Critical and private information are exchanged on public environment. To protect it from dishonest users, we use cryptographic tools. Unfortunately, bad conception, poorly written security properties and required security hypothesis lead to attacks, and it may take years before one discover the attack and fix the security schemes involved. In this context, provable security provides formal definitions for security objectives and implied mathematical proofs that these objectives are fullfilled. On another hand, complexity and variety of cryptographic systems are increasing, and proofs by hand are too complicated to write and to verify (Bellare& Rogaway 2004, Shoup 2004, Halevi 2005). Thus, we need computer-assisted verification ...
This ph-d thesis argues that there is an immanent ethic of scientific research, that participates in...
Due to the ageing of the infrastructure, the toll motorway company ESCOTA aims at the formalization ...
Soft rockfall barriers are complex structures that generally consist of a metallic net supported by ...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Our society extensively relies on communications systems. Because such systems are used to exchange ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
This thesis presents a method for the multiple change-points detection in multivariate time series, ...
LNT is a recent formal specification language, based on process algebras, where several concurrent a...
From a technical point of view, the Internet is a distributed system of computers. As such, traditio...
Version définitive de la thèse (dépôt Université)Intrusion detection aims to automate the detection ...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
The use of new technologies in safety-related systems gives rise to specific issues with respect to ...
This ph-d thesis argues that there is an immanent ethic of scientific research, that participates in...
Due to the ageing of the infrastructure, the toll motorway company ESCOTA aims at the formalization ...
Soft rockfall barriers are complex structures that generally consist of a metallic net supported by ...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Our society extensively relies on communications systems. Because such systems are used to exchange ...
Encryption is one of the most important cryptographic primitives. It enables two par- ties, Alice an...
The main objective of this PhD thesis is to speedup elliptic curve cryptography (ECC) computations, ...
This thesis presents a method for the multiple change-points detection in multivariate time series, ...
LNT is a recent formal specification language, based on process algebras, where several concurrent a...
From a technical point of view, the Internet is a distributed system of computers. As such, traditio...
Version définitive de la thèse (dépôt Université)Intrusion detection aims to automate the detection ...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
The use of new technologies in safety-related systems gives rise to specific issues with respect to ...
This ph-d thesis argues that there is an immanent ethic of scientific research, that participates in...
Due to the ageing of the infrastructure, the toll motorway company ESCOTA aims at the formalization ...
Soft rockfall barriers are complex structures that generally consist of a metallic net supported by ...