Search
Code generators for mathematical functions and filters – MetaLibm
This project first addresses the implementation of elementary functions such as exponential or trigonometric. The standard mathematical library (libm) offers a small set of such functions in a small set of precisions. Performance of libm functions is of critical importance, in particular in scientif
Runtime Code Generation to Secure Devices – COGITO
This project is aligned with the theme 1 "Sécurité et sûreté des systèmes numériques". Considering that reverse engineering of code and the recovery of sensitive data are nowadays one of the greatest threats in secure devices, COGITO proposes an innovating solution that puts into perspective the u
Control theory for synchronization in private communications – THE CASCADE
The aim of the project THE CASCADE is to propose new architectures of Self Synchronizing Stream Ciphers. An SSSC-based private and secure communication can be modelled as a masterslave configuration involving dynamical systems. However, not all dynamical systems are proper ones. In order for a dy
BIOmetrics spooF resistance Enhancement, evaluatioN and CErtification – BIOFENCE
The evaluation and certification of spoofing resistance is one of the major issues concerning biometrics technologies in their present and future implementation. The biometric solutions based on fingerprints have been entering our everyday life but new biometrics technologies based on face, iris or
Algebraic Methods for Model-Checking of Timed and Hybrid Systems – MALTHY
Technology has advanced to the point that computer systems are embedded in almost any physical system from cars, trains, airplanes, robots, medical devices. Embedded systems become ever more complex and safety-critical, asserting their correctness is thus crucial. Today's embedded systems are valida
Hardware and software managemenT of data SecUrity iN A ManY core platform – TSUNAMY
The TSUNAMY project addresses the problem of secure handling of personal data and privacy in manycore architectures. The economic and social issues are numerous as this type of architecture will be massively deployed in the future both in infrastructure such as "cloud computing" (main purpose of thi
IMplicit and EXPlicit semantics Integration in proof based developments of discrete systems – IMPEX
All software systems execute within an environment or context. Reasoning about the correct behavior of such systems is a ternary relation linking requirements, system and context models. Formal methods are concerned with providing tool (automated) support for the synthesis and analysis of such model