43 résultats

  • When Electromagnetic Signals Reveal Obfuscated Malware: Deep and Machine Learning Use cases

    • 22 octobre 2021

    • Univ Rennes, CNRS, Inria, IRISA Rennes - Salle Petri/Turing

    Orateur : Duy-Phuc Pham et Damien Marion

    The Internet of Things (IoT) is constituted of devices that are expo-nentially growing in number and in complexity. They use plentiful customized firmware and hardware, ignoring potential security issues, which make them a perfect victim for cybercriminals, especially malware authors.We will describe a new usage of side channel information to identify threats that are targeting the device. Using[…]
  • Rank metric cryptography and its implementations

    • 08 octobre 2021

    • XLIM – Université de Limoges - Salle Pétri/Turing

    Orateur : Nicolas Aragon

    In 2017, the NIST (National Institute for Standards and Technology) started astandardization process in order to select post-quantum encryption and digital signature schemes. Among the proposed solutions, two rank-metric based encryption schemes were selected for the second round of the standardization process: ROLLOand RQC.This raised questions about both the performance and the security of the[…]
  • Unique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection

    • 25 juin 2021

    • Bar-Ilan University (BIU) - Web-Conférence

    Orateur : Itamar Levi

    In this seminar I will first discuss unique computer aided design (CAD) compatible SCA security mechanisms. I will present an approach which can significantly increase the physical security-level of a design, be implemented with conventional design-tools and which does not require any special technological-support. The method consists with a correct by-design utilization of power-management[…]
  • Lattice-based NIST candidates: abstractions and ninja tricks

    • 23 avril 2021

    • PQShield – United Kingdom - Web-Conférence

    Orateur : Thomas Prest

    I will present the remaining lattice-based candidates for standardization by NIST (2 signature schemes, 5 encryption schemes). At a high level, these can all be interpreted as straightforward instantiations of decades-old paradigms. But when we look under the hood, all of them make design choices which impact their security, efficiency and portability in distinct manners; we will discuss these.[…]
  • Code-based postquantum cryptography : candidates to standardization

    • 23 avril 2021

    • INRIA - Web-Conférence

    Orateur : Nicolas Sendrier

    At the third round of the NIST standardization process, three candidates remain with a security based on error correcting codes, all are key exchange mechanisms. We will explore them according to their security assumptions and properties. Among them, we find an historical scheme (Classic McEliece), as well as schemes using sparse and quasi-cyclic matrices (BIKE and HQC). We will examine pros and[…]
  • Post-Quantum Cryptography Hardware: Monolithic Implementations vs. Hardware-Software Co-Design

    • 23 avril 2021

    • PQShield – United Kingdom - Web-Conférence

    Orateur : Markku-Juhani Saarinen

    At PQShield, we’ve developed dedicated coprocessor(s) for lattice schemes, hash-based signatures, and code-based cryptography. These cryptographic modules are commercial rather than academic and designed to meet customer specifications such as a specific performance profile or Common Criteria and FIPS security certification requirements.Hardware implementations of legacy RSA and Elliptic Curve[…]