Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
715 results
-
-
Seminar
-
Cryptography
Post-quantum Group-based Cryptography
Speaker : Delaram Kahrobaei - The City University of New York
Group-based cryptography is a relatively new family in post-quantum cryptography, with high potential. I will give a general survey of the status of post-quantum group-based cryptography and present some recent results.In the second part of my talk, I speak about Post-quantum hash functions using special linear groups. This hash function is a generalization of Tillich-Zemor hash function as well[…] -
-
-
Seminar
-
SemSecuElec
I know what your compiler did: Optimization Effects on Power Side-Channel Leakage for RISC-V
Speaker : Ileana Buhan - Radboud University Nijmegen
With the growing prevalence of software-based cryptographic implementations in high-level languages, understanding the role of architectural and micro-architectural components in side-channel security is critical. The role of compilers in case of software implementations towards contribution to side-channel leaks is not investigated. While timing-based side-channel leakage due to compiler effects[…]-
SemSecuElec
-
Side-channel
-
-
-
Seminar
-
SemSecuElec
Hardware Trojan Horses and Microarchitectural Side-Channel Attacks: Detection and Mitigation via Hardware-based Methodologies
Speaker : Alessandro PALUMBO - CentraleSupélec, IRISA, Inria
Hardware Trojan Horses that are software-exploitable can be inserted into microprocessors, allowing attackers to run unauthorized code or escalate privileges. Additionally, it has been demonstrated that attackers could observe certain microprocessor features - seemingly unrelated to the program's execution - to exfiltrate secrets or private data. So, even devices produced in secure foundries could[…]-
SemSecuElec
-
Side-channel
-
Micro-architectural vulnerabilities
-
Hardware trojan
-
-
-
Seminar
-
SemSecuElec
Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection
Speaker : Alan Díaz Rizo - Sorbonne Université Lip6
The threat of Hardware Trojan-based Covert Channels (HT-CCs) presents a significant challenge to the security of wireless communications. In this work, we generate in hardware and make open-source a dataset for various HT-CC scenarios. The dataset represents transmissions from a HT-infected RF transceiver hiding a CC that leaks information. It encompasses a wide range of signal impairments, noise[…]-
SemSecuElec
-
Machine learning
-
Hardware trojan
-
-
CREACH LABS - Annual PhD Funding Campaign
CREACH LABS launches its 2026 thesis grants campaign, joint with the DGA, AID, the Brittany Region and the EUR CyberSchool.November 06, 2025 -
-
Conference
-
Cryptography
Post-quantum cryptography by DGA
Building on the success of the 2021 and 2022 conferences, CREACH LABS is pleased to announce, in collaboration with the General Directorate of Armament (DGA) the 3rd edition of "post-quantum cryptography" conference at European Cyber Week 2024. -