Louis et al

in Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (2006)

Detailed reference viewed: 17 (0 UL)
Full Text
See detailCryptographie et sécurité des systèmes et réseaux
Ebrahimi, Touradj; Leprévost, Franck UL; Warusfel, Bertrand

Book published by Hermès-Lavoisier (2006)

Detailed reference viewed: 47 (0 UL)
Peer Reviewed
See detailSafe Distributed Architecture for Image-based Computer Assisted Diagnosis
Varrette, Sébastien UL; Roch, J.-L.; Montagnat, J. et al

in Proc. of the IEEE Intl. Conf. on Pervasive Services, Workshop on Health Pervasive Systems (HPS'06) (2006)

Detailed reference viewed: 20 (0 UL)
Peer Reviewed
See detailchap. "Cryptographie à Clé Publique"
Dumas, J.-G.; Leprévost, Franck UL; Roch, J.-L. et al

in Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (2006)

Detailed reference viewed: 23 (0 UL)
Full Text
See detailEnjeux de la sécurité multimédia
Ebrahimi, Touradj; Leprévost, Franck UL; Warusfel, Bertrand

Book published by Hermès-Lavoisier (2006)

Detailed reference viewed: 22 (0 UL)
Full Text
See detailRéalités de l'espionnage électronique
Leprévost, Franck UL; Ebrahimi, Touradj; Warusfel, Bertrand

Book published by Lavoisier-Hermes (2006)

Detailed reference viewed: 16 (0 UL)
Peer Reviewed
See detailApplicative Solutions for Safe Computations in Distributed Environments
Varrette, Sébastien UL; Roch, J.-L.; Leprévost, Franck UL

in Workshop "Trustworthy Software" (2006)

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailDistributed Authentication in GRID5000
Varrette, Sébastien UL; Georget, Sebastien; Montagnat, Johan et al

in Proc. of OTM Confederated Int. Workshops on Grid Computing and its Application to Data Analysis (GADA'05) (2005, November)

Detailed reference viewed: 31 (0 UL)
Peer Reviewed
See detailAuthentification Distribuée sur Grille de Grappes basée sur LDAP
Varrette, Sébastien UL; Georget, S.; Roch, J.-L. et al

in Proc. des 16èmes rencontres francophones du parallélisme (RenPar'16) (2005)

Detailed reference viewed: 21 (2 UL)
Peer Reviewed
See detailGenerating anomalous elliptic curves
Leprévost, Franck UL; Monnerat, Jean; Varrette, Sébastien UL et al

in Information Processing Letters (2005), 93

Detailed reference viewed: 25 (0 UL)
Peer Reviewed
See detailFlowCert : Probabilistic certification for parallel processing on the grid
Varrette, Sébastien UL; Roch, Jean-Louis; Leprévost, Franck UL

in IEEE, editor. Proceedings of the 16th Symposium on Computer Architecture and High Performance Computing. IEEE-SBAC PAD 2004, Foz do Iguaçu, Brésil, octobre 2004 (2004, October)

Detailed reference viewed: 42 (0 UL)
Peer Reviewed
See detailSecure Architecture for Clusters and Grids
Varrette, Sébastien UL; Roch, J.-L.; Denneulin, Y. et al

in Proc. of the 2nd Int. Conf. on Critical Infrastructures (CRIS 2004) (2004)

Detailed reference viewed: 29 (2 UL)
Peer Reviewed
See detailSecure architectures for clusters and grid computations
Varrette, Sébastien UL; Roch, Jean-Louis; Denneulin, Yves et al

in Proceedings de CRIS 2004 (2nd International Conference on Critical Infrastructures), Grenoble, France, Octobre 2004 (2004)

Detailed reference viewed: 32 (0 UL)