gdr-secu-jn2025 : Journées Nationales 2025 du GDR Sécurité Informatique
23-25 juin 2025 Caen (France)
FR
EN
Connexion
Mot de passe oublié ?
Créer un compte
Navigation
Accueil
Programme
Code de Conduite
Speed mentoring
Inscription
Sponsors
Plan d'accès
Organisation
Social event
SUPPORT
@ Contact
Programme
Semaine
Lun. 23
Mar. 24
Mer. 25
Liste
mardi 24 juin 2025
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
›9:00 (1h)
Keynote - Claudia Diaz
› Amphi 49
9:00 - 10:00 (1h)
Keynote - Claudia Diaz
Amphi 49
›
The Nym Network: Design and Challenges
- Claudia Diaz, COSIC, KU Leuven
09:00-10:00 (1h)
›10:00 (45min)
Pause café - speed mentoring
10:00 - 10:45 (45min)
Pause café - speed mentoring
›10:45 (45min)
Plénière - Nicolas Anciaux
› Amphi 49
10:45 - 11:30 (45min)
Plénière - Nicolas Anciaux
Amphi 49
›
LLMs and Privacy: from risk assessment to privacy enhancing tools
- Nicolas Anciaux, Concevoir des technologies d'amélioration de la vie privée explicables et efficaces
10:45-11:30 (45min)
›11:30 (45min)
Plénière - partenaire industriel
› Amphi 49
11:30 - 12:15 (45min)
Plénière - partenaire industriel
Amphi 49
›12:15 (1h25)
Déjeuner - stands partenaires
› Hall
12:15 - 13:40 (1h25)
Déjeuner - stands partenaires
Hall
›13:40 (30min)
REDOCS
› Amphi 49
13:40 - 14:10 (30min)
REDOCS
Amphi 49
›
Automating Attack Data Labeling with Generated Rules and Anomaly Detection
- Rémi Bouchayer, Institut Polytechnique de Paris
13:40-14:10 (30min)
›14:15 (1h30)
GT C2
› Amphi 44
14:15 - 15:45 (1h30)
GT C2
Amphi 44
›
The relevance and challenges of random probing security for post-quantum algorithms. Application to Raccoon signature scheme.
- Mélissa Rossi, CryptoExperts
14:15-15:00 (45min)
›
New efficiently decodable rank metric codes
- Rakhi Pratihar, INRIA & LIX
15:00-15:20 (20min)
›
Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond
- Pouria Fallahpour, LIP6
15:25-15:45 (20min)
›14:15 (1h30)
GT SSLR-SSM
› Amphi 49
14:15 - 15:45 (1h30)
GT SSLR-SSM
Amphi 49
›
Compromising Electromagnetic Emanations: Side-Channel Leakages in (Connected) Embedded Devices
- Pierre Ayoub, Trustworthy systems: foundations and practices
14:15-15:00 (45min)
›
On the modelling of processor micro-architecture for masked software verification
- Karine Heydemann, Thales
15:00-15:45 (45min)
›15:45 (30min)
Pause café
› Hall
15:45 - 16:15 (30min)
Pause café
Hall
›16:15 (1h30)
GT C2
› Amphi 44
16:15 - 17:45 (1h30)
GT C2
Amphi 44
›
Threshold Cryptography based on class groups of imaginary quadratic fields
- Guilhem Castagnos, Université de Bordeaux
16:15-17:00 (45min)
›
Randomness Delegation and its Connections with Secure Computation
- Mahshid Riahinia, Ecole Normale Supérieure
17:00-17:20 (20min)
›
Private Heavy-Hitters through Multi-Dealer Secret Sharing
- Gabrielle Becke, Exact Computing
17:25-17:45 (20min)
›16:15 (1h30)
GT SSLR-SSM
› Amphi 49
16:15 - 17:45 (1h30)
GT SSLR-SSM
Amphi 49
›
Partitionnement dynamique à grain fin contre des attaques par canaux auxiliaires exploitant les mémoires caches
- Vianney Lapôtre, Laboratoire Lab-STICC
16:15-17:00 (45min)
›
Secure compilation—with the compiler, not against: first experiments on 'Tracing LLVM'
- Sébastien Michelland, Laboratoire de Conception et d'Intégration des Systèmes
17:00-17:45 (45min)
›19:00 (2h)
Cocktail dînatoire au château de Caen
19:00 - 21:00 (2h)
Cocktail dînatoire au château de Caen
Le Mancel - Restaurant du Château de Caen
Session
Discours
Logistique
Pause
Sortie
Vie privée
|
Accessibilité
Chargement...