Events
Seminars, conferences, workshops..., find the agenda of scientific activities carried out by CREACH LABS
-
-
Seminar
-
Cryptography
Post-Quantum Public-Key Pseudorandom Correlation Functions for OT
Speaker : Mahshid Riahinia - ENS, CNRS
Public-Key Pseudorandom Correlation Functions (PK-PCF) are an exciting recent primitive introduced to enable fast secure computation. Despite significant advances in the group-based setting, success in the post-quantum regime has been much more limited. In this talk, I will introduce an efficient lattice-based PK-PCF for the string OT correlation. At the heart of our result lie several technical[…] -
-
-
Seminar
-
SoSysec
Should I trust or should I go? A deep dive into the (not so reliable) web PKI trust model
Speaker : Romain Laborde - University of Toulouse
The padlock shown in the URL bar of our favorite web browser indicates that we are connected using a secure HTTPS connection and providing some sense of security. Unfortunately, the reality is slightly more complex. The trust model of the underlying Web PKI is invalid, making TLS a colossus with feet of clay. In this talk, we will dive into the trust model of the web PKI ecosystem to understand[…]-
SoSysec
-
Protocols
-
Network
-
-
-
Seminar
-
Cryptography
Predicting Module-Lattice Reduction
Speaker : Paola de Perthuis - CWI
Is module-lattice reduction better than unstructured lattice reduction? This question was highlighted as `Q8' in the Kyber NIST standardization submission (Avanzi et al., 2021), as potentially affecting the concrete security of Kyber and other module-lattice-based schemes. Foundational works on module-lattice reduction (Lee, Pellet-Mary, Stehlé, and Wallet, ASIACRYPT 2019; Mukherjee and Stephens[…]-
Cryptography
-
-
-
Seminar
-
Cryptography
Attacking the Supersingular Isogeny Problem: From the Delfs–Galbraith algorithm to oriented graphs
Speaker : Arthur Herlédan Le Merdy - COSIC, KU Leuven
The threat of quantum computers motivates the introduction of new hard problems for cryptography.One promising candidate is the Isogeny problem: given two elliptic curves, compute a “nice’’ map between them, called an isogeny.In this talk, we study classical attacks on this problem, specialised to supersingular elliptic curves, on which the security of current isogeny-based cryptography relies. In[…]-
Cryptography
-
Focus
Conference on Informational Influence Warfare
Informational Influence Warfare (L2I) encompasses the entire range of techniques used to detect and counter adversary information maneuvers in cyberspace. It is based on a national doctrine that takes into account regulatory, ethical, and geopolitical considerations, as well as a vast technical corpus that includes automatic language processing, large-scale data mining, analysis of collective dynamics on social networks, and more traditional cybersecurity techniques such as protection and attack methods for information systems.
The DGA's Maitrise de l'Information technical center is the MinArm's technical expert in cybersecurity and, as such, has developed expertise in the field of L2I. In collaboration with the Defense Innovation Agency, we wish to share our main technical concerns, challenges, and use cases with the academic research community in order to facilitate the implementation of collaborative projects that we will fund through our research support mechanisms, particularly Creach Labs.
The objective of this conference is to bring together all teams within the scope of CREACH LABS as well as MinArm experts working on L2I to take a cross-look at the main research challenges and facilitate the implementation of collaborative projects, allow PhD students and post-docs to present their project progress, and provide teams with a comprehensive view of ongoing work and strategic directions to take.
News
News, highlights...discover the latest information from CREACH LABS
-
CREACH LABS, partner of the 2025 European Cyber Week
We will be present at the 10th edition of the European Cyber Week 2025! Join us on November 19-20, 2025, at the Couvent des Jacobins in Rennes.September 30, 2025 -
CREACH LABS - annual postdoctoral and research engineer funding campaign
CREACH LABS launches its 2025 call for projects to fund postdoctoral and research engineer positions.November 08, 2024 -
CREACH LABS - Annual PhD Funding Campaign
CREACH LABS launches its 2025 thesis grants campaign, joint with the DGA, AID, the Brittany Region and the EUR CyberSchool.November 04, 2024
Publications
Articles, theses, white papers... find scientific publications resulting from research works and scientific collaborations supported by CREACH LABS.
-
-
Article
« Energy backdoor attack to deep neural networks »
The transition to deep learning has led to a significant surge in computing complexity and energy consumption. This trend has prompted the adoption of acceleration hardware like tensor processing units (TPUs) and application specific integrated circuits (ASICs) to facilitate energy-efficient deployment on edge and mobile devices. However, recent studies have revealed their vulnerability to energy[…] -
-
-
White paper
« Security supervision »
Security supervision is a field initiated in the 1980s. Even if the foundations of the field have remained unchanged for 40 years, the techniques for implementing them have of course greatly evolved. -
-
-
Article
« BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports »
Malware analysis consists of studying a sample of suspicious code to understand it and producing a representation or explanation of this code that can be used by a human expert or a clustering/classification/detection tool. -
Jobs
Discover job opportunities (PhDs, postdocs, research engineer positions...) from CREACH LABS-funded projects and our partner organizations.