Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

633 results

    • Seminar

    • Cryptography

    Computational assumptions in the quantum world

    • November 22, 2024 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Alex Bredariol Grilo - LIP6 (CNRS / Sorbonne Université)

    QKD is a landmark of how quantum resources allow us to implement cryptographicfunctionalities with a level of security that is not achievable only with classical resources.However, key agreement is not sufficient to implement all functionalities of interest, and it iswell-known that they cannot be implemented with perfect security, even if we have accessto quantum resources. Thus, computational[…]
    • Cryptography

    • Conference

    • Cryptography

    • TRNG

    • Hardware architecture

    • PUF

    • Embedded systems

    Random Number Generators and Physical Unclonable Functions by DGA

    • From November 20, 2024 to November 21, 2024 (09:00 - 18:00)

    • 20, Place Saint-Anne, 35000 Rennes - France - Métro ligne A - Station Place Saint-Anne

    The aim of this conference is to bring together some of the best European teams whether they come from the academic world, industry or administrations in order to have a meeting of minds on the main stakes for research, to boost collaborative projects, and allow researchers to have a global and shared vision of what is done and of the strategic directions to follow.
    • Seminar

    • Cryptography

    MinRank Gabidulin encryption scheme on matrix codes

    • October 11, 2024 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Adrien Vinçotte - XLIM, Université de Limoges

    The McEliece scheme is a generic framework allowing to use any error correcting code which disposes of an efficient decoding algorithm to design an encryption scheme by hiding a generator matrix of this code.In the context of rank metric, we propose a generalization of the McEliece frame to matrix codes. From a vector code, we compute a matrix version of this code, that is hidden in such a way[…]
    • Cryptography

    • Asymmetric primitive

    • Seminar

    • Cryptography

    Polytopes in the Fiat-Shamir with Aborts Paradigm

    • November 29, 2024 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Hugo Beguinet - ENS Paris / Thales

    The Fiat-Shamir with Aborts paradigm (FSwA) uses rejection sampling to remove a secret’s dependency on a given source distribution.  Recent results revealed that unlike the uniform distribution in the hypercube, both the continuous Gaussian and the uniform distribution within the hypersphere minimise the rejection rate and the size of the proof of knowledge. However, in practice both these[…]
    • Cryptography

    • Asymmetric primitive

    • Mode and protocol

    • Seminar

    • Cryptography

    Improved Provable Reduction of NTRU and Hypercubic Lattices

    • October 18, 2024 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Henry Bambury - ENS Paris

    Lattice-based cryptography typically uses lattices with special properties to improve efficiency.  We show how blockwise reduction can exploit lattices with special geometric properties, effectively reducing the required blocksize to solve the shortest vector problem to half of the lattice's rank, and in the case of the hypercubic lattice , further relaxing the approximation factor of blocks[…]
    • Cryptography

    • Asymmetric primitive

    • Seminar

    • SoSysec

    Safety-Security Convergence of Industrial Control Systems

    • December 13, 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - Room Aurigny

    Speaker : Maxime Puys - Université Clermont Auvergne - IUT de Clermont-Ferrand

    Industrial Control Systems (ICS) are designed to provide a service, such as power generation or water treatment, while protecting people, assets, and the environment against hazards. However, ICS now integrate Information Technology (IT) and are interconnected with the outside world such as the Internet, thereby exposing their infrastructures to cyberattacks. Cyberattacks have thus become new[…]
    • SoSysec

    • Intrusion detection