Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

644 results

    • Seminar

    • SemSecuElec

    Calibration Done Right: Noiseless Flush+Flush Attacks

    • March 19, 2021

    • DGA-IRISA - Web-Conférence

    Speaker : Guillaume Didier

    Caches leak information through timing measurements and so-called side-channel attacks. Several primitives exist with different requirements and trade-offs. Flush+Flush is a stealthy and fast cache attack primitive that uses the timing of the clflush instruction depending on the presence of a line in the cache. However, the CPU interconnect plays a bigger role than thought in these timings, and[…]
    • Seminar

    • SemSecuElec

    True Random Number Generators enabled hardware security

    • March 29, 2019

    • Hardware Security and Cryptographic Processor Lab, Institute of Microelectronics, Tsinghua University, China - Métivier

    Speaker : Bohan Yang

    True randomness is all about unpredictability, which can neither be qualified nor quantified by examining statistics of a sequence of digits. Unpredictability is a property of random phenomena, which is measured in bits of information entropy. Application of randomness spans from art to numerical computing and system security. Random numbers enable various cryptographic algorithms, protocols and[…]
    • Seminar

    • SemSecuElec

    Rank metric cryptography and its implementations

    • October 08, 2021

    • XLIM – Université de Limoges - Salle Pétri/Turing

    Speaker : Nicolas Aragon

    In 2017, the NIST (National Institute for Standards and Technology) started astandardization process in order to select post-quantum encryption and digital signature schemes. Among the proposed solutions, two rank-metric based encryption schemes were selected for the second round of the standardization process: ROLLOand RQC.This raised questions about both the performance and the security of the[…]
    • Seminar

    • SemSecuElec

    Side Channel Analysis: Instruction extraction and Information estimation

    • May 06, 2022

    • CEA-LETI; Université de Montpellier, LIRMM - Salle Pétri/Turing

    Speaker : Valence Cristiani

    Side-channel usually aims at extracting cryptographic secrets from electronic devices through their physical leakages. However, these channels can leak other sensitive information. The first part of this talk will present a study of side channel-based disassembling (SCBD) that aims to recover instructions executed by a microcontroller. The main threat represented by SCBD is that it potentially[…]
    • Seminar

    • SemSecuElec

    Challenges related to random number generation for cryptographic applications

    • June 07, 2019

    • Laboratoire Hubert Curien - Salles Petri/Turing

    Speaker : Elie Noumon Allini

    The main purpose of cryptography is to ensure secure communication. In order to achieve this goal, cryptographic schemes make an intensive use of random numbers. Given that the security of these schemes highly depends on these numbers, it is important to produce high-quality random numbers. Knowing that most cryptographic modules are nowadays implemented in logic devices, we investigated True[…]
    • Seminar

    • SemSecuElec

    Cryptographie légère intrinsèquement résistante aux attaques physiques pour l’Internet des Objets

    • May 25, 2018

    • CEA-Tech, Laboratoire Systèmes et Architectures Sécurisés (LSAS) - Salles Petri/Turing

    Speaker : Benjamin Lac

    Avec des applications telles que les smart phones , compteurs intelligents, capteurs et autres systèmes industriels de type SCADA, le nombre d objets connectés à Internet atteindrait les 20 milliards d ici 2020. Les contraintes de taille, coût et consommation ainsi que les problématiques de sécurité liées au déploiement de ces objets à si grande échelle ont mené à la conception de systèmes de[…]