589 results

  • TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost

    • April 05, 2019

    • INRIA - Salles Pétri/Turing

    Speaker : Ludovic Claudepierre

    Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…]
  • Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages

    • April 05, 2019

    • Faculté des sciences de Limoges - Salles Pétri/Turing

    Speaker : Léo Reynaud

    Les attaques side channel classiques nécessitent généralement la connaissance du clair (ou du chiffré) afin de calculer des données internes qui seront comparées à des fuites. Des attaques permettent cependant de s’affranchir de ces connaissances, les attaques par distributions jointes. Ces attaques supposent un attaquant capable d’inverser le modèle de consommation, mais aucune connaissance sur[…]
  • True Random Number Generators enabled hardware security

    • March 29, 2019

    • Hardware Security and Cryptographic Processor Lab, Institute of Microelectronics, Tsinghua University, China - Métivier

    Speaker : Bohan Yang

    True randomness is all about unpredictability, which can neither be qualified nor quantified by examining statistics of a sequence of digits. Unpredictability is a property of random phenomena, which is measured in bits of information entropy. Application of randomness spans from art to numerical computing and system security. Random numbers enable various cryptographic algorithms, protocols and[…]
  • Toutes les informations ici https://cca.inria.fr/

    • March 29, 2019

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Ilaria Chillotti, Ayoub Otmani, Ida Tucker et Brice Minaud - Séminaire C2

  • Designing and deploying post-quantum cryptography

    • March 08, 2019

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Jean-Philippe Aumasson - Teserakt AG

    I will review the hash-based signature submitted to the NIST competition jointly with Guillaume Endignoux, discussing its assurance level and performance. Then I will discuss the challenges of deploying post-quantum cryptography in an end-to-end encryption product for machine-to-machine communications.<br/> lien: http://desktop.visio.renater.fr/scopia?ID=721783***6864&autojoin
  • Discrete logarithm computation in finite fields GF(p^k) with NFS

    • March 01, 2019

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Aurore Guillevic - INRIA

    Pairings on elliptic curves are involved in signatures, NIZK, and recently in blockchains (ZK-SNARKS).<br/> These pairings take as input two points on an elliptic curve E over a finite field, and output a value in an extension of that finite field. Usually for efficiency reasons, this extension degree is a power of 2 and 3 (such as 12,18,24), and moreover the characteristic of the finite field has[…]