Programme
Heures |
événement |
(+)
|
09:00 - 10:00
|
Keynote - Claudia Diaz (Amphi 49) |
(+)
|
09:00 - 10:00 |
› The Nym Network: Design and Challenges - Claudia Diaz, COSIC, KU Leuven |
|
10:00 - 10:45
|
Pause café - speed mentoring |
|
10:45 - 11:30
|
Plénière - Nicolas Anciaux (Amphi 49) |
(+)
|
10:45 - 11:30 |
› LLMs and Privacy: from risk assessment to privacy enhancing tools - Nicolas Anciaux, Concevoir des technologies d'amélioration de la vie privée explicables et efficaces |
|
11:30 - 12:15
|
Plénière - partenaire industriel (Amphi 49) |
|
12:15 - 13:40
|
Déjeuner - stands partenaires (Hall) |
|
13:40 - 14:10
|
REDOCS (Amphi 49) |
(+)
|
13:40 - 14:10 |
› Automating Attack Data Labeling with Generated Rules and Anomaly Detection - Rémi Bouchayer, Institut Polytechnique de Paris |
|
14:15 - 15:45
|
GT C2 (Amphi 44) |
(+)
|
14:15 - 15:00 |
› The relevance and challenges of random probing security for post-quantum algorithms. Application to Raccoon signature scheme. - Mélissa Rossi, CryptoExperts |
|
15:00 - 15:20 |
› New efficiently decodable rank metric codes - Rakhi Pratihar, INRIA & LIX |
|
15:25 - 15:45 |
› Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond - Pouria Fallahpour, LIP6 |
|
14:15 - 15:45
|
GT SSLR-SSM (Amphi 49) |
(+)
|
14:15 - 15:00 |
› Compromising Electromagnetic Emanations: Side-Channel Leakages in (Connected) Embedded Devices - Pierre Ayoub, Trustworthy systems: foundations and practices |
|
15:00 - 15:45 |
› On the modelling of processor micro-architecture for masked software verification - Karine Heydemann, Thales |
|
15:45 - 16:15
|
Pause café (Hall) |
|
16:15 - 17:45
|
GT C2 (Amphi 44) |
(+)
|
16:15 - 17:00 |
› Threshold Cryptography based on class groups of imaginary quadratic fields - Guilhem Castagnos, Université de Bordeaux |
|
17:00 - 17:20 |
› Randomness Delegation and its Connections with Secure Computation - Mahshid Riahinia, Ecole Normale Supérieure |
|
17:25 - 17:45 |
› Private Heavy-Hitters through Multi-Dealer Secret Sharing - Gabrielle Becke, Exact Computing |
|
16:15 - 17:45
|
GT SSLR-SSM (Amphi 49) |
(+)
|
16:15 - 17:00 |
› Partitionnement dynamique à grain fin contre des attaques par canaux auxiliaires exploitant les mémoires caches - Vianney Lapôtre, Laboratoire Lab-STICC |
|
17:00 - 17:45 |
› Secure compilation—with the compiler, not against: first experiments on 'Tracing LLVM' - Sébastien Michelland, Laboratoire de Conception et d'Intégration des Systèmes |
|
19:00 - 21:00
|
Cocktail dînatoire au château de Caen - Le Mancel - Restaurant du Château de Caen |
|
Heures |
événement |
(+)
|
09:00 - 09:45
|
Plénière - Marta Gomez-Barrero (Amphi 49) |
(+)
|
09:00 - 09:45 |
› Impersonation Attacks on Biometric Recognition Systems - Marta Gomez-Barrero, Universität der Bundeswehr München [Neubiberg] |
|
09:45 - 10:30
|
Plénière - Emmanuela Orsini (Amphi 49) |
(+)
|
09:45 - 10:30 |
› A Story of ZK Proofs: How Efficient ZK-Proofs Enable Signatures and New Applications - Emmanuela Orsini, Bocconi University [Milan, Italy] |
|
10:30 - 11:00
|
Pause café (Hall) |
|
11:00 - 11:45
|
Plénière - Leyla Bilge (Amphi 49) |
(+)
|
11:00 - 11:45 |
› Demystifying Modern Scams; Breaking the Stigma and Building Resilience - Leyla Bilge, Gen |
|
11:45 - 12:15
|
Rump Session (Amphi 49) |
|
12:15 - 13:15
|
Déjeuner (Hall) |
|
13:15 - 14:00
|
Plénière - Ksenia Ermoshina (Amphi 49) |
(+)
|
13:15 - 14:00 |
› A federated sovereignty: how European Union adopts decentralized secure messaging - Ksenia Ermoshina, Centre Internet et Société |
|
14:00 - 15:30
|
GT SDM (Amphi 44) |
(+)
|
14:00 - 14:45 |
› Evolving Digital Forensic Sciences - Lena Klasén, Department of National Operations, Swedish Police Authority, Sweden and Information Coding, Department of Electrical Engineering, Linköping University |
|
14:45 - 15:30 |
› Obscuration réversible de chiffres dans des images - Valentin Noyé, LIRMM |
|
14:00 - 15:30
|
GT PVP-MFS (Amphi 49) |
(+)
|
14:00 - 14:45 |
› Régulation et technologies : exemples d'actions et de questionnements à la CNIL - Thibaud Antignac, Commission nationale de l'informatique des libertés |
|
14:45 - 15:30 |
› Recent Advances in Metric Privacy - Catuscia Palamidessi, Inria Saclay - Ile de France, Ecole Polytechnique |
|
15:30 - 16:00
|
Pause café (Hall) |
|
16:00 - 17:30
|
GT SDM (Amphi 44) |
(+)
|
16:00 - 16:30 |
› PAD datasets: Constraints and hidden factors in their conception - Peter Marsh, Equipe SAFE - Laboratoire GREYC - UMR6072 |
|
16:30 - 17:00 |
› Désapprentissage pour la Mitigation d'Attaques en Apprentissage et le Droit à l'Oubli sans Réentraînement Coûteux - Achraf Kerzazi, Orange Innovation |
|
17:00 - 17:30 |
› Leveraging Image Quality for Face PAD: IQA-Aware PAD - Hamza Bouzid, Equipe SAFE - Laboratoire GREYC - UMR6072 |
|
16:00 - 17:30
|
GT PVP-MFS (Amphi 49) |
(+)
|
16:00 - 16:45 |
› Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol - Alexandre Debant, Inria |
|
16:45 - 17:30 |
› Formal Modeling with Account Access Graphs - Saša Radomirović, Heriot-Watt University |
|
|