Publication

Efficient generation of prime numbers

Publications associées (43)

Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger

Serge Vaudenay, Laurane Chloé Angélina Marco, Abdullah Talayhan

The Bitcoin architecture heavily relies on the ECDSA signature scheme which is broken by quantum adversaries as the secret key can be computed from the public key in quantum polynomial time. To mitigate this attack, bitcoins can be paid to the hash of a pu ...
2023

A new elementary proof of the Prime Number Theorem

Florian Karl Richter

Let Ω(n)\Omega(n) denote the number of prime factors of nn. We show that for any bounded f ⁣:NCf\colon\mathbb{N}\to\mathbb{C} one has [ \frac{1}{N}\sum_{n=1}^N, f(\Omega(n)+1)=\frac{1}{N}\sum_{n=1}^N, f(\Omega(n))+\mathrm{o}_{N\to\infty}(1). ] This yields a ...
2021

Experiments with the Markoff Surface

Matthew De Courcy-Ireland, Sandy Lee

We confirm, for the primes up to 3000, the conjecture of Bourgain-Gamburd-Sarnak and Baragar on strong approximation for the Markoff surface modulo primes. For primes congruent to 3 modulo 4, we find data suggesting that some natural graphs constructed fro ...
TAYLOR & FRANCIS INC2020

A spectral refinement of the Bergelson–Host–Kra decomposition and new multiple ergodic theorems

Florian Karl Richter

We investigate how spectral properties of a measure-preserving system (X, B, mu, T) are reflected in the multiple ergodic averages arising from that system. For certain sequences a :N -> N, we provide natural conditions on the spectrum sigma (T) such that, ...
2019

System and method for providing a collective decentralized authority for sharing sensitive data

Jean-Pierre Hubaux, Bryan Alexander Ford, Jean Louis Raisaro, Zhicong Huang, Patricia Egger

A method of sharing private and/or sensitive data from plurality of data providers to a data user, the data user having a private key and a public key, the method comprising the steps of providing a first data set and encrypting the first data set at a ter ...
2018

A PRACTICAL ANALYTIC METHOD FOR CALCULATING pi(x)

Thorsten Kleinjung

In this paper we give a description of a practical analytic method for the computation of pi(x), the number of prime numbers
American Mathematical Society2017

LPN in Cryptography

Sonia Mihaela Bogos

The security of public-key cryptography relies on well-studied hard problems, problems for which we do not have efficient algorithms. Factorization and discrete logarithm are the two most known and used hard problems. Unfortunately, they can be easily solv ...
EPFL2017

Some applications of smooth bilinear forms with Kloosterman sums

Philippe Michel

We revisit a recent bound of I. Shparlinski and T. Zhang on bilinear forms with Kloosterman sums, and prove an extension for correlation sums of Kloosterman sums against Fourier coefficients of modular forms. We use these bounds to improve on earlier resul ...
Maik Nauka/Interperiodica/Springer2017

Signature Schemes Secure Against Hard-to-Invert Leakage

Sebastian Faust

Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptographic protocols are implemented in real-world hardware. The goal of leakage resilient cryptography is to design cryptosystems that withstand such attacks. In ...
Springer2016

Sign changes of Kloosterman sums with almost prime moduli

Ping Xi

We prove that the Kloosterman sum changes sign infinitely often as runs over squarefree moduli with at most 10 prime factors, which improves the previous results of Fouvry and Michel, Sivak-Fischler and Matomaki, replacing 10 by 23, 18 and 15, respectively ...
Springer Verlag2015

Graph Chatbot

Chattez avec Graph Search

Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.

AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.