{"id":3340,"date":"2016-11-18T11:20:15","date_gmt":"2016-11-18T09:20:15","guid":{"rendered":"http:\/\/eric.univ-lyon2.fr\/~jdarmont\/?p=3340"},"modified":"2022-10-03T18:53:14","modified_gmt":"2022-10-03T16:53:14","slug":"libs4-bibliotheque-cryptographique-en-c-disponible-en-ligne","status":"publish","type":"post","link":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/?p=3340","title":{"rendered":"libS4, biblioth\u00e8que cryptographique en C, disponible en ligne"},"content":{"rendered":"<p><a href=\"https:\/\/eric.univ-lyon2.fr\/jdarmont\/?attachment_id=550\" rel=\"attachment wp-att-550\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/eric.univ-lyon2.fr\/jdarmont\/wp-content\/uploads\/2011\/05\/icon-research.png\" alt=\"Recherche-Research\" width=\"64\" height=\"64\" class=\"alignleft size-full wp-image-550\" \/><\/a><br \/>\nS4 (<em>Secure Secret Splitting Scheme<\/em>) est une m\u00e9thode de cryptage homomorphique, c&rsquo;est-\u00e0-dire que des op\u00e9rations (additions pour l&rsquo;instant) peuvent \u00eatre ex\u00e9cut\u00e9es directement sur les donn\u00e9es crypt\u00e9es. S4 est efficace en termes de volume de stockage des donn\u00e9es et de temps de calcul, tout en sacrifiant tr\u00e8s peu le niveau de s\u00e9curit\u00e9, ce qui est id\u00e9al dans les sc\u00e9narios d&rsquo;<em>outsourcing<\/em> partant du principe que l&rsquo;utilisateur a des ressources de stockage et de calcul limit\u00e9es.<\/p>\n<p><a href=\".\/?page_id=131#s4\">T\u00e9l\u00e9chargement<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>S4 (Secure Secret Splitting Scheme) est une m\u00e9thode de cryptage homomorphique, c&rsquo;est-\u00e0-dire que des op\u00e9rations (additions pour l&rsquo;instant) peuvent \u00eatre ex\u00e9cut\u00e9es directement sur les donn\u00e9es crypt\u00e9es. S4 est efficace en termes de volume de stockage des donn\u00e9es et de temps de calcul, tout en sacrifiant tr\u00e8s peu le niveau de s\u00e9curit\u00e9, ce qui est id\u00e9al\u2026 <span class=\"read-more\"><a href=\"https:\/\/eric.univ-lyon2.fr\/jdarmont\/?p=3340\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[9],"tags":[],"class_list":["post-3340","post","type-post","status-publish","format-standard","hentry","category-rech"],"_links":{"self":[{"href":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/index.php?rest_route=\/wp\/v2\/posts\/3340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3340"}],"version-history":[{"count":5,"href":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/index.php?rest_route=\/wp\/v2\/posts\/3340\/revisions"}],"predecessor-version":[{"id":7673,"href":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/index.php?rest_route=\/wp\/v2\/posts\/3340\/revisions\/7673"}],"wp:attachment":[{"href":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eric.univ-lyon2.fr\/jdarmont\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}