Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
654 résultats
-
-
Séminaire
-
Cryptographie
MinRank Gabidulin encryption scheme on matrix codes
Orateur : Adrien Vinçotte - XLIM, Université de Limoges
The McEliece scheme is a generic framework allowing to use any error correcting code which disposes of an efficient decoding algorithm to design an encryption scheme by hiding a generator matrix of this code.In the context of rank metric, we propose a generalization of the McEliece frame to matrix codes. From a vector code, we compute a matrix version of this code, that is hidden in such a way[…]-
Cryptography
-
Asymmetric primitive
-
-
-
Séminaire
-
Cryptographie
Polytopes in the Fiat-Shamir with Aborts Paradigm
Orateur : Hugo Beguinet - ENS Paris / Thales
The Fiat-Shamir with Aborts paradigm (FSwA) uses rejection sampling to remove a secret’s dependency on a given source distribution. Recent results revealed that unlike the uniform distribution in the hypercube, both the continuous Gaussian and the uniform distribution within the hypersphere minimise the rejection rate and the size of the proof of knowledge. However, in practice both these[…]-
Cryptography
-
Asymmetric primitive
-
Mode and protocol
-
-
-
Séminaire
-
Cryptographie
Improved Provable Reduction of NTRU and Hypercubic Lattices
Orateur : Henry Bambury - ENS Paris
Lattice-based cryptography typically uses lattices with special properties to improve efficiency. We show how blockwise reduction can exploit lattices with special geometric properties, effectively reducing the required blocksize to solve the shortest vector problem to half of the lattice's rank, and in the case of the hypercubic lattice , further relaxing the approximation factor of blocks to . […]-
Cryptography
-
Asymmetric primitive
-
-
-
Séminaire
-
SoSysec
Safety-Security Convergence of Industrial Control Systems
Orateur : Maxime Puys - Université Clermont Auvergne - IUT de Clermont-Ferrand
Industrial Control Systems (ICS) are designed to provide a service, such as power generation or water treatment, while protecting people, assets, and the environment against hazards. However, ICS now integrate Information Technology (IT) and are interconnected with the outside world such as the Internet, thereby exposing their infrastructures to cyberattacks. Cyberattacks have thus become new[…]-
Risk Assessment
-
SoSysec
-
Intrusion detection
-
-
-
Thesis defense
-
Side-channel
Optimizing data leakage exploitation in the context of screaming-channel attack
PhD Defense : Jérémy GUILLAUME Abstract: This thesis studies the challenges of implementing a screaming-channel attack: an attack exploiting the electromagnetic leakage and mixed-signal nature (analog and digital parts on the same silicon die) of a victim system to extract its secret data at a distance of several meters. In particular, Jeremy Guillaume explored various methods enabling an attacker[…] -
-
-
Séminaire
-
Cryptographie
Soutenance de thèse : Les attaques physiques sur les chiffrements intègres légers
Orateur : Modou Sarry - IMT Atlantique
Les dispositifs interconnectés tels que les réseaux de capteurs, la santé, les systèmes de contrôle distribués, l’internet des objets et les systèmes cyber-physiques sont de plus en plus répandus. Cette transition vers de petits appareils engendre de nouvelles préoccupations en matière de sécurité et de vie privée, car de nombreux algorithmes cryptographiques classiques ne répondent pas toujours[…] -