|Faculty or Centre||Faculté des Sciences, de la Technologie et de la Communication|
Campus Kirchberg, Université du Luxembourg
6, rue Richard Coudenhove-Kalergi
|Campus Office||F 212|
|Telephone||(+352) 46 66 44 5667|
|Fax||(+352) 46 66 44 5500|
Prof. Peter Ryan (SnT)
In February of 2009, Peter Ryan took up a position as full Professor of Applied Security at the University of Luxembourg. He has over 20 years of experience in cryptography, information assurance and formal verification. He pioneered the application of process algebras to modelling and analysis of secure systems, presenting the first process algebra (CSP) formulation of non-intereference at the Computer Security Foundations Workshop in 1989. In 1993, while at DRA, he initiated and led the "Modelling and Analysis of Security Protocols" research project that developed the CSP and model-checking approach to the analysis of security protocols. This project broke away from the trend of employing bespoke frameworks such as the epistemic BAN-logic and used mainstream formal methods notations and tools. Notable achievements of this project were the discovery by Gavin Lowe of the now famous flaw in the Needham-Schroeder Public Key protocol that had lain undiscovered for around 17 years.
He has published extensively on cryptography, cryptographic protocols, mathematical models of computer security and, most recently, high assurance voting systems. He is the creator of Prêt à Voter, Pretty Good Democracy (with Vanessa Teague) and OpenVote (with Feng Hoa) verifiable voting schemes. Also with Feng Hao he has been developing and analysing a novel Password Authenticated Key Establishment Protocol J-PAKE.
Prior to joining the University of Luxembourg he was a Professor of Computing Science at Newcastle University. He has worked at GCHQ, the Defence Research Agency, the Stanford Research Institute in Cambridge and the Software Engineering Institute, CMU Pittsburgh.
He holds a PhD in mathematical physics from the University of London.
Peter Ryan has been on program committees of numerous prestigious security conferences, notably: IEEE Security and Privacy, IEEE Computer Security Foundations Workshop, the European Symposium On Research In Computer Security (ESORICS), WITS (Workshop on Issues in Security). He was Chair of WITS’04 (Workshop on Issues in the Theory of Security) and Co-chair of ESORICS’04, co-chair of Frontiers of Electronic Elections FEE 2005, Chair WOTE 2007 (Workshop On Trustworthy Elections). From 1999 to 2007 he was the Chair of the ESORICS Steering Committee. He is a Fellow of the BCS and IMA.
He is also a Visiting Professor at the University of Surrey (UK).
Research topics:Information assurance, cryptography, cryptographic protocols, modelling and analysis of secure systems and security policies, analysis of information flow, cryptographic voting schemes, quantum cryptography and soico-technical aspects of security.
The book "Modelling and Analysis of Security Protocols" is now available online:
Last updated on: Wednesday, 14 October 2015
in 1st Workshop on Advances in Secure Electronic Voting (2016)
in Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (2015, November 25)
; ; ;
in ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 (2015)
; ; ; ; ;
in Communications in Computer and Information Science (2015), 554
in IACR Cryptology ePrint Archive (2015), 2015
; ; ;
in Jets (2014)
in Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014 (2014)
; ; ; ; ;
in SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 (2014)
in Security Protocols XXII - Lecture Notes in Computer Science (2014)
; ; ;
in Dagstuhl Reports (2014), 4(9), 106-123
; ; ; ; ;
in Journal of Election Technology and Systems (2013), 2(1),
in USENIX Journal of Election Technology and Systems (2013), 1(1), 62-81
; ; ;
in Computer And Information Security Handbook (2013)
Scientific Conference (2013, March 17)
; ; ; ; ; ; ; ; ;
in EVOTE 2012 (2012)
; ; ;
in Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) (2012)
; ; ;
Book published by IEEE (2011)
in 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE) (2011)
in Proc. 18th Security Protocols Workshop (2010)
; ; ; ; ; ;
in Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (2010)