Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

687 results

    • Seminar

    • SemSecuElec

    One Fault Can Go A Long Way

    • November 15, 2019

    • Nanyang Technological University - Métivier

    Speaker : Shivam Bhasin

    *Abstract:* Fault attacks are considered among critical threat to embedded cryptography. This talk will be divided into in two parts. The first part of the talk will explore application of faults on advanced security primitives. We present persistent fault analysis introduced at CHES 2017 and its capability to bypass state of the art fault countermeasures as well as higher-order masking with one[…]
    • Seminar

    • SemSecuElec

    Security of Hardware/Software Interfaces : Research Chair of the Cybersecurity Research Cluster

    • June 22, 2018

    • Centrale-Supelec - Salles Petri/Turing

    Speaker : Guillaume Hiet

    We proposed to host a thematic semester on attacks based on the interaction between software and hardware. The goal would be to host one workshop, one summer school for young researchers, as well as multiple seminars and longer stays for researchers, spanning September 2019 to March or April 2020. This thematic semester will be funded by the DGA in the context of the Cybersecurity Research Cluster[…]
    • Seminar

    • SemSecuElec

    Lattice-based NIST candidates: abstractions and ninja tricks

    • April 23, 2021

    • PQShield – United Kingdom - Web-Conférence

    Speaker : Thomas Prest

    I will present the remaining lattice-based candidates for standardization by NIST (2 signature schemes, 5 encryption schemes). At a high level, these can all be interpreted as straightforward instantiations of decades-old paradigms. But when we look under the hood, all of them make design choices which impact their security, efficiency and portability in distinct manners; we will discuss these.[…]
    • Seminar

    • SemSecuElec

    TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost

    • April 05, 2019

    • INRIA - Salles Pétri/Turing

    Speaker : Ludovic Claudepierre

    Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…]
    • Seminar

    • SemSecuElec

    When Electromagnetic Signals Reveal Obfuscated Malware: Deep and Machine Learning Use cases

    • October 22, 2021

    • Univ Rennes, CNRS, Inria, IRISA Rennes - Salle Petri/Turing

    Speaker : Duy-Phuc Pham et Damien Marion

    The Internet of Things (IoT) is constituted of devices that are expo-nentially growing in number and in complexity. They use plentiful customized firmware and hardware, ignoring potential security issues, which make them a perfect victim for cybercriminals, especially malware authors.We will describe a new usage of side channel information to identify threats that are targeting the device. Using[…]
    • Seminar

    • Cryptography

    On Rejection Sampling in Lyubashevsky's Signature Scheme

    • May 06, 2022

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Julien Devevey - ENS de Lyon

    Lyubashevsky’s signatures are based on the Fiat-Shamir with aborts paradigm, whose central ingredient is the use of rejection sampling to transform (secret-key-dependent) signature samples into samples from a secret-key-independent distribution. The choice of these two underly- ing distributions is part of the rejection sampling strategy, and various instantiations have been considered up to this[…]