European Cyber Week 2024
In 2024, European Cyber Week confirms its European and international dimension, and also sees its format evolve. While the congress traditionally focuses on strategic autonomy in cybersecurity and cyberdefense, artificial intelligence for defense is taking on a more prominent role. You will therefore find the traditional CAID conference, covering all AI techniques and fields of application for defense AI: cyber, intelligence, command, air, land, sea, etc. This conference is complemented by new events, notably those devoted to recent advances in “generative AI” or “AI security”.
In a world where technology represents as many opportunities as challenges, it is indeed crucial to understand how AI can serve our country by strengthening its digital sovereignty.
Join Secure-IC’s team at ECW 2024 and discuss your embedded cybersecurity needs with our team of experts!
Book a meeting with our Sales team
Attend a speech of Sylvain Guilley (CTO & Co-Founder of Secure-IC)
- Title: Entropy and Reliability of the Loop-PUF
- Abstract: The Loop-PUF is a strong Physically Unclonable Function (PUF), that can be implemented from a Register Transfer Level (RTL) description. It thus enjoys a portability on several targets, such as Field Programmable Gate Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs). Its loop structure makes it possible to trade rebuilding time for rebuilding reliability & entropy. Moreover, L-PUF is compliant to ISO/IEC 20897 and is robust against both passive (side-channel measurement) and active (fault injection) attacks. Extensive characterizations show its resilience to PVT, aging, and physical attacks. Deployment examples and use-cases will be covered as well.
- Title : “Transitioning embedded systems to post quantum cryptography”
- Abstract : In this talk I’ll share a return on experiment about transitioning embedded systems to PQC. First aspect concerns the scope of PQC usage; a proper transition is not limited to firmware manangement and security services while in mission mode: indeed, for consistency reasons, the provisioning steps shall also be PQC: this entails transitioning of authentication, authorization, and secure channel functions as well. Second aspect regards cryptoagility: how to address choices such as support of all or part of key sizes, stateful vs. stateless, PQC vs. hybrid classical/PQC, etc.? Eventually, comes the question of compliance, to NIST CAVP/CMVP, to secure composition of hybrid modes of operation (leveraging ISO/IEC 29128), and to implementation security (Common Criteria).