649 résultats

  • Les cyber opérations, entre opportunités stratégiques et contraintes opérationnelles

    • 01 octobre 2021

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Stéphane Taillat (Académie Militaire de Saint Cyr-Coëtquidan)

    Le recours aux opérations numériques et au cyberespace s’est généralisé dans la gestion des crises et des conflits internationaux. Pour autant, aucune des cyber opérations étatiques ou prêtées à des États n’ont débouché sur des conflits armés ou sur une escalade significative des tensions. A ce titre, cette conférence cherche à s’interroger sur l’utilité stratégique des opérations numériques et du[…]
  • Unique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection

    • 25 juin 2021

    • Bar-Ilan University (BIU) - Web-Conférence

    Orateur : Itamar Levi

    In this seminar I will first discuss unique computer aided design (CAD) compatible SCA security mechanisms. I will present an approach which can significantly increase the physical security-level of a design, be implemented with conventional design-tools and which does not require any special technological-support. The method consists with a correct by-design utilization of power-management[…]
  • Code-based postquantum cryptography : candidates to standardization

    • 23 avril 2021

    • INRIA - Web-Conférence

    Orateur : Nicolas Sendrier

    At the third round of the NIST standardization process, three candidates remain with a security based on error correcting codes, all are key exchange mechanisms. We will explore them according to their security assumptions and properties. Among them, we find an historical scheme (Classic McEliece), as well as schemes using sparse and quasi-cyclic matrices (BIKE and HQC). We will examine pros and[…]
  • Code-based postquantum cryptography : candidates to standardization

    • 23 avril 2021

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Nicolas Sendrier - INRIA

    At the third round of the NIST standardization process, three candidates remain with a security based on error correcting codes, all are key exchange mechanisms. We will explore them according to their security assumptions and properties. Among them, we find an historical scheme (Classic McEliece), as well as schemes using sparse and quasi-cyclic matrices (BIKE and HQC). We will examine pros and[…]
  • Post-Quantum Cryptography Hardware: Monolithic Implementations vs. Hardware-Software Co-Design

    • 23 avril 2021

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Markku-Juhani Saarinen - PQShield

    At PQShield, we've developed dedicated coprocessor(s) for lattice schemes, hash-based signatures, and code-based cryptography. These cryptographic modules are commercial rather than academic and designed to meet customer specifications such as a specific performance profile or Common Criteria and FIPS security certification requirements. Hardware implementations of legacy RSA and Elliptic Curve[…]
  • co-organisée avec le séminaire sécurité des systèmes électroniques embarqués

    • 23 avril 2021

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : mot de passe: 344005 - très classe le mot de passe en clair !

    https://seminaires-dga.inria.fr/securite-elec/<br/&gt; lien: https://bbb.irisa.fr/b/ger-mvp-9xd