Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
718 results
-
-
Seminar
-
Cryptography
Schéma de signature à clé publique : Frobénius-UOV
Speaker : Gilles Macario-Rat - Orange
L'exposé présente un schéma de signature à clé publique post-quantique inspiré du schéma UOV et introduisant un nouvel outil : les formes de Frobénius. L'accent est mis sur le rôle et les propriétés des formes de Frobénius dans ce nouveau schéma : la simplicité de description, la facilité de mise en oeuvre et le gain inédit sur les tailles de signature et de clé qui bat RSA-2048 au niveau de[…] -
-
CREACH LABS, partner of PQCrypto 2026
CREACH LABS invite you to attend the 17th International conference on Post-Quantum Cryptography that will take place in Saint-Malo, France on April 14-16, 2026.March 31, 2026 -
-
Seminar
-
SoSysec
Privacy-preserving collaboration for intrusion detection in distributed systems
Speaker : Léo Lavaur - Université du Luxembourg
The emergence of Federated Learning (FL) has rekindled the interest in collaborative intrusion detection systems, which were previously limited by the risks of information disclosure associated with data sharing. But is it a good collaboration tool? Originally designed to train prediction models on distributed consumer data without compromising data confidentiality, its use as a collaborative[…]-
SoSysec
-
Privacy
-
Intrusion detection
-
Distributed systems
-
-
-
Seminar
-
SemSecuElec
Post-Quantum Cryptography Accelerated by a Superscalar RISC-V Processor
Speaker : Côme Allart - Inria
Two major changes are currently taking place in the embedded processor ecosystem: open source with the RISC-V instruction set, which could replace the ARM one, and post-quantum cryptography (PQC), which could replace classic asymmetric cryptography algorithms to resist quantum computers.In this context, this thesis investigates the improvement of embedded processor performance, generally for[…]-
SemSecuElec
-
Implementation of cryptographic algorithm
-
-
-
Seminar
-
SemSecuElec
Protection des processeurs modernes face à la vulnérabilité Spectre
Speaker : Herinomena ANDRIANATREHINA - Inria
Dans la quête permanente d'une puissance de calcul plus rapide, les processeurs modernes utilisent des techniques permettant d'exploiter au maximum leurs ressources. Parmi ces techniques, l'exécution spéculative tente de prédire le résultat des instructions dont l'issue n'est pas encore connue, mais dont dépend la suite du programme. Cela permet au processeur d'éviter d'être inactif. Cependant,[…]-
SemSecuElec
-
Micro-architectural vulnerabilities
-
-
-
Seminar
-
SemSecuElec
Securing processor's microarchitecture against SCA in a post-quantum cryptography setting
Speaker : Vincent MIGLIORE - LAAS-CNRS
Hardware microarchitecture is a well-known source of side-channel leakages, providing a notable security reduction of standard cryptographic algorithms (e.g. AES) if not properly addressed by software or hardware. In this talk, we present new design approaches to harden processor's microarchitecture against power-based side-channel attacks, relying on configurable and cascadable building blocks[…]-
SemSecuElec
-
Side-channel
-
Micro-architectural vulnerabilities
-