Description
Leader of the group Cryptology: Ronald Cramer.
Vacancies
No vacancies currently.
News

Léo Ducas wins ERC Starting Grant for quantum-safe cryptography
Léo Ducas from CWI's Cryptology Group is awarded an ERC Starting Grant of 1.5 million euro for research on quantum-safe cryptography. Most of today’s cryptographic methods will not be secure against attacks based on possible future quantum computers.

Gearing up for QCrypt 2020
The latest top results in quantum cryptography will be shared during the upcoming tenth anniversary edition of the QCrypt conference. Welcoming hundreds of visitors from science and industry, QCrypt 2020 will take place as an online event, jointly organized by CWI and the University of Amsterdam.

Leo Ducas (CWI Cryptology Group) involved in NIST Post-Quantum Cryptography Standardization Finalists
In its process to develop the first cryptographic standard to protect sensitive electronic data against the threat of quantum computers, the US National Institute of Standards and Technology (NIST) announced the finalists. Léo Ducas from CWI's Cryptology group is involved in several finalists of this standardization process.

Interview with Dijkstra Fellow David Chaum
David Chaum (1955) was awarded the Dijkstra Fellowship for his groundbreaking work in privacy and cryptology and the development of digital currency, which laid the technological basis for blockchain and bitcoin. This interview appeared in CWI’s staff magazine in April 2020.
Members
Associated Members
Publications
-
Kopparty, S, Resch, N.A, Ron-Zewi, N, Saraf, S, & Silas, S. (2021). On list recovery of high-rate tensor codes. IEEE Transactions on Information Theory, 67(1), 296–316. doi:10.1109/TIT.2020.3023962
-
Cramer, R.J.F, Xing, C, & Yuan, C. (2020). On the complexity of arithmetic secret sharing. In TCC 2020: Theory of Cryptography (pp. 444–469). doi:10.1007/978-3-030-64381-2_16
-
Fehr, S, & Yuan, C. (2020). Robust secret sharing with almost optimal share size and security against rushing adversaries. In TCC 2020: Theory of Cryptography (pp. 470–498). doi:10.1007/978-3-030-64381-2_17
-
Jin, C, Burleson, W, van Dijk, M.E, & Rührmair, U. (2020). Erasable PUFs: Formal treatment and generic design. In ASHES 2020 - Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security (pp. 21–33). doi:10.1145/3411504.3421215
-
Wesolowski, B.P.C. (2020). Efficient Verifiable Delay Functions. Journal of Cryptology, 33(4), 2113–2147. doi:10.1007/s00145-020-09364-x
-
Attema, T, & Cramer, R.J.F. (2020). Compressed σ-protocol theory and practical application to plug & play secure algorithmics. In Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence. doi:10.1007/978-3-030-56877-1_18
-
Don, J.W, Fehr, S, & Majenz, C. (2020). The measure-and-reprogram technique 2.0: Multi-round Fiat-Shamir and more. In CRYPTO 2020: Advances in Cryptology (pp. 602–631). doi:10.1007/978-3-030-56877-1_21
-
Wisiol, N, Mühl, C, Pirnay, N, Nguyen, P.H, Margraf, M, Seifert, J.-P, … Rührmair, U. (2020). Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020(3). doi:10.13154/tches.v2020.i3.97-120
-
van Woerden, W.P.J. (2020). An upper bound on the number of perfect quadratic forms. Advances in Mathematics, 365. doi:10.1016/j.aim.2020.107031
-
Canetti, R, van Dijk, M.E, Maleki, H, Rührmair, U, & Schaumont, P. (2020). Using Universal Composition to Design and Analyze Secure Complex Hardware Systems. In Proceedings of 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE). doi:10.23919/DATE48585.2020.9116295
Software
NewHope: Fast implementation of a quantum-resistant key exchange
NewHope is the reference implementation of a quantum-resistant key exchange protocol.
Counter-Cryptanalysis: detecting forged digital MD5, SHA-1 signatures
The Counter-Cryptanalysis project provides a drop-in replacement for the existing cryptographic hash functions MD5 and SHA-1.
HashClash: A framework for studying the weaknesses of MD5 and SHA-1
HashClash is a software framework for cryptanalysis of the MD5 and SHA-1 cryptographic hash functions, and for Chosen-Prefix Collisions for MD5.
Current projects with external funding
-
Samenwerkingsovereenkomst met TNO vwb promotieonderzoek Thomas Attema ()
-
Secure scalable policy-enforced distributed data processing ()
-
Algebraic Methods for Stronger Crypto (ALGSTRONGCRYPTO)
-
A Reduction Theory for Codes and Lattices in Cryptography (ARTICULATE)
-
PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS (PROMETHEUS)
Related partners
-
ABN AMRO Bank
-
IBM
-
ING Bank
-
KLM
-
Orange SA
-
Royal Holloway & Bedford New College, University of London
-
Ruhr-Universität Bochum, Germany
-
Scytl Secure Electronic Voting SA
-
Thales
-
Université de Rennes
-
Weizmann Institute
-
Ecole Normale Superieure
-
TNO
-
Universidad Politecnica Catalunya
-
Universiteit van Amsterdam
-
Vrije Universiteit Amsterdam