Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
652 results
-
-
Seminar
-
SemSecuElec
Acquisition and Exploitation of Traces from Connected Devices
Speaker : Francesco Servida - École des Sciences Criminelles, Université de Lausanne
This presentation aims to give an overview of the traces that can be obtained from connected objects as witnesses or actors at a crime scene. Using several scenarios we cover the challenges of detecting connected devices, the relevant locations for data retrieval and the techniques for acquiring said data. We then present how such data can be useful in helping to understand the dynamics of events[…]-
SemSecuElec
-
Embedded systems
-
-
-
Seminar
-
SemSecuElec
Understanding and fighting fault injections with programming languages
Speaker : Sébastien Michelland - Université Grenoble Alpes, Grenoble INP, LCIS
Would your latest program produce correct results if I skipped a statement in it? Two? Corrupted a variable at random? Then it might not be robust against _fault injection attacks_, which target hardware directly and have such effects. To be fair, nothing really resists them; still, efforts in designing protections have come a long way, relying (perhaps surprisingly) in large part on hardening[…]-
SemSecuElec
-
Fault injection
-
-
-
Seminar
-
Cryptography
Evaluation embarquée de l'entropie d'un générateur d'aléa pour la cryptographie
Speaker : David Lubicz - DGA et IRMAR
Dans cet exposé, nous présentons une méthode de mesure embarquée de la composante thermique du jitter de phase d'un couple d'anneaux d'oscillateurs : cette mesure est nécessaire pour calculer le taux d'entropie d'un générateur d'aléa physique basé sur des anneaux oscillants. La précision de cette mesure dont le principe repose sur un algorithme de type Monte-Carlo dépend de l' équidistribution de[…] -
-
-
Seminar
-
Cryptography
Recent advances in post-quantum signatures based on the MPC-in-the-Head paradigm
Speaker : Thibauld Feneuil - CryptoExperts
Zero-knowledge proofs of knowledge are useful tools for designing signature schemes. Among the existing techniques, the MPC-in-Head (MPCitH) paradigm provides a generic framework to build quantum-resilient proofs using techniques from secure multiparty computation. This paradigm has recently been improved in a series of works which makes it an effective and versatile tool. In this talk, I will[…] -
-
-
Seminar
-
Cryptography
ECDSA White-Box Implementations, Feedback on CHES 2021 WhibOx Contest
Speaker : Agathe Houzelot - Idemia
Cryptographic algorithms are primarily designed to be secure in the black-box model, where an attacker can only observe their input/output behavior. However in practice, algorithms are rarely executed in a completely isolated environment and additional information is often leaked. In the context of mobile applications or connected objects, devices often lack secure storage to protect secret keys,[…] -
-
-
Seminar
-
Cryptography
Correction of dual lattice attacks
Speaker : Kevin Carrier - CY Cergy
The security of cryptographic systems such as Kyber and Dilithium (currently undergoing standardization by NIST) fundamentally hinges on the Learning With Errors (LWE) problem. However, the state of the art for attacking this problem is not yet entirely clear. Specifically, the validity of dual attacks on LWE is currently under scrutiny due to their analyses relying on heuristics that have proven[…] -