Events
Seminars, conferences, workshops..., find the agenda of scientific activities carried out by CREACH LABS
-
-
Seminar
-
SemSecuElec
HDL simulation for Masked Software Verification
Speaker : Quentin Meunier - Sorbonne Univ. Lip6
Masking is a countermeasure against Side-Channel Attacks (SCA) that aims to ensure that intermediate computations in an algorithm have secret-independent distributions through the use of random variables. This theoretically prevents SCAs, as power consumption is directly linked to the values manipulated by the program or hardware device. Designing a masking scheme is often non-trivial, and a[…]-
SemSecuElec
-
Side-channel
-
-
-
Seminar
-
SemSecuElec
Étude, caractérisation et détection de verrouillage d'anneaux oscillants utilisés dans les générateurs de nombres aléatoires.
Speaker : Eloise Delolme - LabHC
Les générateurs de nombres aléatoires matériels basés sur des oscillateurs en anneau (RO-TRNGs) exploitent le jitter d’horloge comme source d’aléa afin de produire des séquences de bits aléatoires. Parmi ces architectures, le MURO-TRNG repose sur un modèle stochastique complexe qui suppose notamment l’indépendance des oscillateurs. Toutefois, dans la pratique, les oscillateurs en anneau sont[…]-
SemSecuElec
-
TRNG
-
-
-
Seminar
-
Cryptography
Schéma de signature à clé publique : Frobénius-UOV
Speaker : Gilles Macario-Rat - Orange
L'exposé présente un schéma de signature à clé publique post-quantique inspiré du schéma UOV et introduisant un nouvel outil : les formes de Frobénius. L'accent est mis sur le rôle et les propriétés des formes de Frobénius dans ce nouveau schéma : la simplicité de description, la facilité de mise en oeuvre et le gain inédit sur les tailles de signature et de clé qui bat RSA-2048 au niveau de[…] -
-
-
Seminar
-
SemSecuElec
Chamois: Formally verified compilation for optimisation and security
Speaker : David MONNIAUX - CNRS - Verimag
Embedded programs (including those on smart cards) are often developed in C and then compiled for the embedded processor. Sometimes they are modified by hand to incorporate countermeasures (fault attacks, etc.), but care must be taken to ensure that this does not disrupt normal program execution and that the countermeasure is actually adequate for blocking the attacks.In the process, it is[…]-
SemSecuElec
-
Fault injection
-
Formal methods
-
Focus
Conference on Informational Influence Warfare
Informational Influence Warfare (L2I) encompasses the entire range of techniques used to detect and counter adversary information maneuvers in cyberspace. It is based on a national doctrine that takes into account regulatory, ethical, and geopolitical considerations, as well as a vast technical corpus that includes automatic language processing, large-scale data mining, analysis of collective dynamics on social networks, and more traditional cybersecurity techniques such as protection and attack methods for information systems.
The DGA's Maitrise de l'Information technical center is the MinArm's technical expert in cybersecurity and, as such, has developed expertise in the field of L2I. In collaboration with the Defense Innovation Agency, we wish to share our main technical concerns, challenges, and use cases with the academic research community in order to facilitate the implementation of collaborative projects that we will fund through our research support mechanisms, particularly Creach Labs.
The objective of this conference is to bring together all teams within the scope of CREACH LABS as well as MinArm experts working on L2I to take a cross-look at the main research challenges and facilitate the implementation of collaborative projects, allow PhD students and post-docs to present their project progress, and provide teams with a comprehensive view of ongoing work and strategic directions to take.
News
News, highlights...discover the latest information from CREACH LABS
-
CREACH LABS, partner of PQCrypto 2026
CREACH LABS invite you to attend the 17th International conference on Post-Quantum Cryptography that will take place in Saint-Malo, France on April 14-16, 2026.March 31, 2026 -
CREACH LABS - Annual PhD Funding Campaign
CREACH LABS launches its 2026 thesis grants campaign, joint with the DGA, AID, the Brittany Region and the EUR CyberSchool.November 06, 2025 -
CREACH LABS - annual postdoctoral and research engineer funding campaign
CREACH LABS launches its 2026 call for projects to fund postdoctoral and research engineer positions.November 04, 2025
Publications
Articles, theses, white papers... find scientific publications resulting from research works and scientific collaborations supported by CREACH LABS.
-
-
White paper
« Security supervision »
Security supervision is a field initiated in the 1980s. Even if the foundations of the field have remained unchanged for 40 years, the techniques for implementing them have of course greatly evolved. -
-
-
Article
« Energy backdoor attack to deep neural networks »
The transition to deep learning has led to a significant surge in computing complexity and energy consumption. This trend has prompted the adoption of acceleration hardware like tensor processing units (TPUs) and application specific integrated circuits (ASICs) to facilitate energy-efficient deployment on edge and mobile devices. However, recent studies have revealed their vulnerability to energy[…] -
-
-
Article
« BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports »
Malware analysis consists of studying a sample of suspicious code to understand it and producing a representation or explanation of this code that can be used by a human expert or a clustering/classification/detection tool. -
Jobs
Discover job opportunities (PhDs, postdocs, research engineer positions...) from CREACH LABS-funded projects and our partner organizations.