Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

681 results

    • Seminar

    • SoSysec

    Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate

    • February 25, 2022

    • Inria Center of the University of Rennes - - Room TBD

    Speaker : Grégoire Menguy (CEA LIST)

    Code obfuscation aims at protecting Intellectual Property and other secrets embedded into software from being retrieved. Recent works leverage advances in artificial intelligence (AI) with the hope of getting blackbox deobfuscators completely immune to standard (whitebox) protection mechanisms. While promising, this new field of AI-based, and more specifically search-based blackbox deobfuscation,[…]
    • Seminar

    • SoSysec

    Squirrel: a new approach to computer-assisted proofs of protocols in the computational model.

    • April 16, 2021

    • Inria Center of the University of Rennes - - Room TBD

    Speaker : David Baelde (ENS Cachan)

    Formal methods have brought several approaches for proving that security protocols ensure the expected security and privacy properties. Most of the resulting tools analyze protocols in symbolic models, aka. Dolev-Yao-style models. Security in the symbolic model does not imply security in the cryptographer’s standard model, the computational model, where attackers are arbitrary (PPTIME) Turing[…]
    • Seminar

    • SemSecuElec

    Implémentations sécurisées et évaluation pré-silicium contre les attaques physiques.

    • February 04, 2022

    • Secure-IC - Web-conférence

    Speaker : Sofiane Takarabt

    Side-channel attacks remain a permanent threat against embedded systems, thus reliable protections should be implemented and must be minutely evaluated. In this presentation, we study different possible ways to evaluate against such threats. We show how an evaluation can be carried out to validate a security level of a protected hardware implementation. This approach allows us to estimate in[…]
    • Seminar

    • SemSecuElec

    One Fault Can Go A Long Way

    • November 15, 2019

    • Nanyang Technological University - Métivier

    Speaker : Shivam Bhasin

    *Abstract:* Fault attacks are considered among critical threat to embedded cryptography. This talk will be divided into in two parts. The first part of the talk will explore application of faults on advanced security primitives. We present persistent fault analysis introduced at CHES 2017 and its capability to bypass state of the art fault countermeasures as well as higher-order masking with one[…]
    • Seminar

    • SemSecuElec

    Schindler-Itoh/Wiemers revisited: recovering full RSA/ECC private key from noisy side-channel observations

    • September 28, 2018

    • NinjaLab - Salle Métivier

    Speaker : Victor Lomné et Thomas Roche

    Side-channel attacks on public-key cryptography (i.e. modular exponentiation for RSA or scalar multiplication for ECC) often boils down to distinguishing the 0s from the 1s in the binary representation of the secret exponent (resp. secret scalar).When state-of-the-art countermeasures are implemented, this detection must be errorless: thanks to masking techniques, erroneous masked exponents (resp.[…]
    • Seminar

    • SemSecuElec

    Rank metric cryptography and its implementations

    • October 08, 2021

    • XLIM – Université de Limoges - Salle Pétri/Turing

    Speaker : Nicolas Aragon

    In 2017, the NIST (National Institute for Standards and Technology) started astandardization process in order to select post-quantum encryption and digital signature schemes. Among the proposed solutions, two rank-metric based encryption schemes were selected for the second round of the standardization process: ROLLOand RQC.This raised questions about both the performance and the security of the[…]