Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

705 results

    • Seminar

    • Cryptography

    Correction of dual lattice attacks

    • April 19, 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Kevin Carrier - CY Cergy

    The security of cryptographic systems such as Kyber and Dilithium (currently undergoing standardization by NIST) fundamentally hinges on the Learning With Errors (LWE) problem. However, the state of the art for attacking this problem is not yet entirely clear. Specifically, the validity of dual attacks on LWE is currently under scrutiny due to their analyses relying on heuristics that have proven[…]
    • Seminar

    • Cryptography

    Password-Authenticated Key Exchange (PAKE) from Isogenies

    • December 08, 2023

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Sabrina Kunzweiler - Université Bordeaux

    The passwords that we use in our everyday life are often chosen to be easily memorable which makes them vulnerable to attacks. This problem is addressed by password-authenticated key exchange (PAKE). The general idea is to enable two parties who share the same (potentially weak) password to establish a strong session key. Most PAKE protocols used today are based on Diffie-Hellman key exchange in[…]
    • Seminar

    • Cryptography

    ECDSA White-Box Implementations, Feedback on CHES 2021 WhibOx Contest

    • September 29, 2023

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Agathe Houzelot - Idemia

    Cryptographic algorithms are primarily designed to be secure in the black-box model, where an attacker can only observe their input/output behavior. However in practice, algorithms are rarely executed in a completely isolated environment and additional information is often leaked. In the context of mobile applications or connected objects, devices often lack secure storage to protect secret keys,[…]
    • Working group

    Modélisation statistique et sécurité des générateurs d'aléa pour la cryptographie

    • April 08, 2023 (11:00 - 12:00)

    • À l'IRISA, campus de Beaulieu, Rennes

    Speaker : David Lubicz - DGA, IRMAR

    Dans cet exposé on essaie d'expliquer ce que l'on entend pas méthodes statistiques et on donne des exemples concrets d'application dans la cybersécurité.
    • Cryptography

    • Working group

    Analyse statistique des extrêmes pour la modélisation d'évènements rares ou atypiques

    • April 08, 2023 (10:00 - 11:00)

    • À l'IRISA, campus de Beaulieu, Rennes

    Speaker : Gilles Stupfler - ENSAI

    • Seminar

    • SoSysec

    Binary Edwards Curves for intrinsically secure ECC implementations for the IoT

    • September 07, 2018

    • Inria Center of the University of Rennes - - Room TBD

    Speaker : Antoine Loiseau (CEA)

    Even if recent advances in public key cryptography tend to focus on algorithms able to survive the post quantum era, at present, there is a urgent need to propose fast, low power and securely implemented cryptography to address the immediate security challenges of the IoT. In this talk, we present a new set of Binary Edwards Curves which have been defined to achieve the highest security levels (up[…]