trustworthy-digital-technology

2025 Scientific Report • March 25, 2026

Incremental software verification for cybersecurity

In cybersecurity, newly-introduced software vulnerabilities must be detected immediately. The generic incremental analysis techniques recently integrated into Frama-C can verify code quickly after local modifications.

Read more
2025 Scientific Report • March 25, 2026

Fast fully-homomorphic encryption

In fields like defense, industry, healthcare, and finance, data privacy is a major challenge. One promising avenue is using fullyhomomorphic encryption (FHE) to compute on encrypted data. However, to implement this approach, many hurdles must be overcome—ones that CEA-List has been working on for years.

Read more
2025 Scientific Report • March 25, 2026

Hardware accelerator tightly coupled to a RISC-V core for post-quantum cryptography

With the development of quantum computers—and their threat to modern cryptography—post-quantum cryptography is gradually making inroads into the industrial ecosystem. HQC (Hamming Quasi-Cyclic) is one of the post-quantum encryption algorithms recently standardized by NIST.

Read more
2025 Scientific Report • March 24, 2026

Exploitability by attackers and vulnerability prioritization

Fuzzing, symbolic execution and abstract interpretation, amongst other techniques, enable us to uncover bugs in our programmes at an unprecedented rate. But this raises the question: what should we do with all these bugs?

Read more