Imprimer

Nous recrutons

Si vous souhaitez vous joindre à l'équipe crypto pour effectuer un stage, une thèse, un postdoctorat ou pour travailler sur un projet, n'hésitez pas à contacter un des permanents. En particulier, nous proposons:

 

University of Versailles-St-Quentin-en-Yvelines, France
Post-Doc in Applied Cryptography

The Crypto Group at the University of Versailles-St-Quentin-en-Yvelines,
France, offers

    a full-time position for a postdoctoral researcher

in a project funded by the High Tech Low Cost
Industrial Chair (UVSQ-Continental)

The project is related to automotive cyber security threats,
vulnerabilities, and risk mitigation/countermeasures. More specifically,
the overall goal will be to analyze, develop and improve cryptographic
algorithms and protocols for recent in-vehicle embedded device.

The position is available immediately, with an internationally
competitive salary. The starting date is negotiable. The initial
contract can be offered until December 31st, 2014, with the perspective
of an extension.

There are no teaching obligations.

The successful candidate must have a Master's degree (or an equivalent
degree) in Computer Science, Mathematics, or a related discipline, and
have completed, or be near completion of a PhD degree in cryptography.
Good English skills are expected; knowledge of French is not required.

Applications will be considered until the position is filled.

Contact: Prof. Louis Goubin, Louis.Goubin at uvsq.fr

 


 

PHD Thesis

Research field

Electronics and microelectronics - Optoelectronics / Engineering science
Computer science and software / Engineering science

Title

Protecting Pairing algorithms against physical attacks

Abstract

Pairing Based Cryptography (PBC) has recently been studied and developed to satisfyemerging industrial and societal needs such as user privacy, identity based encryption or efficient key establishment protocols. Research on PBC has mainly been focusing on the mathematical robustness of the proposed algorithms or on the latter's calculation times. Latest published results have shown that PBC is also vulnerable to physical attacks: research work carried by the Secure Architectures & Systems (SAS) lab of the CEA has shown that all the parts of a Pairing algorithm can be attacked using fault injections. The first objective of this thesis is to study, in the same way as the work done using fault attacks, the vulnerability of PBC to side channel analysis. Then efficient countermeasures shall be studied and tested in order to make PBC implementations immune against physical attacks (fault injections and side channel analysis).

Location

DPACA (CTReg)

Autre
Centre : Grenoble
Starting date : 01/01/2014

Contact person

Jacques FOURNIER
CEA / DRT/DPACA/LSAS
CMP Georges Charpak

880 Avenue de Mimet

13541 Gardanne

France
Phone : +3 34 42 61 67 34

More about

http://www.emse.fr/~fournier
http://cmp.mines-stetienne.fr/co...ecure-architectures-and-systems-sas

University / Graduate School

Versailles-St-Quentin-en-Yvelines
Sciences et Technologies de Versailles - UVSQ -

Thesis supervisor

Louis GOUBIN
UVSQ / PRiSM
Université de Versailles St Quentin en Yvelines - UVSQ
 
Laboratoire PRiSM
45 avenue des Etats-Unis
78035 Versailles Cedex

PHD Thesis

Research field

Mathematics - Numerical analysis - Simulation / Engineering science
Electronics and microelectronics - Optoelectronics / Engineering science

Title

Microcontroller with ciphered instructions and data stream

Abstract

As part of our activities in security, LETI's systems department is interested in the vulnerabilities of embedded systems. Most general use electronic products have one or several microcontrollers (e.g. automotive, multimedia, energy, smartphone ...) which are subject to multiple attack vectors like the reverse engineering of the firmware. These attacks can result to disclose algorithms and security protocols, cryptographic keys, to inject malicious code (like trojans, viruses ...) or to clone the device. For countermeasures, the state of the art already shows solutions where the firmware is block ciphered with the major drawback to extend the access time to the memory of the microcontroller and to disclose plaintext information into the RAM. A stream cipher approach seems more appropriate to process a sequence of instructions. However, taking into account ?jump? instructions will require dynamic access to the keystream. In addition, to reduce data access latency, we will focus on homomorphic encryption which has the advantage of performing arithmetic operations directly on encrypted operands. The thesis will include the study and the design of crypto-systems adapted to the objectives then it will decline them in a microcontroller architecture that ultimately will be evaluated on a digital FPGA demonstrator.

Location

Département Systèmes et Intégration de Solutions (LETI)
Service Technologies de la Communication et de la Sécurité
Laboratoire Solutions sans fils et Plateformes numériques
Centre : Grenoble
Starting date : 01/10/2014

Contact person

Olivier SAVRY
CEA / DRT/DSIS/STCS
CEA/Grenoble
Phone : 04 38 78 09 47

More about

http://www.leti.fr

University / Graduate School

Versailles-St-Quentin-en-Yvelines
Sciences et Technologies de Versailles - UVSQ -

Thesis supervisor

Louis GOUBIN
UVSQ / PRiSM
Université de Versailles St Quentin en Yvelines - UVSQ
 
Laboratoire PRiSM
45 avenue des Etats-Unis
78035 Versailles Cedex
DMC Firewall is a Joomla Security extension!