Category: QualSec seminars

Feb 21

Seminar: Nikita Veshchikov “Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks” (Feb 22, 2017)

Feb 22, 2017 – 12.30 – room P.NO7.07

Speaker: Nikita Veshchikov (ULB)

Title: Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks

Nov 09

Seminar: Frédéric Lafitte “Authenticity and non-repudiation in the Internet of things” (November 16, 2016)

November 16, 2016 – 12.30 – Computer Department Seminar Room – NO Building, 8th floor, room P.2NO8.08 (“salle Rotule”)

Speaker: Frédéric Lafitte (ERM & ULB)

Title: Authenticity and non-repudiation in the Internet of things

Oct 21

Seminar: Kostas Papagiannopoulos “Location-Based Side-Channel Analysis: from EM Experiments to Information-Theoretic Models” (October 26, 2016)

October 26, 2016 – 12.30 – Computer Department Seminar Room – NO Building, 8th floor, room P.2NO8.08 (“salle Rotule”)

Speaker: Kostas Papagiannopoulos (Radboud University)

Title: Location-Based Side-Channel Analysis: from EM Experiments to Information-Theoretic Models

Abstract: In this talk we discuss a class of unconventional side-channel analysis, namely location-based attacks. We demonstrate the applicability of those attacks in ARM Cortex M4 processors and discuss possible attack modeling options via information theory.

Oct 09

Seminar: Veronika Kuchta “Leakage-resilient fully homomorphic identity-based encryption” (October 12, 2016)

October 12, 2016 – 12.30 – Computer Department Seminar Room – NO Building, 8th floor, room P.2NO8.08 (“salle Rotule”)

Speaker: Veronika Kuchta (ULB)

Title: Leakage-resilient fully homomorphic identity-based encryption

Sep 20

Seminar: Nikita Veshchikov “Problems with masks in AES-RSM of DPA Contest v4” (Sep 21, 2016)

Sep 21, 2016 – 12.30 – room P.OF2072

Speaker: Nikita Veshchikov (ULB)

Title: Problems with masks in AES-RSM of DPA Contest v4

May 26

Seminar: François Gerard “Signcryption: What, why and how?” (May 30, 2016)

May 30, 2016 – 12.30 – Computer Department Seminar Room – NO Building, 8th floor, room P.2NO8.08 (“salle Rotule”)

Speaker: François Gerard (ULB)

Title: Signcryption: What, why and how?

May 20

Seminar: Helena Bruyninckx “Discussing the construction for the quantum authentication of classical messages” (May 23, 2016)

May 23, 2016 – 13.00 – Computer Department Seminar Room – NO Building, 8th floor, room P.2NO8.08 (“salle Rotule”)

Speaker: Helena Bruyninckx (ERM & ULB)

Title: Discussing the construction for the quantum authentication of classical messages

May 05

Seminar: Stephane Fernandes Medeiros “Khudra: A New Lightweight Block Cipher for FPGAs” (May 9, 2016)

May 9, 2016 – 10.00 – Computer Department Seminar Room – NO Building, 8th floor, room P.2NO8.08 (“salle Rotule”)

Speaker:  Stephane Fernandes Medeiros (ULB)

Title: Khudra: A New Lightweight Block Cipher for FPGAs

Apr 12

Seminar: Frédéric Lafitte “A SAT-based analysis of authenticated encryption with associated data” (April 18, 2016)

April 18, 2016 – 12.30 – Computer Department Seminar Room – NO Building, 8th floor, room P.2NO8.08 (“salle Rotule”)

Speaker: Frédéric Lafitte (ERM & ULB)

Title: A SAT-based analysis of authenticated encryption with associated data

Mar 23

Seminar: Nikita Veshchikov “Use of simulators and simulations for side channel analysis” (April 11, 2016)

April 11, 2016 – 14.00 – Computer Department Seminar Room – NO Building, 8th floor, room 2N8.202 (“salle séminaire”)

Speaker: Nikita Veshchikov (ULB)

Title: Use of simulators and simulations for side channel analysis

Abstract: We are going give a quick overview of different types of simulators and their use in the domain of side-channel attacks. We are also going to talk about advantages, disadvantages and limitation of simulators for side-channel analysis. We will discuss how simulators might be use for analysis of crystallographic implementations from the perspective of side-channel attacks and how simulations might be used to compare and evaluate implementations. This presentation is mostly focused on simulations for software implementations, however some aspects could easily be transferred into the simulators for hardware implementations.