New Search

If you are not happy with the results below please do another search

18 search results for: cryptography

1

Cryptography: what are the random numbers for?

Hervé Debar, Télécom SudParis – Institut Mines-Télécom and Olivier Levillain, Télécom SudParis – Institut Mines-Télécom The original purpose of cryptography is to allow two parties (traditionally referred to as Alice and Bob) to exchange messages without another party (traditionally known as Eve) being able to read them. Alice and Bob will therefore agree on a […]

2

Seald: transparent cryptography for businesses

Since 2015, the start-up Seald has been developing a solution for the encryption of email communication and documents. Incubated at ParisTech Entrepreneurs, it is now offering businesses a simple-to-use cryptography service, with automated operations. This provides an alternative to the software currently on the market, which is generally hard to get to grips with.   […]

4

Taking on quantum computers

What if quantum computers, with their high computing power, were already available: what would happen? How would quantum computing transform communications and the way they are encrypted? Romain Alléaume, a researcher at Télécom Paris, talks to us about his research for the future of cryptography.   A hypothetical quantum computer with its high computing power […]

5

CiViQ: working towards implementing quantum communications on our networks

End 2018, the CiViQ H2020 European project was launched for a period of three years. The project aims to integrate quantum communication technologies into traditional telecommunication networks. This scientific challenge calls upon Télécom Paris’ dual expertise in both quantum cryptography and optical telecommunication, and will provide more security for communications. Romain Alléaume, a researcher in […]

6

PAPAYA: a European project for a confidential data analysis platform

EURECOM is coordinating the three-year European project, PAPAYA, launched on May 1st. Its mission: enable cloud services to process encrypted or anonymized data without having to access the unencrypted data. Melek Önen, a researcher specialized in applied cryptography, is leading this project. In this interview she provides more details on the objectives of this H2020 […]

7

Hardware attacks, a lingering threat for connected objects

Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly exploiting interaction with a system’s electronic components. These sneak attacks are particularly effective against connected objects. Jean-Max Dutertre’s team […]

8

20 words for understanding digital trust

The issue of digital trust has never been more relevant. The 15th IMT Personal Data Values and Policies Chair Meeting, held on 8 March a few weeks before the European general data protection regulation (GDPR) enters into force, was devoted to presenting its book “Signes de confiance : l’impact des labels sur la gestion des données […]

9

Introducing BART, the Blockchain’s French Scientific Alliance

Four research institutions, including Télécom ParisTech and Télécom SudParis, are embarking on a joint research initiative focused on the blockchain. Along with INRIA and the Institute for Technological Research (IRT) SystemX, this scientific task force will take on the challenge of integrating the blockchain into industrial processes. The six focus areas of this research initiative […]

10

Researching technological disruptions to prepare for the future

Fundamental and applied research are often simplistically portrayed as being opposite each other. The Carnot program, run by the Ministry of Higher Education, Research and Innovation, and by the National Research Agency (ANR), challenges this vision. Though its primary objective is to develop virtuous partnerships between public research institutions and companies in order to stimulate […]