L’objectif général de cette thèse est de fournir des méthodes et outils pour la recherche et l’évaluation de vulnérabilités dans les protocoles cryptographiques, en prenant en compte les capacités de l’attaquant.
Navigation
Nouvelles publications
- Quelques Publications
Récentes
- Karine Altisen, Stéphane Devismes, Anaïs Durand, Colette Johnen, Franck Petit: Self-stabilizing Systems in Spite of High Dynamics
- Erwan Jahier, Karine Altisen, Stéphane Devismes: Exploring Worst Cases of Self-stabilizing Algorithms using Simulations
- Claire Maiza: Hardware and software analyses for precise and efficient timing analysis
- Aina Rasoldier, Jacques Combaz, Alain Girault, Kevin Marquet, Sophie Quinton: Assessing the Potential of Carpooling for Reducing Vehicle Kilometers Traveled
Offres d'emploi et stages
- Offres d'emploi et stages
- [Master] Implementation of critical applications on multi-core : execution mode analysis to reduce interferences
- Bourses PERSYVAL de M2
- [Funded PhD/PostDoc] Countermeasures to (transient) Side-Channel Attacks in a Formally Verified Compiler
- [Funded PhD] Annotations de sécurité pour compilateur optimisant formellement vérifié
- [Funded PhD] Formal Modeling and Verification of Parameterized and Distributed Systems
- [Funded PhD] Improving Diagnosis for a Formal Verification Tool for Electrical Circuits at Transistor Level
- [Funded PhD] Modular Analysis for Formal Verification of Integrated Circuits at Transistor Level
- [Funded PhD] Quantitative analysis of software security against adaptive attacks
- [Master] Formal Methods for the Verification of Self-Adapting Distributed Systems
- [Master]Leakage in presence of an active and adaptive adversary
- [PostDoc] Implementation of critical applications on multi-core : execution mode analysis to reduce interferences