599 results
-
Computational assumptions in the quantum world
Speaker : Alex Bredariol Grilo - LIP6 (CNRS / Sorbonne Université)
QKD is a landmark of how quantum resources allow us to implement cryptographicfunctionalities with a level of security that is not achievable only with classical resources.However, key agreement is not sufficient to implement all functionalities of interest, and it iswell-known that they cannot be implemented with perfect security, even if we have accessto quantum resources. Thus, computational[…]-
Cryptography
-
-
The Battle Against Bots: Current Threats and New Directions to Counter Automated Attacks
Speaker : Elisa Chiapponi - Amadeus IT Group
In today's digital landscape, the battle between industry and automated bots is an ever-evolving challenge. Attackers are leveraging advanced techniques such as residential proxies, CAPTCHA farms, and AI-enhanced fingerprint rotations to evade detection and execute functional abuse attacks, including web scraping, denial of inventory, and SMS pumping. This talk will explore ongoing efforts[…]-
SoSysec
-
Intrusion detection
-
-
Solving the Tensor Isomorphism Problem for Special Orbits
Speaker : Valerie Gilchrist - ULB
Public key cryptography relies on using mathematical functions that are easy to compute but hard to invert. A recent work by D'Alconzo, Flamini, and Gangemi attempted to build such a function from tensors and use it to create a commitment scheme. In this talk, we will review their construction and present an attack on it, rendering it completely insecure. We will also offer an approach to[…]-
Cryptography
-
Asymmetric primitive
-
Protocols
-
-
Improved Provable Reduction of NTRU and Hypercubic Lattices
Speaker : Henry Bambury - ENS Paris
Lattice-based cryptography typically uses lattices with special properties to improve efficiency. We show how blockwise reduction can exploit lattices with special geometric properties, effectively reducing the required blocksize to solve the shortest vector problem to half of the lattice's rank, and in the case of the hypercubic lattice , further relaxing the approximation factor of blocks[…]-
Cryptography
-
Asymmetric primitive
-
-
(On) The Impact of the Micro-architecture on the Masking Countermeasure against Side-Channel Attacks
Speaker : Lorenzo Casalino - CentraleSupélec, IRISA, Inria (SUSHI team)
The masking countermeasure constitutes a provably secure approach against side-channel attacks. Nonetheless, in the software context, the micro-architecture underlying a given CPU potentially induces information leakages undermining the masking's proven security.In this seminar, I will present the research work developed during my Ph.D. at CEA-List in Grenoble. This work addresses, along two axes,[…]-
SemSecuElec
-
Side-channel
-
Micro-architectural vulnerabilities
-
-
Code Encryption for Confidentiality and Execution Integrity down to Control Signals
Speaker : Théophile Gousselot - Mines Saint-Etienne, CEA, Leti, Centre CMP, F - 13541 Gardanne France
Embedded devices face software and physical fault injections to either extract or tamper with code in memory. The code execution and code intellectual property are threatened. Some existing countermeasures provide Control Flow Integrity (CFI) extended with the confidentiality and integrity of the instructions by chaining all of them through a cryptographic encryption primitive. While tampering[…]-
SemSecuElec
-
Fault injection
-
Micro-architectural vulnerabilities
-
Hardware countermeasures
-