Project : cascade
Section: Contracts and Grants with Industry
Contracts with Industrial Partners
ECRYPT: Network of Excellence in Cryptology.
From February 2004 to July 2008.
The ECRYPT research roadmap is motivated by the changing environment (evolving toward ambient intelligence) and threat models in which cryptology is deployed, by the gradual erosion of the computational difficulty of the mathematical problems on which cryptology is based, by the need of strong foundations in the watermarking area and by the requirements of new applications and cryptographic implementations.
The main objective of ECRYPT is to ensure a durable integration of European research in both academia and industry and to maintain and strengthen the European excellence in these areas.
There are five virtual labs that focus on the following core research areas: symmetric key algorithms (STVL), public key algorithms (AZTEC), protocols (PROVILAB), secure and efficient implementations (VAMPIRE), and watermarking (WAVILA).
ENS/INRIA/CASCADE leads the AZTEC virtual lab and the ECRYPT strategic committee.
ECRYPT-II: Network of Excellence in Cryptology.
From August 2008 to July 2012.
There are three virtual labs that focus on the following core research areas: symmetric key algorithms (STVL), public key algorithms and protocols (MAYA), and secure and efficient implementations (VAMPIRE).
ENS/INRIA/CASCADE leads the MAYA virtual lab.
Wired Smart
From December 2005 to June 2008.
Partners: RealViz, ENPC/CERTIS, Mokros Image.
Hardware implementation of image and video processing algorithms for special effects.
SUPERES: Super Resolution
From 2006 to 2008.
Partners: Analog Way, LetItWave, Mokros Image, Vitec multimédia.
This project deals with FPGA design & implementation of a key real-time algorithm in video interpolation, from low quality TV to HDTV.
BACH: Biometric Authentication with Cryptographic Handling.
From November 2005 to December 2009.
Partners: Sagem, Cryptolog.
This project studies how to combine biometric data and cryptographic protocols, in order to preserve privacy.
SAPHIR (Sécurité et Analyse des Primitives de Hachage Innovantes et Récentes)
Security and analysis of innovating and recent hashing primitives.
From November 2005 to March 2009.
Partners: France Telecom R&D, Gemalto, DCSSI, Cryptolog.
This project aims at improving recent attacks against hash functions, but also at designing new (provably secure) hash functions.
SAPHIR-II (Sécurité et Analyse des Primitives de Hachage Innovantes et Récentes)
Security and analysis of innovating and recent hashing primitives.
From April 2009 to March 2013.
Partners: France Telecom R&D, Gemalto, EADS, SAGEM, DCSSI, Cryptolog, INRIA/Secret, UVSQ, XLIM, CryptoExperts.
SAVE (Sécurité et Audit du Vote Electronique)
Security and audit for electronic voting.
From December 2006 to June 2010.
Partners: France Telecom R&D, GET/ENST, GET/INT, Supélec, Cryptolog.
This project extends an earlier Crypto++ project, but for electronic voting only, and at a larger scale: not only the security at the cryptographic level will be considered (validity of the computations, correctness of the ballot, anonymity, etc) but also at the network level (infrastructure, etc).
PACE: Pairings and Advances in Cryptology for E-cash.
From December 2007 to November 2011.
Partners: France Telecom R&D, NXP, Gemalto, CNRS/LIX (INRIA/TANC), Univ. Caen, Cryptolog.
This project aims at studying new properties of groups (similar to pairings, or variants), and then to exploit them in order to achieve more practical e-cash systems.
PAMPA: Password Authentication and Methods for Privacy and Anonymity.
From December 2007 to November 2011.
Partners: EADS, Cryptolog.
One of the goals of this project is to improve existing password-based techniques, not only by using a stronger security model but also by integrating one-time passwords (OTP). This could avoid for example having to trust the client machine, which seems hard to guarantee in practice due the existence of numerous viruses, worms, and Trojan horses. Another extension of existing techniques is related to group applications, where we want to allow the establishment of secure multicast networks via password authentication. Several problems are specific to this scenario, such as dynamicity, robustness, and the random property of the session key, even in the presence of dishonest participants.
Finally, the need for authentication is often a concern of service providers and not of users, who are usually more interested in anonymity, in order to protect their privacy. Thus, the second goal of this project is to combine authentication methods with techniques for anonymity in order to address the different concerns of each party. However, anonymity is frequently associated with fraud, without any possible pursuit. Fortunately, cryptography makes it possible to provide conditional anonymity, which can be revoked by a judge whenever necessary. This is the type of anonymity that we will privilege.