Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

657 results

    • Seminar

    • SemSecuElec

    Acquisition and Exploitation of Traces from Connected Devices

    • September 27, 2024 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Speaker : Francesco Servida - École des Sciences Criminelles, Université de Lausanne

    This presentation aims to give an overview of the traces that can be obtained from connected objects as witnesses or actors at a crime scene. Using several scenarios we cover the challenges of detecting connected devices, the relevant locations for data retrieval and the techniques for acquiring said data. We then present how such data can be useful in helping to understand the dynamics of events[…]
    • SemSecuElec

    • Embedded systems

    • Seminar

    • SemSecuElec

    Understanding and fighting fault injections with programming languages

    • September 27, 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Speaker : Sébastien Michelland - Université Grenoble Alpes, Grenoble INP, LCIS

    Would your latest program produce correct results if I skipped a statement in it? Two? Corrupted a variable at random? Then it might not be robust against _fault injection attacks_, which target hardware directly and have such effects. To be fair, nothing really resists them; still, efforts in designing protections have come a long way, relying (perhaps surprisingly) in large part on hardening[…]
    • SemSecuElec

    • Fault injection

    • Seminar

    • Cryptography

    Quantum Linear Key-recovery Attacks Using the QFT

    • February 09, 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : André Schrottenloher - IRISA

    The Quantum Fourier Transform is a fundamental tool in quantum cryptanalysis, not only as the building block of Shor's algorithm, but also in attacks against symmetric cryptosystems. Indeed, hidden shift algorithms such as Simon's (FOCS 1994), which rely on the QFT, have been used to obtain attacks on some very specific block cipher structures. The Fourier Transform is also used in classical[…]
    • Seminar

    • Cryptography

    TBD (To be decided closer to the date of the talk)

    • April 05, 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Lisa Kohl - CWI

    TBD (To be decided closer to the date of the talk)
    • Seminar

    • Cryptography

    How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.

    • November 10, 2023

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Léo Robert - Université d'Amiens

    Post-Compromise Security (PCS) is a property of secure-channel establishment schemes, which limits the security breach of an adversary that has compromised one of the endpoint to a certain number of messages, after which the channel heals. An attractive property, especially in view of Snowden's revelation of mass-surveillance, PCS features in prominent messaging protocols such as Signal. In this[…]
    • Seminar

    • Cryptography

    SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes

    • June 14, 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Denis Nabokov - Université de Lund

    Whereas theoretical attacks on standardized crypto primitives rarely lead to actual practical attacks, the situation is different for side-channel attacks. Improvements in the performance of side-channel attacks are of utmost importance. In this paper, we propose a framework to be used in key-recovery side-channel attacks on CCA-secure post-quantum encryption schemes. The basic idea is to[…]