Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

698 résultats

    • Séminaire

    • SemSecuElec

    Acquisition and Exploitation of Traces from Connected Devices

    • 27 septembre 2024 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Orateur : Francesco Servida - École des Sciences Criminelles, Université de Lausanne

    This presentation aims to give an overview of the traces that can be obtained from connected objects as witnesses or actors at a crime scene. Using several scenarios we cover the challenges of detecting connected devices, the relevant locations for data retrieval and the techniques for acquiring said data. We then present how such data can be useful in helping to understand the dynamics of events[…]
    • SemSecuElec

    • Embedded systems

    • Séminaire

    • Cryptographie

    Updatable Public Key Encryption with Lattices

    • 23 février 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Calvin Abou-Haidar - ENS Lyon

    Updatable public key encryption has recently been introduced as a so- lution to achieve forward-security in the context of secure group messaging without hurting efficiency, but so far, no efficient lattice-based instantia- tion of this primitive is known. In this work, we construct the first LWE-based UPKE scheme with polynomial modulus-to-noise rate, which is CPA-secure in the standard model. At[…]
    • Séminaire

    • Cryptographie

    Generic SCARE: reverse engineering without knowing the algorithm nor the machine

    • 12 avril 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Hélène LE BOUDER - IMT Atlantique

    A novel side-channel-based reverse engineering technique is introduced, capable of reconstructing a procedure solely from inputs, outputs, and traces of execution. Beyond generic restrictions, no prior knowledge of the procedure or the chip it operates on is assumed. These restrictions confine the analysis to 8-bit RISC constant-time software implementations. Specifically, the feasibility of[…]
    • Séminaire

    • Cryptographie

    Finding short integer solutions when the modulus is small

    • 24 novembre 2023

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Eamonn Postlethwaite - King's College London

    We present cryptanalysis of the inhomogenous short integer solution (ISIS) problem for anomalously small moduli by exploiting the geometry of BKZ reduced bases of q-ary lattices. We apply this cryptanalysis to examples from the literature where taking such small moduli has been suggested. A recent work [Espitau–Tibouchi–Wallet–Yu, CRYPTO 2022] suggests small versions of the lattice signature[…]
    • Séminaire

    • Cryptographie

    ECDSA White-Box Implementations, Feedback on CHES 2021 WhibOx Contest

    • 29 septembre 2023

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Agathe Houzelot - Idemia

    Cryptographic algorithms are primarily designed to be secure in the black-box model, where an attacker can only observe their input/output behavior. However in practice, algorithms are rarely executed in a completely isolated environment and additional information is often leaked. In the context of mobile applications or connected objects, devices often lack secure storage to protect secret keys,[…]
    • Séminaire

    • Cryptographie

    Quantum Linear Key-recovery Attacks Using the QFT

    • 09 février 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : André Schrottenloher - IRISA

    The Quantum Fourier Transform is a fundamental tool in quantum cryptanalysis, not only as the building block of Shor's algorithm, but also in attacks against symmetric cryptosystems. Indeed, hidden shift algorithms such as Simon's (FOCS 1994), which rely on the QFT, have been used to obtain attacks on some very specific block cipher structures. The Fourier Transform is also used in classical[…]