Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Benjamin Wesolowski is active.

Publication


Featured researches published by Benjamin Wesolowski.


international cryptology conference | 2017

Short Stickelberger Class Relations and Application to Ideal-SVP

Ronald Cramer; Léo Ducas; Benjamin Wesolowski

The worst-case hardness of finding short vectors in ideals of cyclotomic number fields (Ideal-SVP) is a central matter in lattice based cryptography. Assuming the worst-case hardness of Ideal-SVP allows to prove the Ring-LWE and Ring-SIS assumptions, and therefore to prove the security of numerous cryptographic schemes and protocols — including key-exchange, digital signatures, public-key encryption and fully-homomorphic encryption.


International Workshop on Post-Quantum Cryptography | 2017

Loop-Abort Faults on Supersingular Isogeny Cryptosystems

Alexandre Gélin; Benjamin Wesolowski

Cryptographic schemes based on supersingular isogenies have become an active area of research in the field of post-quantum cryptography. We investigate the resistance of these cryptosystems to fault injection attacks. It appears that the iterative structure of the secret isogeny computation renders these schemes vulnerable to loop-abort attacks. Loop-abort faults allow to perform a full key recovery, bypassing all the previously introduced validation methods. Therefore implementing additional countermeasures seems unavoidable for applications where physical attacks are relevant.


Cryptography and Communications | 2018

Malleability of the blockchain’s entropy

Cécile Pierrot; Benjamin Wesolowski

Trustworthy generation of public random numbers is necessary for the security of a number of cryptographic applications. It was suggested to use the inherent unpredictability of blockchains as a source of public randomness. Entropy from the Bitcoin blockchain in particular has been used in lotteries and has been suggested for a number of other applications ranging from smart contracts to election auditing. In this Arcticle, we analyse this idea and show how an adversary could manipulate these random numbers, even with limited computational power and financial budget.


International Journal of Applied Cryptography | 2017

Trustworthy public randomness with sloth, unicorn, and trx

Arjen K. Lenstra; Benjamin Wesolowski

Many applications require trustworthy generation of public random numbers. It is shown how this can be achieved using a hash function that is timed to be as slow as desired (sloth), while the correctness of the resulting hash can be verified quickly. It is shown how sloth can be used for uncontestable random number generation (unicorn), and how unicorn can be used for a new trustworthy random elliptic curves service (trx) and random-sample voting.


international conference on information security and cryptology | 2015

Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys

Benjamin Wesolowski; Pascal Junod

Broadcasting is a very efficient way to securely transmit information to a large set of geographically scattered receivers, and in practice, it is often the case that these receivers can be grouped in sets sharing common characteristics (or attributes). We describe in this paper an efficient ciphertext-policy attribute-based broadcast encryption scheme (CP-ABBE) supporting negative attributes and able to handle access policies in conjunctive normal form (CNF). Essentially, our scheme is a combination of the Boneh-Gentry-Waters broadcast encryption and of the Lewko-Sahai-Waters revocation schemes; the former is used to express attribute-based access policies while the latter is dedicated to the revocation of individual receivers. Our scheme is the first one that involves a public key and private keys having a size that is independent of the number of receivers registered in the system. Its selective security is proven with respect to the Generalized Diffie-Hellman Exponent (GDHE) problem on bilinear groups.


arXiv: Number Theory | 2017

Isogeny graphs of ordinary abelian varieties

Ernest Hunter Brooks; Dimitar Jetchev; Benjamin Wesolowski

Fix a prime number


IACR Cryptology ePrint Archive | 2015

A random zoo: sloth, unicorn, and trx.

Arjen K. Lenstra; Benjamin Wesolowski


IACR Cryptology ePrint Archive | 2016

Malleability of the blockchain's entropy

Cécile Pierrot; Benjamin Wesolowski

\ell


arXiv: Number Theory | 2015

On Graphs of Isogenies of Principally Polarizable Abelian Surfaces and the Discrete Logarithm Problem.

Dimitar Jetchev; Benjamin Wesolowski


IACR Cryptology ePrint Archive | 2016

Isogeny graphs of ordinary abelian varieties.

Ernest Hunter Brooks; Dimitar Jetchev; Benjamin Wesolowski

ℓ. Graphs of isogenies of degree a power of

Collaboration


Dive into the Benjamin Wesolowski's collaboration.

Top Co-Authors

Avatar

Dimitar Jetchev

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Arjen K. Lenstra

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Ernest Hunter Brooks

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Pascal Junod

University of Applied Sciences Western Switzerland

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thorsten Kleinjung

École Polytechnique Fédérale de Lausanne

View shared research outputs
Researchain Logo
Decentralizing Knowledge