Search
Key Length Estimates: Practical and Theoretical Optimizations and Modern Approaches on NFS Instances for Accurate Costs – KLEPTOMANIAC
The RSA cryptosystem and the Diffie-Hellman key exchange protocol in finite fields were the first invented primitives of public-key cryptography. It is hard to estimate the time and resources that are needed to factor an integer, and thereby how hard it is to break RSA. All regulatory bodies reco
Sboxes for Symmetric-Key Primitives – SWAP
Symmetric-key cryptology is one of the most important and active branches of cybersecurity. Block ciphers and hash functions are the most well-studied families of symmetric algorithms and are typically built by iterating several times a round function. To prevent attacks, the round function has t
algeBrA, pRoofs, Algorithms, Curves and sUrfaces for coDes and their Applications – BARRACUDA
This project treats security and privacy concerns raised by the increasing use of data outsourcing or Blockchain technology. These new problems, for which usual cryptographic primitives are inaccurate, have in common that the proposed solutions often involve error correcting codes constructed using
Coordination of medical and non-medical teams in extreme contexts – COMEXT
With the increased terrorist threat, there is a renewed interest in emergency inter-organizations coordination, and in particular between medical and non-medical first responders teams in extreme contexts, notably in multiple terror attacks. We are currently facing a growth in crisis complexity, due
Emergency reorganisation and improvisation in crisis management – RESCUE
In France, industrial sites with high technological risks have the obligation to carry out a crisis management planning which describes the means, equipment and methods of intervention. However, during an industrial disaster, this planning may prove to be unsuitable and operational personnel must ur
Fingerprinting And CPU Attack and Defense Exploration from browser Scripts – FACADES
Along with releases of new web standards in browsers (WebAssembly, WebGPU, WebUSB, etc.), more and more features of connected devices are directly usable from the web. While these specifications hold great promise from a performance perspective, they keep raising significant security concerns. In th
Addressing securiTy Threats to artIficiaL intelligence in Approximate computing systems – ATTILA
We are witnessing unprecedented Cyber-Physical Systems deployments to monitor and control the environment, including critical infrastructures. The Internet of Things federates these edge computing systems with the cloud, all of which make increasing use of Artificial Intelligence to provide high inf
Secure V – SecV
For decades, processors evolution has focused on improving their performance. In recent years, attacks directly exploiting optimization mechanisms have emerged. They typically exploit flaws in caches, performance counters or speculation units and jeopardize the safety and security of processors in
Urban explosions, experiments and expertise – URBEX
The URBEX project aims at developing a validated, breakthrough, fast-running, meshless model for the propagation of blast waves in urban configurations, accounting for all urban effects: multiple reflections, diffractions, channeling in urban canyons and urban canopy bypassing. The project intend
Digitization - Risks, Uncertainties and Fragility of Technologies related to the Human Factor – DRIFTFH
The Covid-19 pandemic, by reducing physical exchanges, led to unprecedented peaks in digital usage and data security breaches. The Internet of Things, big data, mobility and teleworking amplify the risks in terms of cybersecurity. Healthcare and Defense present similarities in terms of constraints a
Decision support for detection and collection of biological traces for genetic and criminal identification purposes – BioTrack
The Biotrack program aims at gaining insight into the biology of touch DNA and to improve the success rate of DNA profiling. The biotrack hypothesis is that the pre-analytical steps, more precisely the detection and collection of the touch DNA samples as well as the release of the biological materia
An interface between COde and LAttice-based cryptography – COLA
The main objective of COLA is to transfer techniques between the research areas of codes and lattices in a cryptographic context. Codes and lattices share many mathematical similarities, both objects found similar applications in cryptography and they appear to be resistant against a quantum comput
Engineering artificial metalloenzymes for detoxification of organophosphorous nerve agents – DetoxArtMet
The objective of this project is to engineer new artificial metalloenzymes for the degradation of persistent organophosphorous (OP) neurotoxics. We will focus on the development of original directed evolution strategies to find new proteins able to reduce toxicity of chosen OP molecules used as mode
Development of monoclonal antibodies against Plague using memory B cells from healed plague patients, specific to protective epitopes – PLAGMAB
Yersinia pestis, the etiologic agent of Plague, is among the deadliest pathogens affecting humans. Mostly transmitted by fleas, it causes bubonic Plague, but lung infection may subsequently occur leading to aerosols causing the deadly and highly contagious pneumonic form of Plague. Plague affects a
Secure distributed computAtioN: cryptoGRaphy, combinatorIcs and computer Algebra – SANGRIA
New cryptographic tools have been invented in recent years. These constructions have opened the door to applications in secure distributed computation that were previously believed unattainable in practice. There is currently a strong interest from governments and security organisations, military, a
Novel Security Ink for archaeological artefacts marking – NOSE
For many years, cultural property in general and archaeological artefacts in particular have become currencies for small-scale trafficking to terrorist financing or money laundering means for mafia organizations. The challenge of the NOSE project is to be able to implement a technical solution to pr
IoT gateway protection against software and communication threats – TrustGW
In the TrustGW project, only software attacks and attacks from communication links are taken into account. Since the gateway architecture includes processors and hardware accelerators to increase the performance of the various services present in the execution domains, the hypervisor must be able to
Power-OFF laser attacks on security Primitives – POP
Secure circuits embed hardware primitives that provide security properties: Physical Unclonable Functions (PUFs) or attack sensors, for example. These only fulfil their role when powered, which makes a new class of attacks that would be carried out when the targeted circuit is powered off particular
VERification of IDentitY documents for authentiCation – VERIDYC
In the face of the changes in the information society, connecting people via digital authentication is becoming increasingly common. The identification system (via a code sent by SMS or email) remains the most widespread, although it is not very secure. New systems are being developed based on a cor
Protection Against Criminal use of Steganography – PACeS
The present PACeS project focuses on steganography and steganalysis, i.e. data hiding within innocuous-like digital media. Such tools are readily available on the Internet and can be used by criminals rings, or for sensitive data leakage. Surprisingly, there is no software to detect this threat. Thi
Auditable, secure & efficient symmetric cryptography – asesyc
Block ciphers crunch through pretty much any bit that is exchanged on the Internet today. The underlying cryptographic primitives are executed repeatedly on massive amounts of data. Their ability to sustain a high throughput is therefore essential. In a cryptographic setting, functional correctness