Table of contents

Description

  • Speaker

    Loïc Miller - CentraleSupélec

As the European Union develops a legal framework for crypto-assets and data protection, the technological question underlying the emergence of a genuine digital currency remains open. Blockchain today stands as an interdisciplinary field of study at the crossroads of computer science, economics, and law. This presentation will place the ongoing regulatory framework in perspective with the technical barriers that still hinder the adoption of blockchains, namely scalability, sustainability, and interoperability. The aim is to show that, alongside the construction of a European legal order for blockchain, the very possibility of a practical and widespread use of this technology depends on overcoming these fundamental challenges.

Practical infos

Next sessions

  • Vers l’émergence d’un droit européen pour la Blockchain : Une approche sous l’angle de la Privacy et de l’encadrement des crypto-actifs

    • December 05, 2025 (10:00 - 11:00)

    • Inria Center of the University of Rennes - Aurigny room

    Speaker : Damien Franchi - Univ Rennes, IODE

    La Blockchain, technologie derrière Bitcoin, fait l’objet d’un encadrement juridique de plusen plus important, en particulier de la part de l’Union européenne. Curieusement, le mot« Blockchain » n’apparaît pas dans les textes l’encadrant. Les expressions « technologie deregistres distribués » (Distributed ledger technology, DLT), ou, parfois, « registreélectronique » lui sont plutôt privilégiées.[…]
    • SoSysec

    • Law

  • Hardware-Software Co-Designs for Microarchitectural Security

    • December 11, 2025 (11:00 - 12:00)

    • Inria Center of the University of Rennes - Room Petri/Turing

    Speaker : Lesly-Ann Daniel - EURECOM

    Microarchitectural optimizations, such as caches and speculative out-of-order execution, are essential for achieving high performance. However, these same mechanisms also open the door to attacks that can undermine software-enforced security policies. The current gold standard for defending against such attacks is the constant-time programming discipline, which prohibits secret-dependent control[…]
    • SoSysec

    • Hardware/software co-design

    • Micro-architectural vulnerabilities

Show previous sessions