Planning

Monday, June 23, 2025

Time Event (+)
11:30 - 12:45 Lunch (Hall)  
12:45 - 13:00 Welcome (Amphi 49)  
13:00 - 14:00 Keynote - Sandrine Blazy (Amphi 49) (+)  
13:00 - 14:00 › Verified compilation: towards zero-defect software - Sandrine Blazy, Univ Rennes, Inria, CNRS, IRISA  
14:00 - 14:45 PhD Award (+)  
14:00 - 14:45 › Symmetric cryptanalysis: from primitives to modes - Rachelle Heim Boissier, Université catholique de Louvain  
14:45 - 15:15 Coffee break (Hall)  
15:15 - 16:00 Plenary - José Lopes Esteves (+)  
15:15 - 16:00 › Electromagnetic interaction: threats for cybersecurity - José Lopes Esteves, Wireless Security Lab, French Network and Information Security Agency  
16:00 - 16:45 Plenary - Stéphanie Delaune (Amphi 49) (+)  
16:00 - 16:45 › Formal verification of security protocols: the Squirrel prover - Stéphanie Delaune, Institut de Recherche en Informatique et Systèmes Aléatoires  
16:45 - 17:00 Small break (Hall)  
17:00 - 18:30 Annual General Meeting (Amphi 49)  

Tuesday, June 24, 2025

Time Event (+)
09:00 - 10:00 Keynote - Claudia Diaz (Amphi 49) (+)  
09:00 - 10:00 › The Nym Network: Design and Challenges - Claudia Diaz, COSIC, KU Leuven  
10:00 - 10:45 Coffee break - speed mentoring  
10:45 - 11:30 Plenary - Nicolas Anciaux (Amphi 49) (+)  
10:45 - 11:30 › LLMs and Privacy: from risk assessment to privacy enhancing tools - Nicolas Anciaux, Concevoir des technologies d'amélioration de la vie privée explicables et efficaces  
11:30 - 12:15 Plenary - partners (Amphi 49)  
12:15 - 13:40 Lunch - partners booths (Hall)  
13:40 - 14:10 REDOCS (Amphi 49) (+)  
13:40 - 14:10 › Automating Attack Data Labeling with Generated Rules and Anomaly Detection - Rémi Bouchayer, Institut Polytechnique de Paris  
14:15 - 15:45 WG C2 (Amphi 44) (+)  
14:15 - 15:00 › The relevance and challenges of random probing security for post-quantum algorithms. Application to Raccoon signature scheme. - Mélissa Rossi, CryptoExperts  
15:00 - 15:20 › New efficiently decodable rank metric codes - Rakhi Pratihar, INRIA & LIX  
15:25 - 15:45 › Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond - Pouria Fallahpour, LIP6  
14:15 - 15:45 WG SSLR-SSM (Amphi 49) (+)  
14:15 - 15:00 › Compromising Electromagnetic Emanations: Side-Channel Leakages in (Connected) Embedded Devices - Pierre Ayoub, Trustworthy systems: foundations and practices  
15:00 - 15:45 › On the modelling of processor micro-architecture for masked software verification - Karine Heydemann, Thales  
15:45 - 16:15 Coffee break (Hall)  
16:15 - 17:45 WG C2 (Amphi 44) (+)  
16:15 - 17:00 › Threshold Cryptography based on class groups of imaginary quadratic fields - Guilhem Castagnos, Université de Bordeaux  
17:00 - 17:20 › Randomness Delegation and its Connections with Secure Computation - Mahshid Riahinia, Ecole Normale Supérieure  
17:25 - 17:45 › Private Heavy-Hitters through Multi-Dealer Secret Sharing - Gabrielle Becke, Exact Computing  
16:15 - 17:45 WG SSLR-SSM (Amphi 49) (+)  
16:15 - 17:00 › Partitionnement dynamique à grain fin contre des attaques par canaux auxiliaires exploitant les mémoires caches - Vianney Lapôtre, Laboratoire Lab-STICC  
17:00 - 17:45 › Secure compilation—with the compiler, not against: first experiments on 'Tracing LLVM' - Sébastien Michelland, Laboratoire de Conception et d'Intégration des Systèmes  
19:00 - 21:00 Dinner cocktail at Caen's castle - Le Mancel - Restaurant of Caen's castle  

Wednesday, June 25, 2025

Time Event (+)
09:00 - 09:45 Plenary - Marta Gomez-Barrero (Amphi 49) (+)  
09:00 - 09:45 › Impersonation Attacks on Biometric Recognition Systems - Marta Gomez-Barrero, Universität der Bundeswehr München [Neubiberg]  
09:45 - 10:30 Plenary - Emmanuela Orsini (Amphi 49) (+)  
09:45 - 10:30 › A Story of ZK Proofs: How Efficient ZK-Proofs Enable Signatures and New Applications - Emmanuela Orsini, Bocconi University [Milan, Italy]  
10:30 - 11:00 Coffee break (Hall)  
11:00 - 11:45 Plenary - Leyla Bilge (Amphi 49) (+)  
11:00 - 11:45 › Demystifying Modern Scams; Breaking the Stigma and Building Resilience - Leyla Bilge, Gen  
11:45 - 12:15 Rump Session (Amphi 49)  
12:15 - 13:15 Lunch (Hall)  
13:15 - 14:00 Plenary - Ksenia Ermoshina (Amphi 49) (+)  
13:15 - 14:00 › A federated sovereignty: how European Union adopts decentralized secure messaging - Ksenia Ermoshina, Centre Internet et Société  
14:00 - 15:30 WG SDM (Amphi 44) (+)  
14:00 - 14:45 › Evolving Digital Forensic Sciences - Lena Klasén, Department of National Operations, Swedish Police Authority, Sweden and Information Coding, Department of Electrical Engineering, Linköping University  
14:45 - 15:30 › Obscuration réversible de chiffres dans des images - Valentin Noyé, LIRMM  
14:00 - 15:30 WG PVP-MFS (Amphi 49) (+)  
14:00 - 14:45 › Régulation et technologies : exemples d'actions et de questionnements à la CNIL - Thibaud Antignac, Commission nationale de l'informatique des libertés  
14:45 - 15:30 › Recent Advances in Metric Privacy - Catuscia Palamidessi, Inria Saclay - Ile de France, Ecole Polytechnique  
15:30 - 16:00 Coffee break (Hall)  
16:00 - 17:30 WG SDM (Amphi 44) (+)  
16:00 - 16:30 › PAD datasets: Constraints and hidden factors in their conception - Peter Marsh, Equipe SAFE - Laboratoire GREYC - UMR6072  
16:30 - 17:00 › Désapprentissage pour la Mitigation d'Attaques en Apprentissage et le Droit à l'Oubli sans Réentraînement Coûteux - Achraf Kerzazi, Orange Innovation  
17:00 - 17:30 › Leveraging Image Quality for Face PAD: IQA-Aware PAD - Hamza Bouzid, Equipe SAFE - Laboratoire GREYC - UMR6072  
16:00 - 17:30 WG PVP-MFS (Amphi 49) (+)  
16:00 - 16:45 › Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol - Alexandre Debant, Inria  
16:45 - 17:30 › Formal Modeling with Account Access Graphs - Saša Radomirović, Heriot-Watt University  
Loading... Loading...