Presentation

Led by an organizing committee and a scientific committee bringing together academic, state and industrial partners, each seminar explores the themes of its subject on a weekly or monthly basis, in the form of one-hour sessions where researchers from various backgrounds come to present and discuss their latest work in a public session.

    • Seminar

    • Cryptography

    Cryptography seminar

    • The cryptography seminar of Rennes takes place every Friday at 1:45 p.m. Any participant can suggest a guest or a talk subject by sending an email to one of the scientific committee members.

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    • Cryptography

    • Asymmetric primitive

    • Mode and protocol

    • Protocols

    • TRNG

    • Seminar

    • SemSecuElec

    SemSecuElec seminar

    • One Friday per month at 10:00 a.m.

    • Inria Center of the University of Rennes - Espace de conférences

    • SemSecuElec

    • Fault injection

    • Embedded systems

    • Micro-architectural vulnerabilities

    • Hardware countermeasures

    • Side-channel

    • TRNG

    • Machine learning

    • Hardware trojan

    • Hardware reverse

    • Cryptography

    • Hardware accelerator

    • Hardware architecture

    • Network

    • SoSysec

    • Compartmentalization

    • Implementation of cryptographic algorithm

    • Seminar

    • SoSysec

    SoSySec Seminar

    • Every Friday at 11:00 a.m.

    • Inria Center of the University of Rennes - - Room TBD

    • SoSysec

    • Intrusion detection

    • Risk Assessment

    • Privacy

    • Machine learning

    • Distributed systems

    • Risk management

    • Formal methods

    • Protocols

    • Compartmentalization

    • Operating system and virtualization

    • Malware analysis

    • Binary analysis

    • Obfuscation

    • Cryptography

    • Databases

    • Secure storage

    • SemSecuElec

    • Hardware/software co-design

    • Hardware architecture

    • Network

    • Security policies

    • Vulnerability management

    • Law

    • Micro-architectural vulnerabilities