Speaker: Yan-Tarō Clochard

Yan-Tarō Clochard was appointed Chief Marketing Officer at Secure-IC. He is also VP of Sales North Asia and founder of Secure-IC Japan. He formerly was developing bilateral Technology cooperation (on ICT topics especially cyber, 5G, AI, etc.) at the French Embassy in Japan. He previously worked in the telecommunication industry on mobile networks for EMEA as well as Taiwan. He graduated in Electronics Engineering from ENSEA and Business from ESSEC Business School (France/Singapore).

 

Subject : 

1. Cyber-physical security from chip to cloud with PQC (Post-Quantum Cryptography)
使用 PQC(後量子密碼學)實現從芯片到雲端的網絡物理安全來改變全世界

2. Multi-certified security technologies and application in Automotive, lightweight and high performance systems
通過多項認證技術徹底改變您的汽車安全性

3.How to be protected from Side-Channel Attacks? FIPS 140-3 compliance and hardware trojan detection
FIPS 140-3:晶片安全威脅的終極解決方案來抵擋防不勝防的側信道攻擊!

 

Abstract:

1. Cyber-physical security from chip to cloud with PQC (Post-Quantum Cryptography)

使用 PQC(後量子密碼學)實現從芯片到雲端的網絡物理安全來改變全世界

To ensure a fully managed and secure end-to-end cybersecurity solution, it is necessary to have full control over the product lifecycle and its security.
Lifecycle management solutions cover the different stages of a product life: from IC design, security evaluation and certification, manufacturing to field deployment and then the decommissioning of devices that include those ICs. To ensure the security at all stages, Secure-IC offers a fully comprehensive solution that ensures product security is maintained, and that each stakeholder only has access to the relevant functions and services at each step of the product’s life.
Especially for connected devices lifecycle management, a complete chip to cloud solution that enables provisioning, device management, device monitoring and device identity management, and offers differentiated security services for chip manufacturers and users can bring high additional value to the products. This approach comes in combination with having a scalable integrated Secure Element on the Embedded Edge device side.
The challenge of lifecycle security management is also now impacted by the emergence of PQC (Post-Quantum Cryptography).
Secure-IC will address those questions and propose an approach from chip security hardware solution to Chip-to-Cloud complete security solution.

 

Target AudienceIC Design , IOT Solution.

 



Speaker: Ahmed BOUGRIANE


Ahmed BOUGRIANE is Presales Engineer Asia at Secure-IC.
Ahmed BOUGRIANE has an engineering degree in electrical and electronics embedded systems from the French school "CESI Toulouse."
During his engineering degree, he was working as Engineer on power applications in French Laboratory CEA
He joined Secure-IC in 2022 as Product Marketing in Rennes, he is now in Tokyo to cover the Asian region.



Abstract: 

2. Multi-certified security technologies and application in Automotive, lightweight and high performance systems
通過多項認證技術徹底改變您的汽車安全性

Ahmed BOUGRIANE is Presales Engineer Asia at Secure-IC.
Ahmed BOUGRIANE has an engineering degree in electrical and electronics embedded systems from the French school "CESI Toulouse."
During his engineering degree, he was working as Engineer on power applications in French Laboratory CEA
He joined Secure-IC in 2022 as Product Marketing in Rennes, he is now in Tokyo to cover the Asian region.

 

Target Audience: Companies interested in developing advanced post-quantum cryptography solutions; government agencies interested in this topic    




Speaker: Stephen HSIEH

Stephen Hsieh is Secure-IC sales head of Taiwan and Korea region.
Previously working experience mostly in the semiconductor industry, including Qualcomm, Atheros, AnnapurnaLabs.
He hold the Master of Business System (MBS) from Australia Monash University.


Abstract: 

3. How to be protected from Side-Channel Attacks? FIPS 140-3 compliance and hardware trojan detection
FIPS 140-3:晶片安全威脅的終極解決方案來抵擋防不勝防的側信道攻擊!

 

Side-Channel Attacks (SCA) are attacks that do not target the algorithms themselves, but rather their implementation. Standardized cryptographic algorithms such as AES, SM4, HMAC, SM2, etc. and also new Post-Quantum cryptographic algorithms such as Crystals-Kyber, Crystals-Dilithium, XMSS, etc. are mathematically secure but their implementation can feature some vulnerabilities which may allow an attacker to recover the sensitive assets that are manipulated by these algorithms. These vulnerabilities can be related with various kinds of side-channel information leakage, such as computation time, power consumption, electromagnetic emanation, etc.
Fault-Injection Attacks (FIA), on the other hand, aim at disturbing the behaviour of a system to bypass sensitive operations such as authentication procedures, or to generate faults in computed results which may also allow an attacker to recover the sensitive assets manipulated by cryptographic algorithms. Perturbations on the system can have different source, such as clock or power glitching, underfeeding, overclocking, temperature manipulations, electromagnetic pulse, laser pulse, etc.
Side-Channel Attacks and Fault-Injection Attacks form main often-overlooked security vulnerability for electronic systems. However, if you want to ensure a comprehensive security, SCA and FIA protection should be part of the mix.
Secure-IC has developed tools to detect potential vulnerabilities in the systems and to evaluate robustness of implemented countermeasures on physical chip (AnalyzrTM), on designs (VirtualyzrTM) or on Software (CatalyzrTM). During this speech Secure-IC’s team will go through the latest in SCA and FIA protections and will advise on how to best secure the implementation of security algorithms in the IP blocks.


Target Audience:IC 設計公司, 車用系統
   

 

 

 

Joomla templates by a4joomla