Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://feeds.feedburner.com/QualityAndSecurityOfInformationSystems

  1. <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
  2. xmlns:content="http://purl.org/rss/1.0/modules/content/"
  3. xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  4. xmlns:dc="http://purl.org/dc/elements/1.1/"
  5. xmlns:atom="http://www.w3.org/2005/Atom"
  6. xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  7. xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  8. >
  9.  
  10. <channel>
  11. <title></title>
  12. <atom:link href="https://qualsec.ulb.ac.be/feed/" rel="self" type="application/rss+xml" />
  13. <link>https://qualsec.ulb.ac.be</link>
  14. <description></description>
  15. <lastBuildDate>Mon, 09 Dec 2019 21:11:54 +0000</lastBuildDate>
  16. <language>en-US</language>
  17. <sy:updatePeriod>hourly</sy:updatePeriod>
  18. <sy:updateFrequency>1</sy:updateFrequency>
  19. <generator>https://wordpress.org/?v=4.9.13</generator>
  20. <item>
  21. <title>Seminar: Yves Roggeman &#8220;May we trust standard “things”?&#8221; (Dec 17, 2019)</title>
  22. <link>https://qualsec.ulb.ac.be/2019/12/09/seminar-yves-roggeman-may-we-trust-standard-things-dec-17-2019/</link>
  23. <pubDate>Mon, 09 Dec 2019 21:11:54 +0000</pubDate>
  24. <dc:creator><![CDATA[Gaurav Sharma]]></dc:creator>
  25. <category><![CDATA[QualSec seminars]]></category>
  26.  
  27. <guid isPermaLink="false">https://qualsec.ulb.ac.be/?p=8907</guid>
  28. <description><![CDATA[Dec 17, 2019 – 13.00 – room P.2NO8.08 Speaker: Yves Roggeman (ULB) Title: &#8220;May we trust standard “things”?&#8221; Short abstract: &#8220;Reflections about Hamming weight, standard libraries implementation and object inheritance behavior.&#8221;]]></description>
  29. <content:encoded><![CDATA[<p>Dec 17, 2019 – 13.00 – room P.2NO8.08</p>
  30. <p>Speaker: <strong>Yves Roggeman</strong> (ULB)</p>
  31. <p>Title: &#8220;May we trust standard “things”?&#8221;<br />
  32. Short abstract: &#8220;Reflections about Hamming weight, standard libraries implementation and object inheritance behavior.&#8221;</p>
  33. ]]></content:encoded>
  34. </item>
  35. <item>
  36. <title>Seminar: Thibault Debatty &#8220;An introduction to similarity search and k-nn graphs&#8221; (Dec 03, 2019)</title>
  37. <link>https://qualsec.ulb.ac.be/2019/12/03/seminar-thibault-debatty-an-introduction-to-similarity-search-and-k-nn-graphs-dec-03-2019/</link>
  38. <pubDate>Tue, 03 Dec 2019 07:19:59 +0000</pubDate>
  39. <dc:creator><![CDATA[Gaurav Sharma]]></dc:creator>
  40. <category><![CDATA[QualSec seminars]]></category>
  41.  
  42. <guid isPermaLink="false">https://qualsec.ulb.ac.be/?p=8902</guid>
  43. <description><![CDATA[Dec 03, 2019 – 13.00 – room P.2NO8.08 Speaker: Thibault Debatty (Royal Military School) Title: &#8220;An introduction to similarity search and k-nn graphs&#8221; Short abstract: &#8220;Similarity search is an essential component of machine learning algorithms. However, performing efficient similarity search can be extremely challenging, especially if the dataset is distributed between multiple computers, and even more if &#8230; </p><p><a class="more-link btn" href="https://qualsec.ulb.ac.be/2019/12/03/seminar-thibault-debatty-an-introduction-to-similarity-search-and-k-nn-graphs-dec-03-2019/">Continue reading &#187;</a>]]></description>
  44. <content:encoded><![CDATA[<p>Dec 03, 2019 – 13.00 – room P.2NO8.08</p>
  45. <p>Speaker: <strong>Thibault Debatty</strong> (Royal Military School)</p>
  46. <p>Title: &#8220;An introduction to similarity search and k-nn graphs&#8221;<br />
  47. Short abstract: &#8220;Similarity search is an essential component of machine learning algorithms. However, performing efficient similarity search can be extremely challenging, especially if the dataset is distributed between multiple computers, and even more if the similarity measure is not a metric. With the rise of Big Data processing, these challenging datasets are actually more and more common. In this presentation, we show how k nearest neighbors (k-nn) graphs can be used to perform similarity search, clustering and anomaly detection.&#8221;</p>
  48. ]]></content:encoded>
  49. </item>
  50. <item>
  51. <title>Seminar: Gaurav Sharma &#8220;Multi-Signatures in Blockchain&#8221; (Nov 26, 2019)</title>
  52. <link>https://qualsec.ulb.ac.be/2019/11/21/seminar-gaurav-sharma-multi-signatures-in-blockchain-nov-26-2019/</link>
  53. <pubDate>Thu, 21 Nov 2019 22:36:20 +0000</pubDate>
  54. <dc:creator><![CDATA[Gaurav Sharma]]></dc:creator>
  55. <category><![CDATA[QualSec seminars]]></category>
  56.  
  57. <guid isPermaLink="false">https://qualsec.ulb.ac.be/?p=8898</guid>
  58. <description><![CDATA[Nov 26, 2019 – 13.00 – room P.2NO8.08 Speaker: Gaurav Sharma (ULB) Title: &#8220;Multi-Signatures in Blockchain&#8221; Short abstract: &#8220;A multi-signature is a digital signature scheme which allows a group of users to sign a common message. The rogue key attack is the most annoying attack on such signatures. The recent engagement of multi-signatures in blockchain applications is &#8230; </p><p><a class="more-link btn" href="https://qualsec.ulb.ac.be/2019/11/21/seminar-gaurav-sharma-multi-signatures-in-blockchain-nov-26-2019/">Continue reading &#187;</a>]]></description>
  59. <content:encoded><![CDATA[<p>Nov 26, 2019 – 13.00 – room P.2NO8.08</p>
  60. <p>Speaker: <strong>Gaurav Sharma</strong> (ULB)</p>
  61. <p>Title: &#8220;Multi-Signatures in Blockchain&#8221;<br />
  62. Short abstract: &#8220;A multi-signature is a digital signature scheme which allows a group of users to sign a common message. The rogue key attack is the most annoying attack on such signatures. The recent engagement of multi-signatures in blockchain applications is quite appealing. In some particular blockchains, the forward secure multi-signatures are also useful. We study the current state-of-the-art and identify some design goals for secure multi-signatures in plain-public key model.&#8221;</p>
  63. ]]></content:encoded>
  64. </item>
  65. <item>
  66. <title>Seminar: François Gerard &#8220;New parameters and Cortex-M4 optimization for NewHope&#8221; (Nov 19, 2019)</title>
  67. <link>https://qualsec.ulb.ac.be/2019/11/18/seminar-francois-gerard-new-parameters-and-cortex-m4-optimization-for-newhope-nov-19-2019/</link>
  68. <pubDate>Mon, 18 Nov 2019 12:54:23 +0000</pubDate>
  69. <dc:creator><![CDATA[Gaurav Sharma]]></dc:creator>
  70. <category><![CDATA[QualSec seminars]]></category>
  71.  
  72. <guid isPermaLink="false">https://qualsec.ulb.ac.be/?p=8896</guid>
  73. <description><![CDATA[Nov 19, 2019 – 13.00 – room P.2NO8.08 Speaker: François Gerard (ULB) Title: &#8220;New parameters and Cortex-M4 optimization for NewHope&#8221;]]></description>
  74. <content:encoded><![CDATA[<p>Nov 19, 2019 – 13.00 – room P.2NO8.08</p>
  75. <p>Speaker: <strong>François Gerard</strong> (ULB)</p>
  76. <p>Title: &#8220;New parameters and Cortex-M4 optimization for NewHope&#8221;</p>
  77. ]]></content:encoded>
  78. </item>
  79. <item>
  80. <title>Seminar: Stefano Pironio &#8220;Device-independent quantum random number generation&#8221; (Nov 12, 2019)</title>
  81. <link>https://qualsec.ulb.ac.be/2019/11/10/seminar-stefano-pironio-device-independent-quantum-random-number-generation-nov-12-2019/</link>
  82. <pubDate>Sun, 10 Nov 2019 09:02:35 +0000</pubDate>
  83. <dc:creator><![CDATA[Gaurav Sharma]]></dc:creator>
  84. <category><![CDATA[QualSec seminars]]></category>
  85.  
  86. <guid isPermaLink="false">https://qualsec.ulb.ac.be/?p=8892</guid>
  87. <description><![CDATA[Nov 12, 2019 – 12.30 – room P.2NO8.08 Speaker: Stefano Pironio (ULB) Title: &#8220;Device-independent quantum random number generation&#8221; Short abstract: &#8220;By exploiting a feature of quantum theory known as nonlocality, it is possible to design a new kind of quantum random number generator (QRNG) that is qualitatively different from all existing random number generators in that the &#8230; </p><p><a class="more-link btn" href="https://qualsec.ulb.ac.be/2019/11/10/seminar-stefano-pironio-device-independent-quantum-random-number-generation-nov-12-2019/">Continue reading &#187;</a>]]></description>
  88. <content:encoded><![CDATA[<p>Nov 12, 2019 – 12.30 – room P.2NO8.08</p>
  89. <p>Speaker: <strong>Stefano Pironio</strong> (ULB)</p>
  90. <p>Title: &#8220;Device-independent quantum random number generation&#8221;<br />
  91. Short abstract: &#8220;By exploiting a feature of quantum theory known as nonlocality, it is possible to design a new kind of quantum random number generator (QRNG) that is qualitatively different from all existing random number generators in that the production of randomness can be certified independently of any assumption about the internal working of the device. This feature is known as &#8220;device-independence&#8221;. I will explain the basic principles underlying device-independent QRNGs and the current status of their experimental implementation.&#8221;</p>
  92. ]]></content:encoded>
  93. </item>
  94. <item>
  95. <title>Seminar: Soultana Ellinidou &#8220;The networking side of Interconnect&#8221; (Oct 29, 2019)</title>
  96. <link>https://qualsec.ulb.ac.be/2019/10/22/seminar-soultana-ellinidou-the-networking-side-of-interconnect-oct-29-2019/</link>
  97. <pubDate>Tue, 22 Oct 2019 10:17:16 +0000</pubDate>
  98. <dc:creator><![CDATA[Gaurav Sharma]]></dc:creator>
  99. <category><![CDATA[QualSec seminars]]></category>
  100.  
  101. <guid isPermaLink="false">https://qualsec.ulb.ac.be/?p=8885</guid>
  102. <description><![CDATA[Oct 29, 2019 – 12.30 – room P.2NO8.08 Speaker: Soultana Ellinidou (ULB) Title: &#8220;The networking side of Interconnect&#8221; Short abstract: &#8220;Since fifty years, the number of transistors that was able to fit into a single piece of silicon increased in a predictable way known as Moore’s law. This had as a result the digital evolution of minicomputers &#8230; </p><p><a class="more-link btn" href="https://qualsec.ulb.ac.be/2019/10/22/seminar-soultana-ellinidou-the-networking-side-of-interconnect-oct-29-2019/">Continue reading &#187;</a>]]></description>
  103. <content:encoded><![CDATA[<p>Oct 29, 2019 – 12.30 – room P.2NO8.08</p>
  104. <p>Speaker: <strong>Soultana Ellinidou</strong> (ULB)</p>
  105. <p>Title: &#8220;The networking side of Interconnect&#8221;<br />
  106. Short abstract: &#8220;Since fifty years, the number of transistors that was able to fit into a single piece of silicon increased in a predictable way known as Moore’s law. This had as a result the digital evolution of minicomputers to PCs, afterwards to smartphones and to cloud, by placing more and more transistors into each generation of their microchip and simultaneously making them more powerful and able to support the dynamic nature of today’s applications (for example in automotives and avionics). However the design and the validation of different architectures have been very well explored in literature, the interconnect fabric connecting the IP blocks of the entire System on Chip (Ship) must be equally explored in order to enable the properly distribution of the data within the system. As SoC grew in numbers of IP blocks, busses and crossbars interconnects revealed their limitations. Hence in the early 2000s, Network on chip (NoC) interconnect introduced as an on-chip packet switching micro-network in order to provide Quality of Service (QoS). Unfortunately due to high structural and functional complexity of NoC, researches start searching alternatives. In this presentation, we will present and evaluate the Software Defined Network on Chip (SDNoC), which is an NoC alternative by focusing on networking, routing and security aspects of it.&#8221;</p>
  107. ]]></content:encoded>
  108. </item>
  109. <item>
  110. <title>Seminar: Jérémie Roland &#8220;Quantum Weak Coin Flipping&#8221; (Oct 22, 2019)</title>
  111. <link>https://qualsec.ulb.ac.be/2019/10/10/seminar-jeremie-roland-quantum-weak-coin-flipping-oct-22-2019/</link>
  112. <pubDate>Thu, 10 Oct 2019 08:19:55 +0000</pubDate>
  113. <dc:creator><![CDATA[Gaurav Sharma]]></dc:creator>
  114. <category><![CDATA[QualSec seminars]]></category>
  115.  
  116. <guid isPermaLink="false">https://qualsec.ulb.ac.be/?p=8877</guid>
  117. <description><![CDATA[Oct 22, 2019 – 13.00 – room P.2NO8.08 Speaker: Jérémie Roland (ULB) Title: &#8220;Quantum Weak Coin Flipping&#8221; Short abstract: &#8220;We investigate weak coin flipping, a fundamental cryptographic primitive where two distrustful parties need to remotely establish a shared random bit. A cheating player can try to bias the output bit towards a preferred value. For weak coin &#8230; </p><p><a class="more-link btn" href="https://qualsec.ulb.ac.be/2019/10/10/seminar-jeremie-roland-quantum-weak-coin-flipping-oct-22-2019/">Continue reading &#187;</a>]]></description>
  118. <content:encoded><![CDATA[<p>Oct 22, 2019 – 13.00 – room P.2NO8.08</p>
  119. <p>Speaker: <strong>Jérémie Roland</strong> (ULB)</p>
  120. <p>Title: &#8220;Quantum Weak Coin Flipping&#8221;<br />
  121. Short abstract: &#8220;We investigate weak coin flipping, a fundamental cryptographic primitive where two distrustful parties need to remotely establish a shared random bit. A cheating player can try to bias the output bit towards a preferred value. For weak coin flipping the players have known opposite preferred values. A weak coin-flipping protocol has a bias ϵ if neither player can force the outcome towards their preferred value with probability more than 1/2+ϵ. It is known that any classical coin flipping protocol has bias ϵ=1/2, so that practically coin flipping can only be achieved under<br />
  122. computational assumptions. As for quantum protocols, Mochon showed in 2007 [arXiv:0711.4114] that weak coin flipping can be achieved under information-theoretic security with arbitrarily small bias (near<br />
  123. perfectly), but the previously best-known explicit protocol had bias 1/6 (also due to Mochon, 2005 [Phys. Rev. A 72, 022341]). We propose a framework to construct new explicit protocols achieving biases beyond 1/6. In particular, we construct explicit unitaries (quantum operations) for protocols with bias up to 1/10. To go beyond, we introduce an algorithm which, together with the framework, allows us to numerically construct protocols with arbitrarily small biases. This therefore provides a solution<br />
  124. for the problem of quantum weak coin flipping in the absence of noise.&#8221;</p>
  125. ]]></content:encoded>
  126. </item>
  127. <item>
  128. <title>Seminar: Bojan Spasic &#8220;Efficient Symmetric Searchable Encryption for IoT&#8221; (Oct 08, 2019)</title>
  129. <link>https://qualsec.ulb.ac.be/2019/10/04/seminar-bojan-spasic-efficient-symmetric-searchable-encryption-for-iot-oct-08-2019/</link>
  130. <pubDate>Fri, 04 Oct 2019 08:27:19 +0000</pubDate>
  131. <dc:creator><![CDATA[Gaurav Sharma]]></dc:creator>
  132. <category><![CDATA[QualSec seminars]]></category>
  133.  
  134. <guid isPermaLink="false">https://qualsec.ulb.ac.be/?p=8874</guid>
  135. <description><![CDATA[Oct 08, 2019 – 12.30 – room P.2NO8.08 Speaker: Bojan Spasic (ULB) Title: &#8220;Efficient Symmetric Searchable Encryption for IoT&#8221; Short abstract: &#8220;Searchable Symmetric Encryption (SSE) has received a lot of research attention recently. To date, SSE schemes seem to provide the best tradeoff between efficiency and security among different encrypted search solutions (e.g. property-preserving encryption, fully-homomorphic encryption, &#8230; </p><p><a class="more-link btn" href="https://qualsec.ulb.ac.be/2019/10/04/seminar-bojan-spasic-efficient-symmetric-searchable-encryption-for-iot-oct-08-2019/">Continue reading &#187;</a>]]></description>
  136. <content:encoded><![CDATA[<p>Oct 08, 2019 – 12.30 – room P.2NO8.08</p>
  137. <p>Speaker: <strong>Bojan Spasic</strong> (ULB)</p>
  138. <p>Title: &#8220;Efficient Symmetric Searchable Encryption for IoT&#8221;<br />
  139. Short abstract: &#8220;Searchable Symmetric Encryption (SSE) has received a lot of research attention recently. To date, SSE schemes seem to provide the best tradeoff between efficiency and security among different encrypted search solutions (e.g. property-preserving encryption, fully-homomorphic encryption, ORAM, functional encryption). Informally, SSE schemes encrypt a search structure which is outsourced to an untrusted server (e.g. in the cloud) together with the corresponding encrypted data collection.<br />
  140. We propose a dynamic, forward-private searchable symmetric encryption scheme supporting multiple stateless writing clients. Our construction is motivated by the common architecture found in IoT systems consisting of multiple low-power sensor nodes, an outsourced database system and an application client.&#8221;</p>
  141. ]]></content:encoded>
  142. </item>
  143. <item>
  144. <title>Seminar: Yann Barsamian &#8220;Algorithms + Data Structures = Efficient Particle Simulations&#8221; (Sep 24, 2019)</title>
  145. <link>https://qualsec.ulb.ac.be/2019/09/13/seminar-yann-barsamian-algorithms-data-structures-efficient-particle-simulations-sep-24-2019/</link>
  146. <pubDate>Fri, 13 Sep 2019 09:39:22 +0000</pubDate>
  147. <dc:creator><![CDATA[Gaurav Sharma]]></dc:creator>
  148. <category><![CDATA[QualSec seminars]]></category>
  149.  
  150. <guid isPermaLink="false">https://qualsec.ulb.ac.be/?p=8869</guid>
  151. <description><![CDATA[Sep 24, 2019 – 12.30 – room FORUM H Speaker: Yann Barsamian (ULB) Title: &#8220;Algorithms + Data Structures = Efficient Particle Simulations&#8221; Short abstract: &#8220;Particle simulations are widely used in different contexts where computer simulations are needed, e.g., plasma physics, astrophysics. In this talk, we will restrict to the case where we simulate N particles on a &#8230; </p><p><a class="more-link btn" href="https://qualsec.ulb.ac.be/2019/09/13/seminar-yann-barsamian-algorithms-data-structures-efficient-particle-simulations-sep-24-2019/">Continue reading &#187;</a>]]></description>
  152. <content:encoded><![CDATA[<p>Sep 24, 2019 – 12.30 – room FORUM H</p>
  153. <p>Speaker: <strong>Yann Barsamian</strong> (ULB)</p>
  154. <p>Title: &#8220;Algorithms + Data Structures = Efficient Particle Simulations&#8221;<br />
  155. Short abstract: &#8220;Particle simulations are widely used in different contexts where computer simulations are needed, e.g., plasma physics, astrophysics. In this talk, we will restrict to the case where we simulate N particles on a discretized 3d grid, with the Particle-in-Cell (PIC) method: at each step of the simulation, we have O(N) computations.</p>
  156. <p>Because of the required values for N and the grid size, we need to write efficient programs and use supercomputers &#8212; thousands of cores or more. In this talk, we will focus on super-computers where each node consists of multi-core processors. We will show how to reach 55% of the peak performance on these processors, measured in the roofline model. We will detail the data structure for the particles and the fields as well as the algorithm to update the particles. We will finally present a metric to compare the performance of different Particle-in-Cell implementations on different computer architectures.&#8221;</p>
  157. ]]></content:encoded>
  158. </item>
  159. <item>
  160. <title>Seminar: François-Xavier Standaert, &#8220;Towards Physically-Secure Implementations &#038; the Need of Theory, Practice and Open Designs&#8221; (Feb 28, 2019)</title>
  161. <link>https://qualsec.ulb.ac.be/2019/02/04/seminar-francois-xavier-standaert-towards-physically-secure-implementations-the-need-of-theory-practice-and-open-designs-feb-28-2019/</link>
  162. <pubDate>Mon, 04 Feb 2019 21:11:48 +0000</pubDate>
  163. <dc:creator><![CDATA[Olivier Markowitch]]></dc:creator>
  164. <category><![CDATA[QualSec seminars]]></category>
  165.  
  166. <guid isPermaLink="false">https://qualsec.ulb.ac.be/?p=8848</guid>
  167. <description><![CDATA[Feb 28, 2019 – 13.00 – room P.2NO5 Solvay Room Speaker: François-Xavier Standaert (UCL) Title: “Towards Physically-Secure Implementations &#38; the Need of Theory, Practice and Open Designs” Abstract: In this talk, I will survey recent approaches/results to obtain physical security against side-channel attacks exploiting leakages, such as an implementation&#8217;s power consumption. After a brief introduction and motivation, I&#8217;ll &#8230; </p><p><a class="more-link btn" href="https://qualsec.ulb.ac.be/2019/02/04/seminar-francois-xavier-standaert-towards-physically-secure-implementations-the-need-of-theory-practice-and-open-designs-feb-28-2019/">Continue reading &#187;</a>]]></description>
  168. <content:encoded><![CDATA[<p>Feb 28, 2019 – 13.00 – room P.2NO5 Solvay Room</p>
  169. <p>Speaker: <strong>François-Xavier Standaert</strong> (UCL)</p>
  170. <p>Title: “Towards Physically-Secure Implementations &amp; the Need of Theory, Practice and Open Designs”</p>
  171. <p>Abstract: In this talk, I will survey recent approaches/results to obtain physical security against side-channel attacks exploiting leakages, such as an implementation&#8217;s power consumption. After a brief introduction and motivation, I&#8217;ll describe how these attacks proceed (i.e., the so-called standard DPA setting) and why purely hardware-level (practical, heuristic) countermeasures alone cannot solve the problem. I will then discuss how the impact of hardware-level countermeasures can be amplified thanks an algorithmic-level countermeasure called masking, how this amplification can be formally analyzed, and the implementation challenges that physical defaults can imply for the secure implementation of masking. I will conclude by discussing the need of an open approach to physical security, and the interest of re-designing cryptographic algorithms and protocols for this purpose.</p>
  172. ]]></content:encoded>
  173. </item>
  174. </channel>
  175. </rss>
  176.  

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//feeds.feedburner.com/QualityAndSecurityOfInformationSystems

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda