Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

633 résultats

    • Séminaire

    • SemSecuElec

    Schindler-Itoh/Wiemers revisited: recovering full RSA/ECC private key from noisy side-channel observations

    • 28 septembre 2018

    • NinjaLab - Salle Métivier

    Orateur : Victor Lomné et Thomas Roche

    Side-channel attacks on public-key cryptography (i.e. modular exponentiation for RSA or scalar multiplication for ECC) often boils down to distinguishing the 0s from the 1s in the binary representation of the secret exponent (resp. secret scalar).When state-of-the-art countermeasures are implemented, this detection must be errorless: thanks to masking techniques, erroneous masked exponents (resp.[…]
    • Séminaire

    • SemSecuElec

    Code-based postquantum cryptography : candidates to standardization

    • 23 avril 2021

    • INRIA - Web-Conférence

    Orateur : Nicolas Sendrier

    At the third round of the NIST standardization process, three candidates remain with a security based on error correcting codes, all are key exchange mechanisms. We will explore them according to their security assumptions and properties. Among them, we find an historical scheme (Classic McEliece), as well as schemes using sparse and quasi-cyclic matrices (BIKE and HQC). We will examine pros and[…]
    • Séminaire

    • SemSecuElec

    Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages

    • 05 avril 2019

    • Faculté des sciences de Limoges - Salles Pétri/Turing

    Orateur : Léo Reynaud

    Les attaques side channel classiques nécessitent généralement la connaissance du clair (ou du chiffré) afin de calculer des données internes qui seront comparées à des fuites. Des attaques permettent cependant de s’affranchir de ces connaissances, les attaques par distributions jointes. Ces attaques supposent un attaquant capable d’inverser le modèle de consommation, mais aucune connaissance sur[…]
    • Séminaire

    • SemSecuElec

    Bridging Deep Learning and Classical Profiled Side-Channel Attacks

    • 08 avril 2022

    • Thales ITSEF, Toulouse - Salle Pétri/Turing

    Orateur : Gabriel Zaid

    Over the recent years, the cryptanalysis community leveraged the potential of research on Deep Learning to enhance attacks. In particular, several studies have recently highlighted the benefits of Deep Learning based Side-Channel Attacks (DLSCA) to target real-world cryptographic implementations. While this new research area on applied cryptography provides impressive result to recover a secret[…]
    • Séminaire

    • SemSecuElec

    One Fault Can Go A Long Way

    • 15 novembre 2019

    • Nanyang Technological University - Métivier

    Orateur : Shivam Bhasin

    *Abstract:* Fault attacks are considered among critical threat to embedded cryptography. This talk will be divided into in two parts. The first part of the talk will explore application of faults on advanced security primitives. We present persistent fault analysis introduced at CHES 2017 and its capability to bypass state of the art fault countermeasures as well as higher-order masking with one[…]
    • Séminaire

    • SemSecuElec

    Security of Hardware/Software Interfaces : Research Chair of the Cybersecurity Research Cluster

    • 22 juin 2018

    • Centrale-Supelec - Salles Petri/Turing

    Orateur : Guillaume Hiet

    We proposed to host a thematic semester on attacks based on the interaction between software and hardware. The goal would be to host one workshop, one summer school for young researchers, as well as multiple seminars and longer stays for researchers, spanning September 2019 to March or April 2020. This thematic semester will be funded by the DGA in the context of the Cybersecurity Research Cluster[…]