{"id":108152,"date":"2019-11-21T15:43:37","date_gmt":"2019-11-21T15:43:37","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2019\/11\/linternet-security-research-group-a-decerne-a-rachel-player-le-prix-radiant\/"},"modified":"2025-11-27T21:05:56","modified_gmt":"2025-11-27T21:05:56","slug":"linternet-security-research-group-a-decerne-a-rachel-player-le-prix-radiant","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/11\/linternet-security-research-group-a-decerne-a-rachel-player-le-prix-radiant\/","title":{"rendered":"L&rsquo;Internet Security Research Group a d\u00e9cern\u00e9 \u00e0 Rachel Player le prix Radiant"},"content":{"rendered":"\n<p>Le succ\u00e8s de l&rsquo;Internet Security est assur\u00e9 par de nombreux\nh\u00e9ros m\u00e9connus. Des gens qui mettent leur talent et leur passion au service de l&rsquo;am\u00e9lioration\nde l&rsquo;Internet, ce qui le rend s\u00fbr et digne de confiance. La s\u00e9curit\u00e9 est une caract\u00e9ristique de l&rsquo;Internet : elle\nn&rsquo;est pas le fruit d&rsquo;un mandat central, mais d&rsquo;un travail acharn\u00e9 et de la t\u00e9nacit\u00e9\nde personnes travaillant \u00e0 travers le monde.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/11\/rachel-player.jpg\" alt=\"\" class=\"wp-image-107778\" width=\"280\" height=\"280\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/11\/rachel-player.jpg 715w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/11\/rachel-player-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/11\/rachel-player-450x450.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/11\/rachel-player-250x250.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/11\/rachel-player-600x600.jpg 600w\" sizes=\"auto, (max-width: 280px) 100vw, 280px\" \/><\/figure><\/div>\n\n\n\n<p>Rachel Player, une chercheuse en cryptographie, est l&rsquo;une de ces h\u00e9ro\u00efnes m\u00e9connues. Elle vient de recevoir le prix Radiant d\u00e9cern\u00e9 par l&rsquo;Internet Security Research Group, l&rsquo;\u00e9quipe qui se cache derri\u00e8re Let&rsquo;s Encrypt, pour son travail en cryptographie post-quantique et en cryptage homomorphe. Le cryptage homomorphe permet de faire des calculs sur des donn\u00e9es crypt\u00e9es, afin que l&rsquo;information reste priv\u00e9e tout en pouvant \u00eatre utilis\u00e9e. Il s&rsquo;agit d&rsquo;un domaine tr\u00e8s pertinent pour tous les secteurs qui traitent des donn\u00e9es sensibles et personnelles, comme la m\u00e9decine et les finances. Player s&rsquo;int\u00e9resse \u00e9galement \u00e0 l&rsquo;abaissement des barri\u00e8res qui emp\u00eachent les jeunes, en particulier les jeunes femmes, de travailler professionnellement sur des sujets tels que la cryptographie.<\/p>\n\n\n\n<p>Pour en savoir plus, <a href=\"https:\/\/www.abetterinternet.org\/post\/radiant-award-rachel-player\/\">lisez l&rsquo;article de l&rsquo;Internet Security Research Group ainsi que le billet de blog de Rachel Player sur son travail et les raisons pour lesquelles elle d\u00e9sire rendre sa profession plus accessible<\/a><\/p>\n\n\n\n<p><em>Vous voulez en savoir plus sur Let&rsquo;s Encrypt ? <a href=\"https:\/\/jhalderm.com\/pub\/papers\/letsencrypt-ccs19.pdf\">Lisez l&rsquo;aper\u00e7u tr\u00e8s complet de l&rsquo;initiative<\/a> &#8211; de l&rsquo;inspiration \u00e0 la mise en \u0153uvre, l&rsquo;organisation et l&rsquo;ex\u00e9cution.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le succ\u00e8s de l&rsquo;Internet Security est assur\u00e9 par de nombreux h\u00e9ros m\u00e9connus. Des gens qui mettent leur talent et leur passion au service de l&rsquo;am\u00e9lioration de l&rsquo;Internet, ce qui le rend s\u00fbr et digne de confiance. La s\u00e9curit\u00e9 est une caract\u00e9ristique de l&rsquo;Internet : elle n&rsquo;est pas le fruit d&rsquo;un mandat central, mais d&rsquo;un travail [&hellip;]<\/p>\n","protected":false},"author":866,"featured_media":92018,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[185,4316,118,4909,4775,183],"tags":[],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4140],"class_list":["post-108152","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confiance","category-cryptage","category-qui-sommes-nous","category-renforcer-internet","category-securite-fr","category-technologie","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.png",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-150x150.png",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-450x193.png",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-768x330.png",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-1024x440.png",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.png",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.png",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-250x107.png",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-600x550.png",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.png",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.png",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.png",600,258,false]},"uagb_author_info":{"display_name":"Olaf Kolkman","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/kolkman\/"},"uagb_comment_info":0,"uagb_excerpt":"Le succ\u00e8s de l&rsquo;Internet Security est assur\u00e9 par de nombreux h\u00e9ros m\u00e9connus. Des gens qui mettent leur talent et leur passion au service de l&rsquo;am\u00e9lioration de l&rsquo;Internet, ce qui le rend s\u00fbr et digne de confiance. La s\u00e9curit\u00e9 est une caract\u00e9ristique de l&rsquo;Internet : elle n&rsquo;est pas le fruit d&rsquo;un mandat central, mais d&rsquo;un travail\u2026","authors":[{"term_id":4140,"user_id":866,"is_guest":0,"slug":"kolkman","display_name":"Olaf Kolkman","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/108152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/866"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=108152"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/108152\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/92018"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=108152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=108152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=108152"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=108152"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=108152"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=108152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}