589 résultats

  • TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost

    • 05 avril 2019

    • INRIA - Salles Pétri/Turing

    Orateur : Ludovic Claudepierre

    Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…]
  • Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages

    • 05 avril 2019

    • Faculté des sciences de Limoges - Salles Pétri/Turing

    Orateur : Léo Reynaud

    Les attaques side channel classiques nécessitent généralement la connaissance du clair (ou du chiffré) afin de calculer des données internes qui seront comparées à des fuites. Des attaques permettent cependant de s’affranchir de ces connaissances, les attaques par distributions jointes. Ces attaques supposent un attaquant capable d’inverser le modèle de consommation, mais aucune connaissance sur[…]
  • True Random Number Generators enabled hardware security

    • 29 mars 2019

    • Hardware Security and Cryptographic Processor Lab, Institute of Microelectronics, Tsinghua University, China - Métivier

    Orateur : Bohan Yang

    True randomness is all about unpredictability, which can neither be qualified nor quantified by examining statistics of a sequence of digits. Unpredictability is a property of random phenomena, which is measured in bits of information entropy. Application of randomness spans from art to numerical computing and system security. Random numbers enable various cryptographic algorithms, protocols and[…]
  • Toutes les informations ici https://cca.inria.fr/

    • 29 mars 2019

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Ilaria Chillotti, Ayoub Otmani, Ida Tucker et Brice Minaud - Séminaire C2

  • Designing and deploying post-quantum cryptography

    • 08 mars 2019

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Jean-Philippe Aumasson - Teserakt AG

    I will review the hash-based signature submitted to the NIST competition jointly with Guillaume Endignoux, discussing its assurance level and performance. Then I will discuss the challenges of deploying post-quantum cryptography in an end-to-end encryption product for machine-to-machine communications.<br/> lien: http://desktop.visio.renater.fr/scopia?ID=721783***6864&autojoin
  • Discrete logarithm computation in finite fields GF(p^k) with NFS

    • 01 mars 2019

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Aurore Guillevic - INRIA

    Pairings on elliptic curves are involved in signatures, NIZK, and recently in blockchains (ZK-SNARKS).<br/> These pairings take as input two points on an elliptic curve E over a finite field, and output a value in an extension of that finite field. Usually for efficiency reasons, this extension degree is a power of 2 and 3 (such as 12,18,24), and moreover the characteristic of the finite field has[…]