BARTOLO Virgile | Crypto | KU Leuven | Design of ciphers which protect themselves against side-channel by generalising the Threshold Implementation (TI) properties | |||
BOUVIER Clémence | Crypto | INRIA Paris | Analyse de la securite de primitives symetriques dediees au MPC et a diverses techniques de preuves | |||
BRGONIART Juliette | Crypto | ******* | Étude de l'anonymat dans les cryptomonnaies | |||
CHERIERE Agathe | Crypto | IRNIA Rennes | Etude des attaques par canaux auxiliaire sur ROLLO | |||
CIMA Mathieu | Crypto | Incert | Security considerations for Machine Readable Travel Documents (MRTD) | |||
EMMELIN Etienne | Crypto | Univ Caen | Construction of maximal unramified p-extensions with prescribed Galois groups | |||
FORLOT Francois | Crypto | Secure IC | Preprocessing for secret key recovery on side channel analysis context | |||
HOUEDRY Pierre | Crypto | IRMAR | Equations aux q-différences p-adiques | |||
JEZEQUEL Loïc | Crypto | ******* | Deep Learning : LA solution pour trier des mots de passe ? | |||
LANGUILLE Victor | Crypto | Telecom/SystemX | Post-Quantum Cryptographic Primitives | |||
MASURE Orane | Crypto | Idemia | Etude des attaques par canaux auxiliaires basées sur l'intelligence artificielle | |||
NOWAK Stefan | Crypto | ******* | rétro conception de Sbox non documentées | |||
SALEN Robin | Crypto | Toposware | Blockchain | |||
VLASAK Lukas | Crypto | Secure IC | Integration and selection of Side-Channel Analyses in the context of Target-Agnostic and Target-Dependent Evaluations |