Information Security

The Information Security Research Area covers research on cryptography and information security. The following topics are covered:

  • Symmetric and public key cryptography
    • Design and analysis of crypto schemes
    • Authenticated encryption
    • Provable security, fully homomorphic encryption
  • Efficient software and hardware implementation of cryptograhy
  • Side-channel analysis of smartcards and embedded devices
  • Security protocols
  • Network, mobile and embedded systems security
    • Security and dependability of embedded components
    • Sensors and RFID security
    • Design and analysis of lightweight cryptography
    • Internet and web-security, mobile code security
  • Privacy and anonymity
    • Privacy enhancing technologies
    • Privacy on the Internet
    • Private information retrieval and privacy preserving data mining
    • Economics of privacy
    • Information flow and access control policies
    • Privacy of health and bio-bank data
  • Verifiable voting systems, E-democracy
  • Cloud computing, reputation based systems
  • Cirtual and crypto currencies
    • Anonymity of Bitcoin
    • Design of proof of work functions
    • Economics of mining

The research theme on information security is managed by Laboratory of Algorithmics, Cryptology and Security (LACS).

Professors

This area is researched by the following professors:
  • Biryukov, Alex, head of research group CRYPTOLUX:
    • Cryptanalysis
    • Cryptography
    • Hardware and Software Security
    • Network, Mobile and Embedded Systems Security
    • Privacy and Anonymity
    • Virtual and Crypto Currencies
  • Coron, Jean-Sébastien, head of research group CORON:
    • Computational Number-Theory
    • Public-Key Cryptography
    • Side-Channel Attacks
  • Esteves-Veríssimo, Paulo:
    • Data Privacy and Integrity in Highly Sensitive Sectors
    • Internet and Cloud Infrastructure Resilience
    • Resilience of Cyber-Physical System Infrastructures
    • Security and Dependability of Embedded Components
  • Le Traon, Yves, head of research group SERVAL:
    • Automated implementation of security mechanisms
    • Malware detection and prevention
    • Model-Driven Security
    • Big Data at Runtime
    • Modeling at Runtime
    • Software Testing
  • Mauw, Sjouke, head of research group SaToSS:
    • Attack Trees
    • Formal Methods
    • Location-based Services
    • Network Security
    • Privacy
    • RFIDs
    • Security Assessment
    • Security Protocols
  • Müller, Volker, head of research group MÜLLER:
    • Computational Number-Theory
    • Security Primitives in Business Applications
  • Ryan, Peter, head of research group APSIA:
    • Analysis of Information Flow
    • Cryptographic Protocols
    • Cryptographic Voting Schemes
    • Cryptography
    • Information Assurance
    • Modelling and Analysis of Secure Systems and Security Policies
    • Quantum Cryptography
    • Socio-technical Aspects of Security

Projects

These projects belong to this research area: