gdr-secu-jn2025 : Journées Nationales 2025 du GDR Sécurité Informatique
23-25 Jun 2025 Caen (France)
FR
EN
ATTENTION : Thursday, August 21 an operation is planned on the database server
which may cause access issues on Sciencesconf
Login
Lost password ?
Create account
Main menu
Home
Planning
Code of conduct
Speed mentoring
Registration
Sponsors
Map
Organisation
Social event
Slides
HELP
@ Contact
Planning
Week
Mon. 23
Tue. 24
Wed. 25
List
Tuesday, June 24, 2025
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
›9:00 (1h)
Keynote - Claudia Diaz
› Amphi 49
9:00 - 10:00 (1h)
Keynote - Claudia Diaz
Amphi 49
›
The Nym Network: Design and Challenges
- Claudia Diaz, COSIC, KU Leuven
09:00-10:00 (1h)
›10:00 (45min)
Coffee break - speed mentoring
10:00 - 10:45 (45min)
Coffee break - speed mentoring
›10:45 (45min)
Plenary - Nicolas Anciaux
› Amphi 49
10:45 - 11:30 (45min)
Plenary - Nicolas Anciaux
Amphi 49
›
LLMs and Privacy: from risk assessment to privacy enhancing tools
- Nicolas Anciaux, Concevoir des technologies d'amélioration de la vie privée explicables et efficaces
10:45-11:30 (45min)
›11:30 (45min)
Plenary - partners
› Amphi 49
11:30 - 12:15 (45min)
Plenary - partners
Amphi 49
›12:15 (1h25)
Lunch - partners booths
› Hall
12:15 - 13:40 (1h25)
Lunch - partners booths
Hall
›13:40 (30min)
REDOCS
› Amphi 49
13:40 - 14:10 (30min)
REDOCS
Amphi 49
›
Automating Attack Data Labeling with Generated Rules and Anomaly Detection
- Rémi Bouchayer, Institut Polytechnique de Paris
13:40-14:10 (30min)
›14:15 (1h30)
WG C2
› Amphi 44
14:15 - 15:45 (1h30)
WG C2
Amphi 44
›
The relevance and challenges of random probing security for post-quantum algorithms. Application to Raccoon signature scheme.
- Mélissa Rossi, CryptoExperts
14:15-15:00 (45min)
›
New efficiently decodable rank metric codes
- Rakhi Pratihar, INRIA & LIX
15:00-15:20 (20min)
›
Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond
- Pouria Fallahpour, LIP6
15:25-15:45 (20min)
›14:15 (1h30)
WG SSLR-SSM
› Amphi 49
14:15 - 15:45 (1h30)
WG SSLR-SSM
Amphi 49
›
Compromising Electromagnetic Emanations: Side-Channel Leakages in (Connected) Embedded Devices
- Pierre Ayoub, Trustworthy systems: foundations and practices
14:15-15:00 (45min)
›
On the modelling of processor micro-architecture for masked software verification
- Karine Heydemann, Thales
15:00-15:45 (45min)
›15:45 (30min)
Coffee break
› Hall
15:45 - 16:15 (30min)
Coffee break
Hall
›16:15 (1h30)
WG C2
› Amphi 44
16:15 - 17:45 (1h30)
WG C2
Amphi 44
›
Threshold Cryptography based on class groups of imaginary quadratic fields
- Guilhem Castagnos, Université de Bordeaux
16:15-17:00 (45min)
›
Randomness Delegation and its Connections with Secure Computation
- Mahshid Riahinia, Ecole Normale Supérieure
17:00-17:20 (20min)
›
Private Heavy-Hitters through Multi-Dealer Secret Sharing
- Gabrielle Becke, Exact Computing
17:25-17:45 (20min)
›16:15 (1h30)
WG SSLR-SSM
› Amphi 49
16:15 - 17:45 (1h30)
WG SSLR-SSM
Amphi 49
›
Partitionnement dynamique à grain fin contre des attaques par canaux auxiliaires exploitant les mémoires caches
- Vianney Lapôtre, Laboratoire Lab-STICC
16:15-17:00 (45min)
›
Secure compilation—with the compiler, not against: first experiments on 'Tracing LLVM'
- Sébastien Michelland, Laboratoire de Conception et d'Intégration des Systèmes
17:00-17:45 (45min)
›19:00 (2h)
Dinner cocktail at Caen's castle
19:00 - 21:00 (2h)
Dinner cocktail at Caen's castle
Le Mancel - Restaurant of Caen's castle
Session
Speech
Logistics
Break
Tour
Privacy
|
Accessibility
Loading...