Go to main content
Go to menu button
Go to main menu
Go to search
This module requires Javascript to be enabled on your browser to work properly.
EN
FR
CREACH LABS
At a glance
Discover CREACH LABS
CREACH LABS partners
Newsroom
Research
Calls for thesis
Calls for postdocs and engineers
Seminars
Conferences
Thematic semesters
Working Groups
Survey reports
Publications
Interactions
Technology transfer
Talent attractiveness
Apply
Thesis proposals
Postdoc and engineer positions
Partner job openings
Search
Events
Publications
This module requires Javascript to be enabled on your browser to work properly.
CREACH LABS
At a glance
Discover CREACH LABS
CREACH LABS partners
Newsroom
Research
Calls for thesis
Calls for postdocs and engineers
Seminars
Conferences
Thematic semesters
Working Groups
Survey reports
Publications
Interactions
Technology transfer
Talent attractiveness
Apply
Thesis proposals
Postdoc and engineer positions
Partner job openings
EN
FR
Search
Events
Publications
Home
Suggest a talk
Suggest a talk
Suggestion form
Your identity
Lastname
For example: SMITH
Firstname
For example: John
Email
For example: john.smith@domain.com
Organization
For example: University of Rennes
Your presentation
Suggested title
About text formats
Suggested abstract
About text formats
Suggested main theme
- Select -
Cryptography
SoSysec
SemSecuElec
Symmetrical primitive
Asymmetric primitive
Mode and protocol
Implementation of cryptographic algorithm
Side-channel
Fault injection
Malware analysis
Fuzzing
Compartmentalization
Operating system and virtualization
Hardware/software co-design
Micro-architectural vulnerabilities
Privacy
Formal methods
Protocols
Network
Binary analysis
Obfuscation
Intrusion detection
Databases
Machine learning
Distributed systems
Security policies
Access control
Programming languages
Economics
Law
Strategy
Information flow control
Vulnerability management
Privacy preserving data publishing
Sanitization
TRNG
Hardware reverse
Hardware trojan
Hardware accelerator
Hardware architecture
Hardware countermeasures
CAD
PUF
Crypto-processors
Secure storage
Embedded systems
Suggested secondary theme
- None -
Cryptography
SoSysec
SemSecuElec
Symmetrical primitive
Asymmetric primitive
Mode and protocol
Implementation of cryptographic algorithm
Side-channel
Fault injection
Malware analysis
Fuzzing
Compartmentalization
Operating system and virtualization
Hardware/software co-design
Micro-architectural vulnerabilities
Privacy
Formal methods
Protocols
Network
Binary analysis
Obfuscation
Intrusion detection
Databases
Machine learning
Distributed systems
Security policies
Access control
Programming languages
Economics
Law
Strategy
Information flow control
Vulnerability management
Privacy preserving data publishing
Sanitization
TRNG
Hardware reverse
Hardware trojan
Hardware accelerator
Hardware architecture
Hardware countermeasures
CAD
PUF
Crypto-processors
Secure storage
Embedded systems
Please let us know your availability
Use of your personal data
The data collected at the time of your request is kept for a period of 12 months and is used to manage your file. It is reserved for authorised Creach Labs personnel.
In accordance with the French Data Protection Act of 6 January 1978 and the provisions of EU Regulation 2016/679 of 27 April 2016, you may exercise your right to access and rectify your personal data by sending an e-mail to
communication@creachlabs.fr
.
I agree to the use of my personal data