Section: Partnerships and Cooperations
National Initiatives
ANR
-
Design and Analysis of block ciphers dedicated to constrained environments
ANR program: Ingénierie numérique et sécurité
Partners: INSA Lyon, Inria (project-team SECRET), University of Limoges (XLIM), CryptoExperts
http://bloc.project.citi-lab.fr
The BLOC project aims at providing strong theoretical and practical results in the domain of cryptanalysis and design of block ciphers.
-
Keep your personal Information Safe and Secure
ANR program: Ingénierie numérique et sécurité
Partners: Inria (project-teams SMIS and SECRET), LIRIS, Gemalto, University of Versailles-St Quentin, Conseil Général des Yvelines
The KISS project builds upon the emergence of new portable and secure devices known as Secure Portable Tokens (e.g., mass storage SIM cards, secure USB sticks, smart sensors) combining the security of smart cards and the storage capacity of NAND Flash chips. The idea promoted in KISS is to embed, in such devices, software components capable of acquiring, storing and managing securely personal data.
-
Cryptography from learning with errors
ANR program: Jeunes Chercheurs, SIMI2
Coordinator: Vadim Lyubashevsky (Inria, project-team Cascade)
The aim of this project is to combine algorithmic and algebraic techniques coming from asymmetric and symmetric cryptology in order to improve some attacks and to design some symmetric primitives which have a good resistance to side-channel attacks.
-
Authenticated Ciphers and Resistance against Side-Channel Attacks
ANR program: Défi Société de l'information et de la communication
Partners: ANSSI, Inria (project-team SECRET and project-team MARELLE), Orange, University of Lille, University of Rennes, University Versailles-Saint Quentin
The Brutus project aims at investigating the security of authenticated encryption systems. We plan to evaluate carefully the security of the most promising candidates to the Caesar competition, by trying to attack the underlying primitives or to build security proofs of modes of operation. We target the traditional black-box setting, but also more "hostile" environments, including the hardware platforms where some side-channel information is available.