Logo Lab-STICCFrom sensors to knowledge: Communicate and decide

Search

Your search query : hardware security
19 results found

Webinar by Yehya Nasser @Infineon Technologies: High-Level Power Estimation Method for Power and Security Assessments for Faster Time-to-Market

Yehya Nasser (2AI) has been invited by Infineon Technologies on March 28 to give a talk on “High-Level Power Estimation Method for Power and Security Assessments for Faster Time-to-Market” Abstract: In this talk, the focus will be on the intersection…

Read more

PENSEC William

Read more

GAUDIN Nicolas

Read more

Drones

The laboratory is developing very strong expertise on research about drones and drone swarms. He has a broad spectrum of skills related to the challenges of developing systems based on the intensive use of drones, whether in the fields of design and …

Read more

Cyber

The laboratory is developing a very strong expertise in cybersecurity. It has a wide range of skills related to cybersecurity issues in the fields of software and hardware architectures, communications and networks, critical systems and risks related…

Read more

WG security

The working group (WG) "hardwaresecurity" aims to present and discuss contributions as well as technical and bibliographic studies from team members and guests on topics such as: hardware cyber-security, secure circuits, security of embedded softwar…

Read more

Scientific animation

The scientific animation within the ARCAD team is organized around several internal and often widely open events: scientific and technical seminars (recent results, introductions, state of art presentations, tools presentations, etc.); working group…

Read more

Projects

Current projects 2022/01 - 2024/06, ANR TrustGW: IoT gateway protection against software and communication threats Partners : Lab-STICC (P. Cotret, G. Gogniat, P. Tanguy), IRISA, IETR 2021/10 - 2024/12, Labex CominLabs SCRATCHS: Side-Channel Re…

Read more

Seminars

Team seminars are given by ARCAD members and visiting collaborators (students and researchers), they are open to all pole and lab members. Usual format: 30 et 40 minutes presentation followed by 15 to 20 minutes for questions and discussion.     2023…

Read more

SI3

Read more

COSYDE

Read more

TRAN Hai Nam

Read more

LAPOTRE Vianney

Read more

GOGNIAT Guy

Guy Gogniat is a Professor in ECE with the Université Bretagne Sud, Lorient, France, where he has been since 1998. In 2005, he spent one year as an invited Researcher with the University of Massachusetts, Amherst, USA, where he worked on embedded sys…

Read more

Former Members

Former PhD students: Dr Noura AIT MANSSOUR, 2019-2023, PEC grant funded by Brittany Région (CNRS administrative management), PhD thesis on "HardwareSecurity of Embedded Processors against Fault Injection Attacks". Dr Émilien FOURNIER, 2018-2022, PE…

Read more

TISSERAND Arnaud

Read more

ARCAD

FIXME

Read more

T2I3

Keywords : communication systeme, information processing, information coding and decoding, adequation algorithme & architecture, Physical Layer security,  artificial intelligence. The pole Traitement et Transmission de l’Information, algorIthme et In…

Read more

SHARP

  Until  few years ago, embedded systems were often isolated from their environment. Due to new applications such as IoT, autonomous systems or more generally applications that require significant computing and storage resources (e.g. artificial inte…

Read more