Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

667 résultats

    • Séminaire

    • Cryptographie

    Pseudorandom Correlation Generators from the Quasi-Abelian Decoding Problem

    • 19 janvier 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Clément Ducros - IRIF

    Secure multi-party computing often enhances efficiency by leveraging correlated randomness. Recently, Boyle et al. showcased the effectiveness of pseudorandom correlation generators (PCGs) in producing substantial correlated (pseudo)randomness, specifically for two-party random oblivious linear evaluations (OLEs). This process involves minimal interactions and subsequent local computations,[…]
    • Groupe de travail

    Modélisation statistique et sécurité des générateurs d'aléa pour la cryptographie

    • 08 avril 2023 (11:00 - 12:00)

    • À l'IRISA, campus de Beaulieu, Rennes

    Orateur : David Lubicz - DGA, IRMAR

    Dans cet exposé on essaie d'expliquer ce que l'on entend pas méthodes statistiques et on donne des exemples concrets d'application dans la cybersécurité.
    • Cryptography

    • Groupe de travail

    Analyse statistique des extrêmes pour la modélisation d'évènements rares ou atypiques

    • 08 avril 2023 (10:00 - 11:00)

    • À l'IRISA, campus de Beaulieu, Rennes

    Orateur : Gilles Stupfler - ENSAI

    • Séminaire

    • SoSysec

    How to decrypt without keys with GlobalPlatform SCP02 protocol

    • 06 juillet 2018

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : par Loic Ferreira (Orange Labs, IRISA)

    The GlobalPlatform SCP02 protocol is a security protocol implemented in smart cards, and used by transport companies, in the banking world and by mobile network operators (UICC/SIM cards). We describe how to perform a padding oracle attack against SCP02. The attack allows an adversary to efficiently retrieve plaintext bytes from an encrypted data field. We provide results of our experiments done[…]
    • Séminaire

    • SoSysec

    Breaking and fixing HB+DB: A Short Tale of Provable vs Experimental Security and Lightweight Designs

    • 02 février 2018

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Ioana Boureanu (University of Surrey)

    HB+ is a well-know authentication scheme purposely designed to be lightweight. However, HB+ is vulnerable to a key-recovery, man-in-the-middle (MiM) attack dubbed GRS. To this end, at WiSec2015, the HB+DB protocol added a distance-bounding dimension to HB+, which was experimentally shown to counteract the GRS attack.In this talk, we will exhibit however a number of security flaws in the HB+DB[…]
    • Séminaire

    • SoSysec

    Voting : You Can’t Have Privacy without Individual Verifiability

    • 01 mars 2019

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Joseph Lallemand (Loria)

    Electronic voting typically aims at two main security goals: vote privacy and verifiability. These two goals are often seen as antagonistic and some national agencies even impose a hierarchy between them: first privacy, and then verifiability as an additional feature. Verifiability typically includes individual verifiability (a voter can check that her ballot is counted); universal verifiability […]