Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

139 résultats
Image document

A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security Policies

Do Duc Anh Nguyen , Fabien Autrel , Ahmed Bouabdallah , Guillaume Doyen
NOMS 2023: IEEE/IFIP Network Operations and Management Symposium, May 2023, Miami, United States. pp.1-7, ⟨10.1109/NOMS56928.2023.10154304⟩
Communication dans un congrès hal-04223371v1
Image document

Oblivious Transfer with Constant Computational Overhead

Elette Boyle , Geoffroy Couteau , Niv Gilboa , Yuval Ishai , Lisa Kohl , et al.
42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2023), Apr 2023, Lyon, France. pp.271-302, ⟨10.1007/978-3-031-30545-0_10⟩
Communication dans un congrès hal-04265616v1
Image document

Non-Interactive Secure Computation of Inner-Product from LPN and LWE

Geoffroy Couteau , Maryam Zarezadeh
Advances in Cryptology - ASIACRYPT 2022, Dec 2022, Taipei, Taiwan
Communication dans un congrès hal-03860759v1
Image document

A comprehensive, formal and automated analysis of the EDHOC protocol

Charlie Jacomme , Elise Klein , Steve Kremer , Maïwenn Racouchot
USENIX Security '23 - 32nd USENIX Security Symposium, Aug 2023, Anaheim, CA, United States
Communication dans un congrès hal-03810102v1
Image document

French 2022 legislatives elections: a verifiability experiment

Véronique Cortier , Pierrick Gaudry , Stéphane Glondu , Sylvain Ruhault
The E-Vote-ID Conference 2023, Oct 2023, Luxembourg City, Luxembourg
Communication dans un congrès hal-04205615v1
Image document

Belenios with cast as intended

Véronique Cortier , Alexandre Debant , Pierrick Gaudry , Stéphane Glondu
Voting 2023 - 8th Workshop on Advances in Secure Electronic Voting, May 2023, Bol, Brač, Croatia
Communication dans un congrès hal-04020110v1
Image document

Active disjunctive constraint acquisition

Grégoire Menguy , Sébastien Bardin , Arnaud Gotlieb , Nadjib Lazaar
KR 2023 - 20th International Conference on Principles of Knowledge Representation and Reasoning, Sep 2023, Rhodes, Greece. pp.512-520, ⟨10.24963/kr.2023/50⟩
Communication dans un congrès cea-04258912v1
Image document

Machine-Checked Proofs of Accountability: How to sElect who is to Blame

Constantin Catalin Dragan , François Dupressoir , Kristian Gjøsteen , Thomas Haines , Peter Rønne , et al.
ESORICS 2023, Sep 2023, The Hague, The Netherlands, Netherlands. ⟨10.1007/978-3-031-51479-1_24⟩
Communication dans un congrès hal-04216243v1
Image document

Federated Learning on Personal Data Management Systems: Decentralized and Reliable Secure Aggregation Protocols

Julien Mirval , Luc Bouganim , Iulian Sandu Popa
SSDBM 2023 - 35th International Conference on Scientific and Statistical Database Management, USC Information Sciences Institute, Jul 2023, Los Angeles CA, United States. pp.1-12, ⟨10.1145/3603719.3603730⟩
Communication dans un congrès hal-04234924v1
Image document

Scalable program clone search through spectral analysis

Tristan Benoit , Jean-Yves Marion , Sébastien Bardin
ESEC/FSE '23 - 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Dec 2023, San Francisco, United States. ⟨10.48550/arXiv.2210.13063⟩
Communication dans un congrès hal-03826726v4

Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrapping

Adda-Akram Bendoukha , Pierre-Emmanuel Clet , Aymen Boudguiga , Renaud Sirdey
DBSec2023, 13942, Springer Nature Switzerland, pp.91-109, 2023, Lecture Notes in Computer Science, ⟨10.1007/978-3-031-37586-6_6⟩
Proceedings/Recueil des communications hal-04460039v1
Image document

Choose your Path: Control of Ring Oscillators EMFI Susceptibility through FPGA P&R Constraints

Sami El Amraoui , Régis Leveugle , Paolo Maistri
International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS 2024), Apr 2024, Kielce, Poland
Communication dans un congrès hal-04513560v1
Image document

Combining homomorphic encryption and differential privacy in federated learning

Arnaud Grivet Sebert , Marina Checri , Oana Stan , Renaud Sirdey , Cedric Gouy-Pailler
2023 20th Annual International Conference on Privacy, Security and Trust (PST), Aug 2023, Copenhague, Denmark. 10320195 (7 p.), ⟨10.1109/PST58708.2023.10320195⟩
Communication dans un congrès cea-04485721v1
Image document

Feedback to the European Data Protection Board’s Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive

Cristiana Santos , Nataliia Bielova , Vincent Roca , Mathieu Cunche , Gilles Mertens , et al.
Inria & Université Cote d'Azur, CNRS, I3S, Sophia Antipolis, France. 2024
Rapport hal-04437008v1
Image document

A Higher-Order Indistinguishability Logic for Cryptographic Reasoning

David Baelde , Adrien Koutsos , Joseph Lallemand
LICS, Jun 2023, Boston, United States. pp.1-13, ⟨10.1109/LICS56636.2023.10175781⟩
Communication dans un congrès hal-03981949v2
Image document

CryptoVerif: a Computationally-Sound Security Protocol Verifier (Initial Version with Communications on Channels)

Bruno Blanchet
RR-9525, Inria Paris. 2023, pp.166
Rapport hal-04246199v1
Image document

CryptoVerif: a Computationally-Sound Security Protocol Verifier

Bruno Blanchet , Charlie Jacomme
RR-9526, Inria. 2023, pp.194
Rapport hal-04253820v1

Reachability Analysis of Self Modifying Code

Tayssir Touili , Xin Ye
International Journal of Foundations of Computer Science, 2023, 34 (05), pp.507-536. ⟨10.1142/S0129054122500290⟩
Article dans une revue hal-04295949v1
Image document

Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co

Constantin Catalin Dragan , Francois Dupressoir , Ehsan Estaji , Kristian Gjøsteen , Thomas Haines , et al.
2022 IEEE 35th Computer Security Foundations Symposium (CSF), Aug 2022, Haifa, Israel. ⟨10.1109/CSF54842.2022.9919663⟩
Communication dans un congrès hal-03913573v2
Image document

Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware

Antonio Ruggia , Dario Nisi , Savino Dambra , Alessio Merlo , Davide Balzarotti , et al.
ASIAACS 2024, 19th ACM ASIA Conference on Computer and Communications Security, ACM, Jul 2024, Singapore, Singapore
Communication dans un congrès hal-04378941v1
Image document

Typing High-Speed Cryptography against Spectre v1

Basavesh Ammanaghatta Shivakumar , Gilles Barthe , Benjamin Grégoire , Vincent Laporte , Tiago Oliveira , et al.
SP 2023- IEEE Symposium on Security and Privacy, IEEE, May 2023, San Francisco, United States. pp.1592-1609, ⟨10.1109/SP46215.2023.10179418⟩
Communication dans un congrès hal-04106448v1
Image document

RSSI-based Fingerprinting of Bluetooth Low Energy Devices

Guillaume Gagnon , Sébastien Gambs , Mathieu Cunche
SECRYPT 2023 - 20th International Conference on Security and Cryptography, Jul 2023, Rome, Italy. pp.1-12
Communication dans un congrès hal-04161424v1
Image document

Rétro-ingénierie et détournement de piles protocolaires embarquées, un cas d'étude sur le système ESP32

Damien Cauquil , Romain Cayre
SSTIC 2023, Symposium sur la sécurité des technologies de l'information et des communications, Jun 2023, Rennes, France
Communication dans un congrès hal-04228161v1

Modularity, Code Specialization, and Zero-Cost Abstractions for Program Verification

Son Ho , Aymeric Fromherz , Jonathan Protzenko
Proceedings of the ACM on Programming Languages, 2023, 7 (ICFP), pp.385-416. ⟨10.1145/3607844⟩
Article dans une revue hal-04301439v1
Image document

Themis: an On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability

Mikaël Bougon , Hervé Chabanne , Véronique Cortier , Alexandre Debant , Emmanuelle Dottax , et al.
CCS 2022 - The ACM Conference on Computer and Communications Security, Nov 2022, Los Angeles, United States. ⟨10.1145/3548606.3560563⟩
Communication dans un congrès hal-03763294v2
Image document

Symbolic protocol verification with dice: process equivalences in the presence of probabilities (extended version)

Vincent Cheval , Raphaëlle Crubillé , Steve Kremer
2023
Pré-publication, Document de travail hal-03683907v2
Image document

Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts Proactive and Adaptive Security

Guilhem Castagnos , Dario Catalano , Fabien Laguillaumie , Federico Savasta , Ida Tucker
Theoretical Computer Science, 2023, 939, pp.78-104. ⟨10.1016/j.tcs.2022.10.016⟩
Article dans une revue hal-03927198v1
Image document

Evaluating the Reusability of Android Static Analysis Tools

Jean-Marie Mineau , Jean-François Lalande
21st International Conference on Software and Systems Reuse, Jun 2024, Limassol, Cyprus
Communication dans un congrès hal-04557993v1
Image document

Improved Private Set Intersection for Sets with Small Entries

Dung Bui , Geoffroy Couteau
26th IACR International Conference on Practice and Theory of Public-Key Cryptography,, May 2023, Atlanta (GA), United States. pp.190-220, ⟨10.1007/978-3-031-31371-4_7⟩
Communication dans un congrès hal-04265603v1
Image document

Binsec/Rel: Symbolic binary analyzer for security with applications to constant-Time and secret-erasure

Lesly-Ann Daniel , Sébastien Bardin , Tamara Rezk
ACM Transactions on Privacy and Security, 2023, 26 (2), pp.11:1-42. ⟨10.1145/3563037⟩
Article dans une revue cea-04228169v1