526 results
-
Side channel analysis against AEAD lightweight cryptography
Speaker : Modou SARRY - IMT Atlantique
Les dispositifs interconnectés tels que les réseaux de capteurs, la santé, les systèmes de contrôle distribués, l’internet des objets et les systèmes cyber-physiques sont de plus en plus répandus. Cette transition vers de petits appareils engendre de nouvelles préoccupations en matière de sécurité et de vie privée, car de nombreux algorithmes cryptographiques classiques ne répondent pas toujours[…] -
On some efficiency aspects of the CKKS fully homomorphic encryption scheme
Speaker : Damien Stehlé - Cryptolab
Fully homomorphic encryption (FHE) is a form of encryption that allows arbitrary computations on data without requiring to decrypt the ciphertexts. Among the diverse FHE schemes, CKKS is designed to efficiently perform computations on real numbers in an encrypted state. Interestingly, Drucker et al [J. Cryptol.] recently proposed an efficient strategy to use CKKS in a black-box manner to perform[…] -
Correction of dual lattice attacks
Speaker : Kevin Carrier - CY Cergy
The security of cryptographic systems such as Kyber and Dilithium (currently undergoing standardization by NIST) fundamentally hinges on the Learning With Errors (LWE) problem. However, the state of the art for attacking this problem is not yet entirely clear. Specifically, the validity of dual attacks on LWE is currently under scrutiny due to their analyses relying on heuristics that have proven[…] -
Generic SCARE: reverse engineering without knowing the algorithm nor the machine
Speaker : Hélène LE BOUDER - IMT Atlantique
A novel side-channel-based reverse engineering technique is introduced, capable of reconstructing a procedure solely from inputs, outputs, and traces of execution. Beyond generic restrictions, no prior knowledge of the procedure or the chip it operates on is assumed. These restrictions confine the analysis to 8-bit RISC constant-time software implementations. Specifically, the feasibility of[…] -
TBD (To be decided closer to the date of the talk)
Speaker : Lisa Kohl - CWI
TBD (To be decided closer to the date of the talk) -
Ind-cpa-d insecurity of approximate and exact homomorphic encryption schemes
Speaker : Elias Suvanto - Cryptolab
Fully Homomorphic Encryption enables the evaluation of arbitrary circuits over encrypted data while maintaining the confidentiality of the underlying messages. It greatly enhances functionality but also comes with security challenges for some applications like Threshold FHE. While the standard IND-CPA security is sufficient against honest but curious adversaries, a stronger security notion called[…]