Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
720 results
-
-
Seminar
-
Cryptography
Unifying Leakage Models on a Renyi Day
Speaker : Thomas Prest - PqShield
In the last decade, several works have focused on finding the best way to model circuit leakage in order to obtain provably secure implementations. One of the most realistic models is the noisy leakage model, introduced in (Prouff, Rivain'13) and (Duc-Dziembowski-Faust'14) together with secure constructions. These works suffer from various limitations, in particular the use of ideal leak-free[…] -
-
-
Seminar
-
Cryptography
Evolution de la monnaie électronique divisible
Speaker : Olivier Sanders - Orange
Les systèmes de paiement électronique ont été massivement adoptés par le grand-public mais sont pourtant loin d’être anodins du point de vue du respect de la vie privée. En effet l’entité gérant ces systèmes peut déduire de chaque paiement un grand nombre d’informations sur son auteur, comme sa localisation, ses goûts et même, dans certains cas, son état de santé. Pourtant, paiement électronique[…] -
-
-
Seminar
-
Cryptography
Algebraic geometry meets microcontrollers: Efficient, compact key
Speaker : Ben Smith - Ecole polytechnique
This talk will describe how we have applied the theory of Kummer surfaces --classic objects in algebraic geometry-- to produce compact, high-speed software for secure key exchange and signatures on microcontrollers. This is joint work with Brian Chung, Craig Costello, Joost Renes, Peter Schwabe, and Lejla Batina. -
-
-
Seminar
-
Cryptography
Lilliput: Advances in Security and Performance Analysis
Speaker : Julien Francq - Airbus CyberSecurity
Lilliput is a block cipher that has been published in 2015 in IEEE Transactions in Computers with Thierry Berger and Marine Minier, and the seminal paper has been cited 6 times for now. This talk will summarize the results of the third-party cryptanalysis and implementations, and will show that Lilliput is still an efficient and secure cryptographic primitives. -
-
-
Seminar
-
Cryptography
Coercion-resistant Internet voting made practical
Speaker : Jacques Traore - Orange Labs
Internet voting offers a better voting experience since voters can cast their votes from their computers or even smartphones. By eliminating the need to visit polling places, it may attract more voters and thus increase voter turnout. However, it is still not widely spread owing to many inherent concerns such as risks entailed by the lack of private polling booths. Indeed, this may ease coercion[…] -
-
-
Seminar
-
Cryptography
Où en est-on avec le calcul quantique?
Speaker : Dimitri Petritis - IRMAR
Le calculateur universel quantique n'a toujours pas dépassé le stade de prototype de démonstration et reste insuffisant pour faire tourner l'algorithme de factorisation de Shor sur des instances réalistes. Cependant, des avancées algorithmiques ont été faites sur des machines quantiques dédiées qui permettent d'aborder certains problèmes difficiles (au sens de la complexité); ces nouvelles[…] -