Homepage Inria website
  • Inria login
  • The Inria's Research Teams produce an annual Activity Report presenting their activities and their results of the year. These reports include the team members, the scientific program, the software developed by the team and the new results of the year. The report also describes the grants, contracts and the activities of dissemination and teaching. Finally, the report gives the list of publications of the year.

  • Legal notice
  • Cookie management
  • Personal data
  • Cookies

Section: Partnerships and Cooperations

European Initiatives


  • Program: H2020

  • Project acronym: SPARTA

  • Project title: SPARTA

  • Duration: three years

  • Coordinator: CEA

  • Other partners: IMT, Inria, ANSSI

  • Abstract: Propose, test, validate and exploit the possible organizational, technological and operational setup of a cybersecurity competence network; Produce a roadmap that include targets to be achieved by the end of the project, as well as priorities to be addressed in the future by the Cybersecurity Competence Network; Serve to align research, education and certification; Build on and align existing roadmap efforts.

    Participant : Benjamin Smith.


  • Title: Post-quantum cryptography for long-term security

  • Programm: H2020

  • Duration: March 2015 - March 2018


  • Partners:

    • Academia Sinica (Taiwan)

    • Bundesdruckerei (Germany)

    • Danmarks Tekniske Universitet (Denmark)

    • Katholieke Universiteit Leuven (Belgium)

    • Nxp Semiconductors Belgium Nv (Belgium)

    • Ruhr-Universitaet Bochum (Germany)

    • Stichting Katholieke Universiteit (Netherlands)

    • Coding Theory and Cryptology group, Technische Universiteit Eindhoven (Netherlands)

    • Technische Universitaet Darmstadt (Germany)

    • University of Haifa (Israel)

  • Inria contact: Nicolas Sendrier

  • Online security depends on a very few underlying cryptographic algorithms. Essentially all applications today are based on RSA or on the discrete-logarithm problem in finite fields or on elliptic curves. Cryptographers optimize parameter choices and implementation details for these systems and build protocols on top of these systems; cryptanalysts fine-tune attacks and establish exact security levels for these systems.

    These systems are all broken as soon as large quantum computers are built. Long-term confidential documents such as patient health-care records and state secrets have to guarantee security for many years, but information encrypted today using RSA or elliptic curves and stored until quantum computers are available will then be as easy to decipher.

    PQCRYPTO will allow users to switch to post-quantum cryptography: PQCRYPTO will design a portfolio of high-security post-quantum public-key systems, and will improve the speed of these systems, with reference implementations.

  • Our team is engaged in WP3.3 “advanced applications for the cloud”. We envision to focus essentially on secure multiparty computation, essentially the information theoretically secure constructions, who are naturally secure against a quantum computer invoked on classical queries. We will study whether these protocols still resist quantum queries. This work sub package started March 2015, ended in March 2018.

    Participants : Daniel Augot, Matthieu Rambaud.