• home
  • contact
  • intranet
  • search
Home
  •   jobs
  •   innovations
  •   research
  •   news
  •   events
  •   about CWI
  •   publications
Research
  •   research themes
    • Energy
    • Life Sciences
    • Information
    • Logistics
    • Software
  •   research groups
    • Algorithms and Complexity
    • Computational Dynamics
    • Cryptology
    • Database Architectures
    • Distributed and Interactive Systems
    • Formal Methods
    • Information Access
    • Intelligent Systems
    • Life Sciences
    • Multiscale Dynamics
    • Networks and Optimization
    • Scientific Computing
    • Software Analysis and Transformation
    • Stochastics
  •   research staff
  •   In brief
Prof.dr. R.J.F. CramerM.sc. N.J. BoumanDr.ir. M.M.J. StevensDr.ir. H.J.J. te RieleDr. I. CascudoDr. S. FehrD. MirandolaDr. R. de Haan
(click a picture to view the person's profile page)

Cryptology

Tue, 23/11/2010 - 09:36
photo of the group Cryptology
Description: 

Links

  • RISC Seminar
  • Teaching
  • Past Vistors, Former Group Members & PhD Alumni
  • Vacancies
  • Description of our research

Group members

NameFunction
Ronald Cramer Group Leader
Serge Fehr Academic Staff
Arjen Lenstra Academic Staff
Herman te Riele Academic Staff
Susanne van Dam Secretary
Wieb Bosma Long-term Visitor
Ignacio Cascudo Post-Doc
Robbert de Haan Post-Doc
Marc Stevens Post-Doc
Erwin Torreao Dassen Post-Doc
Niek Bouman PhD student

Past Visitors

Ivan Damgård (July-Nov., 2008)
Carlos Gonzalez Guillen (Sept.-Dec., 2009)
Oriol Farras (Sept.-Nov. 30, 2008, and Oct., 2009)
Sebastian Faust (Jan.-Mar.,2009, and Nov., 2009)
Tibor Jager (Jul.-Sept.,2009)
Abhishek Jain (July-Sep. 2010)
Mikkel Krøigård (April-Aug. 2008)
Ignacio Luengo (Sept.-Dec., 2008)
Victor Shoup (Jan., 2009)
Lei Zhang

Former Members and Long-Term Visitors

Saurabh Agarwal (Sept.-Dec., 2004)
Joost Batenburg (2002-2006)
David Cash (May-Aug., 2007)
Willemien Ekkelkamp (May, 2004-Sept., 2008)
David Freeman (2009)
Robbert de Haan (Nov., 2004-Dec., 2008)
Javier Herranz (Jan.-Oct., 2006)
Dennis Hofheinz (2004-2009)
Eike Kiltz (2004-2010)
Carles Padró (Sept., 2005-Jan., 2006 and Sep. 2009-Mar. 2010)
Berry Schoenmakers (Sept., 2004-Aug., 2005)
Edlyn Teske (2006-2008)
Rune Thorbek (Jan.-May 2007)
Andrey Timofeev(2008-2010)
Tomas Toft (Oct., 2007-Dec., 2008)
Daniele Venturi (Nov., 2009-Oct., 2010)
Enav Weinreb (Oct., 2007-Oct., 2008)

Ph.D. Alumni

Joost Batenburg
Ignacio Cascudo (Oviedo)
Willemien Ekkelkamp
Robbert de Haan
Marc Stevens

Vacancies

See IACR Open Positions in Cryptology or contact Ronald Cramer.

Our Research

Cryptology studies the extent to which problems pertaining to security in the presence of malicious adversaries can be solved by means of data processing, and, where it applies, how this can be done efficiently.

For example, encryption schemes and digital signatures are used to construct private and authentic communication channels (``uni-lateral security,'' security against malicious outsiders). These are instrumental to secure Internet transactions and payments, mobile telephony and much more. Another example is secure computation, which in principle enables an arbitrary computation to be distributed among the processors in a network so that computations remain secret and are performed correctly, even if a certain quorum of the network is under full control by an adversary (``multi-lateral security,'' security among mutually distrusting parties or parties with conflicting interests). Besides being a versatile theoretical primitive, potential real-life applications are myriad and include secure cooperation in the absence of trust, auctions, privacy-protecting data-mining and-benchmarking. Notable examples that fit neither category include secure positioning and searching encrypted data.

The research in the Cryptology Group is driven partly by questions such as: How reliable are the cryptographic methods in use today, really? Can they be made more secure and/or more efficient? Which are possible (minimal) assumptions under which security can be provided? Post-quantum cryptography: what to do if and when life-size quantum computers come into existence, and, hence, today's standards for secure communication are rendered insecure? Can large-scale secure computations be made practical?

In search for answers to these questions, the research is organized around the following (partially overlapping) themes. First, communication security beyond the horizon: post-quantum security (crypto from geometry of numbers, information-theoretic methods), leakage-resilience and tamper-resistant cryptography. Second, theory: secure computation, composability, public key cryptography. Third, alternative models: quantum cryptography and -information theory, bounded storage model, noisy channels. Fourth, cryptanalysis and applications to information security: number-theoretic (number field sieve, elliptic curve discrete logarithms), hash-functions, security of public key infrastructures.

In addition, there is special focus on interplays with algebra, number theory, geometry, combinatorics, probability theory, complexity theory, formal methods, quantum physics and information theory, as advances in modern cryptology increasingly rely on deeper understanding of these interplays.

The PNA5 theme was established on June 1, 2004. The group conducts fundamental and application-oriented research in cryptology and information security with a broad basis in mathematics and computer science.

Publications: 

Publications in CWI repository

Centrum Wiskunde & Informatica | Science Park 123  | 1098 XG Amsterdam | info@cwi.nl

Disclaimer | Report suggestions or problems to webmaster@cwi.nl | | ipv6 ready

.