Viet Cuong Trinh

Learn More
Broadcast encryption aims at sending a content to a large arbitrary group of users at once. Currently, the most efficient schemes provide constant-size headers, that encapsulate ephemeral session keys under which the payload is encrypted. However, in practice, and namely for pay-TV, providers have to send various contents to different groups of users.(More)
In the context of secure content distribution, the content is encrypted and then broadcasted in a public channel, each legitimate user is provided a decoder and a secret key for decrypting the received signals. One of the main threat for such a system is that the decoder can be cloned and then sold out with the pirate secret keys. Traitor tracing allows the(More)
In the classical model of traitor tracing, one assumes that a traitor contributes its entire secret key to build a pirate decoder. However, new practical scenarios of pirate has been considered, namely Pirate Evolution Attacks at Crypto 2007 and Pirates 2.0 at Eurocrypt 2009, in which pirate decoders could be built from sub-keys of users. The key notion in(More)
Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally <i>weak</i> client wants to securely compute a very complex function <i>f</i> on a given input with the help of a remote computationally <i>strong</i> but <i>untrusted</i> server. The requirement is that(More)
Genetic algorithms are commonly used to perform searches on complex search spaces for optimum solutions of many real-world problems. The evolvable hardware domain presents many problems with complex search spaces subject to the use of a genetic algorithm as an optimization technique for field programmable gate arrays (FPGA) implementations. The optimization(More)