Sami Harari
University of the South, Toulon-Var
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sami Harari.
Proceedings of the third international colloquium on Coding theory and applications | 1988
Sami Harari
In this work we present a new authentication algorithm with modified versions suitable for identification and signature. It uses error correcting codes and binary field arithmetic. It has the property that counterfeiting attacks are equivalent to solving NP complete problems. It is easy to implement and is economical in computing power and memory.
international conference on cryptology in india | 2004
Laurent Poinsot; Sami Harari
The notions of perfect nonlinearity and bent functions are closely dependent on the action of the group of translations over
acs/ieee international conference on computer systems and applications | 2006
Omessaad Hamdi; Ammar Bouallegue; Sami Harari
\mathbb{F}^{m}_{2}
theory and application of cryptographic techniques | 1985
Sami Harari
. Extending the idea to more generalized groups of involutions without fixed points gives a larger framework to the previous notions. In this paper we largely develop this concept to define G-perfect nonlinearity and G-bent functions, where G is an Abelian group of involutions, and to show their equivalence as in the classical case.
network and system security | 2009
Sami Harari
It is pointed out in (1) that HFE is faster than RSA, but it has larger key storage. In this paper, we will outline some of its advantages and disadvantages. We will also study the fact of the extension field degree and the private key degree on the speed of key generation, encryption and decryption.
Lecture Notes in Computer Science | 1997
Sami Harari
Several authors have recently proposed digital signature schemes [1], [2],... In an environment where identification is not possible, and the transmission safe the use of these schemes certify that the data originated from the legitimate person. However in an environment where identification can be ensured by other means and where transmission is done in an unsafe medium , the use of the same schemes ensure data inteqrity: any modification of the data during transmission shows up when one checks the corresponding signature.
network and system security | 2009
Omessaad Hamdi; Ammar Bouallegue; Sami Harari
In this paper, an identity-based multi signature scheme (IBMS) is presented. Many applications require that public keys of the signers to be sent along the signature. Identity strings are likely to be much shorter than randomly generated public keys and are easily verifiable with other applications such as mail or web pages. This property makes the identity based paradigm appealing in such a situation. The new scheme is based on the difficulty of factoring a Rivest Adleman Shamir integer and in particular does not rely on the untested assumptions on bilinear maps. A proof of security for this IBMS is obtained under the assumption of the one wayness of the RSA in the random oracle model. It is analogous but not equivalent to the Bellare scheme. A modified version which uses less network resources and therefore adapted for a large number of signers, is also presented.
EUROCODE '90 Proceedings of the International Symposium on Coding Theory and Applications | 1990
Sami Harari
After studying the constraints related to the use of error correcting codes as hash functions, this document introduces a hash function HCC (hash with codes and correlations) having a ’divide and conquer’ approach for calculating the hash, while having an exponential complexity for the search of collisions. Possible generalizations are also sketched.
Archive | 2006
Omessaâd Hamdi; Sami Harari; Ammar Bouallegue
We propose a method to recover the structure of a randomly permuted chained code and how to cryptanalyse cryptographic schemes based on these kinds of error coding. This result prohibits the use of chained code on cryptography.
World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering | 2007
Omessaad Hamdi; Ammar Bouallegue; Sami Harari
In [1] McEliece introduced a public key cryptosystem using error correcting codes. The message is coded into codewords by using a public generator matrix G. The key to the system is an error vector of weight smaller than the error capacity which is added to the coded information vector. Polynomial time attacks have been devised against this scheme.