Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
633 results
-
-
Conference
-
Cryptography
Post-quantum cryptography by DGA
Building on the success of the 2021 and 2022 conferences, CREACH LABS is pleased to announce, in collaboration with the General Directorate of Armament (DGA) the 3rd edition of "post-quantum cryptography" conference at European Cyber Week 2024. -
-
CREACH LABS, Partner of European Cyber Week 2024
CREACH LABS is pleased to invite you to join us from November 18th to 21st, 2024 at the Couvent des Jacobins in Rennes during the European Cyber Week, Europe's leading cybersecurity and cyberdefense event.October 28, 2024 -
-
Seminar
-
SemSecuElec
Cryptanalytical extraction of complex Neural Networks in black-box settings
Speaker : Benoit COQUERET - INRIA, Thales CESTI
With the widespread development of artifical intelligence, Deep Neural Networks (DNN) have become valuable intellectual property (IP). In the past few years, software and hardware-based attacks targetting at the weights of the DNN have been introduced allowing potential attacker to gain access to a near-perfect copy of the victim's model. However, these attacks either fail against more complex[…]-
SemSecuElec
-
Side-channel
-
Machine learning
-
-
-
Seminar
-
SemSecuElec
The influence of flicker noise on ring oscillator-based TRNGs
Speaker : Licinius-Pompiliu BENEA - Univ. Grenoble Alpes, CEA, LETI
Ring oscillators (ROs) are often used in true random number generators (TRNGs). The jitter of their clock signal, used as a source of randomness, stems from thermal and flicker noises. While thermal noise jitter is often identified as the main source of randomness, flicker noise jitter is not taken into account due to its autocorrelated nature which greatly complexifies modelling. However, it is a[…]-
SemSecuElec
-
TRNG
-
-
-
Seminar
-
SoSysec
Un protocole SMPC de curation de données d'entrainement et sa fragilité aux hypothèses de sécurité...
Speaker : Marc-Olivier Killijian - Université du Québec à Montréal
... ou "Sécurité et insécurité - dans quel état j’erre, ai-je bien rangé mon modèle de sécurité ?" De nos jours, les sources de données, et leurs curateurs, sont répartis à travers le monde. Il arrive que les propriétaires de ces données souhaitent collaborer entre eux afin d’augmenter la qualité de ces données, particulièrement avant d’entrainer des modèles d’apprentissage machine.Dans cet exposé[…]-
SoSysec
-
Privacy
-
Machine learning
-
Distributed systems
-
-
-
Seminar
-
Cryptography
Solving the Tensor Isomorphism Problem for Special Orbits
Speaker : Valerie Gilchrist - ULB
Public key cryptography relies on using mathematical functions that are easy to compute but hard to invert. A recent work by D'Alconzo, Flamini, and Gangemi attempted to build such a function from tensors and use it to create a commitment scheme. In this talk, we will review their construction and present an attack on it, rendering it completely insecure. We will also offer an approach to[…]-
Cryptography
-
Asymmetric primitive
-
Protocols
-