Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

644 results

    • Seminar

    • SemSecuElec

    Post-Quantum Cryptography Hardware: Monolithic Implementations vs. Hardware-Software Co-Design

    • April 23, 2021

    • PQShield – United Kingdom - Web-Conférence

    Speaker : Markku-Juhani Saarinen

    At PQShield, we’ve developed dedicated coprocessor(s) for lattice schemes, hash-based signatures, and code-based cryptography. These cryptographic modules are commercial rather than academic and designed to meet customer specifications such as a specific performance profile or Common Criteria and FIPS security certification requirements.Hardware implementations of legacy RSA and Elliptic Curve[…]
    • Seminar

    • SemSecuElec

    Do Not Trust Modern System-on-Chips - Electromagnetic fault injection against a System-on-Chip

    • May 10, 2019

    • INRIA - Salles Petri/Turing

    Speaker : Ronan Lashermes

    Electromagnetic fault injection (EMFI) is a well known technique to disturb the behavior of a chip and weaken its security. These attacks are still mostly done on simple microcontrollers since the fault effects is relatively simple and understood.Unlocking EMFI on modern System-on-Chips (SoCs), the fast and complex chips ubiquitous today, requires to understand the impact of the faults. In this[…]
    • Seminar

    • SemSecuElec

    Implémentations sécurisées et évaluation pré-silicium contre les attaques physiques.

    • February 04, 2022

    • Secure-IC - Web-conférence

    Speaker : Sofiane Takarabt

    Side-channel attacks remain a permanent threat against embedded systems, thus reliable protections should be implemented and must be minutely evaluated. In this presentation, we study different possible ways to evaluate against such threats. We show how an evaluation can be carried out to validate a security level of a protected hardware implementation. This approach allows us to estimate in[…]
    • Seminar

    • SemSecuElec

    Vers une meilleure compréhension de l’apprentissage profond appliqué aux attaques par observation

    • January 10, 2020

    • CEA - Salle Métivier

    Speaker : Loïc Masure

    Les attaques par observation (SCA) exploitent les failles d’une primitive cryptographique embarquée sur un composant (type carte à puce, IoT, …), en mesurant des grandeurs physiques qui dépendent indirectement de la valeur de la clé secrète. C’est pourquoi il est primordial pour les développeurs de proposer des contre-mesures adaptées et d’évaluer leur efficacité face à un attaquant potentiel.Au[…]
    • Seminar

    • Cryptography

    Isogenies over Hessian Model of Elliptic Curves

    • June 03, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Emmanuel Fouotsa - Université de Bamenda

    In this talk we present explicit formulas for isogenies between elliptic curves in (twisted) Hessian form. We examine the numbers of operations in the base field to compute the formulas. In comparison with other isogeny formulas, we note that the obtained formulas for twisted Hessian curves have the lowest costs for processing the kernel and the X-affine formula has the lowest cost for processing[…]
    • Seminar

    • Cryptography

    Soutenance de thèse: Algebraic Cryptanalysis of the Shortest Vector Problem in Ideal Lattices

    • June 13, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Olivier Bernard - Rennes