Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

670 résultats

    • Séminaire

    • SoSysec

    From Deciding Knowledge to Intrusion Detection

    • 13 septembre 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Orateur : Yannick Chevalier - Université de Toulouse

    By interpreting terms as distributions over strings, Abadi and Rogaway proved under suitable assumptions that indistinguishability in the computational setting, accepted as the impossibility for an observer to acquire knowledge from observing a protocol execution, is equivalent to formal equivalence in a symbolic setting. This result led to multiple results on “deciding knowledge” using static[…]
    • SoSysec

    • Intrusion detection

    • Séminaire

    • SemSecuElec

    Une approche langages pour comprendre et affronter les injections de fautes

    • 27 septembre 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - Espace de conférences

    Orateur : Sébastien Michelland - Université Grenoble Alpes, Grenoble INP, LCIS

    Est-ce que votre dernier programme fonctionnerait si je sautais une ligne de code ? Deux ? Si je corrompais une variable aléatoirement ? Alors il ne résiste pas aux _attaques par injection de faute_, qui ciblent le matériel et produisent ce type d'effets. Pour être honnête, rien n'y résiste vraiment. Les efforts pour s'en protéger ont malgré tout bien progressé, principalement (et c'est peut-être[…]
    • SemSecuElec

    • Injection de fautes

    • Séminaire

    • SemSecuElec

    Acquisition and Exploitation of Traces from Connected Devices

    • 27 septembre 2024 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Orateur : Francesco Servida - École des Sciences Criminelles, Université de Lausanne

    This presentation aims to give an overview of the traces that can be obtained from connected objects as witnesses or actors at a crime scene. Using several scenarios we cover the challenges of detecting connected devices, the relevant locations for data retrieval and the techniques for acquiring said data. We then present how such data can be useful in helping to understand the dynamics of events[…]
    • SemSecuElec

    • Embedded systems

    • Séminaire

    • Cryptographie

    Shorter Lattice-Based Fiat-Shamir Signatures

    • 26 janvier 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Julien Devevey - ANSSI

    We present HAETAE (Hyperball bimodAl modulE rejecTion signAture schemE), a new lattice-based signature scheme, which we submitted to the Korean Post-Quantum Cryptography Competition for standardization. Like the NIST-selected Dilithium signature scheme, HAETAE is based on the Fiat-Shamir with Aborts paradigm, but our design choices target an improved complexity/compactness compromise that is[…]
    • Séminaire

    • Cryptographie

    ECDSA White-Box Implementations, Feedback on CHES 2021 WhibOx Contest

    • 29 septembre 2023

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Agathe Houzelot - Idemia

    Cryptographic algorithms are primarily designed to be secure in the black-box model, where an attacker can only observe their input/output behavior. However in practice, algorithms are rarely executed in a completely isolated environment and additional information is often leaked. In the context of mobile applications or connected objects, devices often lack secure storage to protect secret keys,[…]
    • Séminaire

    • Cryptographie

    Ind-cpa-d insecurity of approximate and exact homomorphic encryption schemes

    • 29 mars 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Elias Suvanto - Cryptolab

    Fully Homomorphic Encryption enables the evaluation of arbitrary circuits over encrypted data while maintaining the confidentiality of the underlying messages. It greatly enhances functionality but also comes with security challenges for some applications like Threshold FHE. While the standard IND-CPA security is sufficient against honest but curious adversaries, a stronger security notion called[…]