Résumé en français

This commit is contained in:
2018-09-19 19:14:10 +02:00
parent 44f65c6f6c
commit 1adf1f8f34
6 changed files with 255 additions and 9 deletions

View File

@ -2,7 +2,7 @@ In the last fifty years, the use of cryptography has shifted from military and c
For instance, the Enigma machine had a design for military purposes, and another one for companies (Enigma A26).
As of today, about $60\%$ of the first million most visited websites propose encrypted and authenticated communications (via \texttt{https}), and so are most of the communications channels used by electronic devices (like \textit{Wifi Protected Access}).
At the same time, the growth of exchanged data and the sensitivity of transferred information make the urge of procecting these data efficiently even more critical.
At the same time, the growth of exchanged data and the sensitivity of transferred information make the urge of protecting these data efficiently even more critical.
While we are reaching the Moore's law barrier, other threats exist against nowadays' cryptosystems.
For instance, the existence of a quantum computer with sufficient memory~\cite{Sho99} would break most of real-world cryptographic designs, which mostly rely on modular arithmetic assumptions.
In this context, it is crucial to design cryptographic schemes that are believed to be quantum-resistant.