Description
Vacancies
No vacancies currently.
News

Léo Ducas appointed professor of Mathematical Cryptology
Léo Ducas is appointed as a part-time professor Mathematical Cryptology at Leiden University. At CWI, he designed several cryptosystems, some of which might soon be adopted as new international standards.

Secure multiparty computation starts to deliver applications
On Monday 13 September, the 23rd edition of CWI in Business took place, this year in cooperation with TNO. Subject this year: Secure Multiparty Computation.

Start of ACCSS - new association of cybersecurity academics
Last month, members of the ACCSS association celebrated that ACCSS (ACademic Cyber Security Society) is now a formal association. Marten van Dijk, head of CWI’s Computer Security research group, is one of its Board Members.

TNO, CWI and TU Delft receive 1.8 million for research in quantum security of public key infrastructures
A consortium including TNO, CWI and TU Delft received a 1.8 million grant from NWO to conduct research in the quantum security of public key infrastructures (PKI), which form the basis for secure digital connections and the protection of digital information. Research proposal HAPKIDO was submitted in response to a call from the Dutch National Science Agenda (NWA).
Members
Associated Members
Publications
-
Frixons, P, Naya-Plasencia, M, & Schrottenloher, A.C. (2022). Quantum boomerang attacks and some applications. In Proceedings of the International Conference on Selected Areas in Cryptography (pp. 332–352). doi:10.1007/978-3-030-99277-4_16
-
Debris-Alazard, T, Ducas, L, & van Woerden, W.P.J. (2022). An algorithmic reduction theory for binary codes: LLL and more. IEEE Transactions on Information Theory. doi:10.1109/TIT.2022.3143620
-
Bhaumik, R, Bonnetain, X, Chailloux, A.G, Leurent, G, Naya-Plasencia, M, Schrottenloher, A.C, & Seurin, Y. (2021). QCB: Efficient quantum-secure authenticated encryption. In Advances in Cryptology - ASIACRYPT 2021 (pp. 668–698). doi:10.1007/978-3-030-92062-3_23
-
Bonnetain, X, Leurent, G, Naya-Plasencia, M, & Schrottenloher, A.C. (2021). Quantum linearization attacks. In Advances in Cryptology - ASIACRYPT 2021 (pp. 422–452). doi:10.1007/978-3-030-92062-3_15
-
Attema, T, Cramer, R.J.F, & Rambaud, M. (2021). Compressed Σ -Protocols for bilinear group arithmetic circuits and application to logarithmic transparent threshold signatures. In Advances in Cryptology - ASIACRYPT 2021 (pp. 526–556). doi:10.1007/978-3-030-92068-5_18
-
Abspoel, M.A, Cramer, R.J.F, Escudero, D, Damgård, I.B, & Xing, C. (2021). Improved single-round secure multiplication using regenerating codes. In Advances in Cryptology - ASIACRYPT 2021 (pp. 222–244). doi:10.1007/978-3-030-92075-3_8
-
Guruswami, V, Li, R, Mosheiff, J, Resch, N.A, Silas, S, & Wootters, M. (2021). Bounds for list-decoding and list-recovery of random linear codes. IEEE Transactions on Information Theory. doi:10.1109/TIT.2021.3127126
-
Hashimoto, K, Katsumata, S, Postlethwaite, E.W, Prest, T, & Westerbaan, B. (2021). A concrete treatment of efficient continuous group key agreement via multi-recipient PKEs. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 1441–1462). doi:10.1145/3460120.3484817
-
Flórez-Gutiérrez, A, Leurent, G, Naya-Plasencia, M, Perrin, L, Schrottenloher, A.C, & Sibleyras, F. (2021). Internal symmetries and linear properties: Full-permutation distinguishers and improved collisions on Gimli. Journal of Cryptology, 34(4). doi:10.1007/s00145-021-09413-z
-
Attema, T, Cramer, R.J.F, & Fehr, S. (2021). Compressing proofs of k-out-of-n partial knowledge. In Advances in Cryptology (pp. 65–89). doi:10.1007/978-3-030-84259-8_3
Software
NewHope: Fast implementation of a quantum-resistant key exchange
NewHope is the reference implementation of a quantum-resistant key exchange protocol.
Counter-Cryptanalysis: detecting forged digital MD5, SHA-1 signatures
The Counter-Cryptanalysis project provides a drop-in replacement for the existing cryptographic hash functions MD5 and SHA-1.
HashClash: A framework for studying the weaknesses of MD5 and SHA-1
HashClash is a software framework for cryptanalysis of the MD5 and SHA-1 cryptographic hash functions, and for Chosen-Prefix Collisions for MD5.
Current projects with external funding
-
Samenwerkingsovereenkomst met TNO vwb promotieonderzoek Thomas Attema ()
-
Secure scalable policy-enforced distributed data processing ()
-
Algebraic Methods for Stronger Crypto (ALGSTRONGCRYPTO)
-
Alliance for Privacy Preserving Detection of Financial Crime (APP-DFC) - in kind bijdrage CWI (APP-DFC)
-
A Reduction Theory for Codes and Lattices in Cryptography (ARTICULATE)
-
Hybrid Approach for quantum-safe Public Key Infrastructure Development for Organisations (HAPKIDO)
-
Ontwikkelen en uitwerken van een Manual en Dashboard naar Post Quantum Crypto (PQC) standaarden (None)
-
PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS (PROMETHEUS)
Related partners
-
ABN AMRO Bank
-
IBM
-
ING Bank
-
KLM
-
Orange SA
-
Royal Holloway & Bedford New College, University of London
-
Ruhr-Universität Bochum, Germany
-
Scytl Secure Electronic Voting SA
-
Thales
-
Université de Rennes
-
Weizmann Institute
-
Ecole Normale Superieure
-
TNO
-
TNO
-
Universidad Politecnica Catalunya
-
Universiteit van Amsterdam
-
Vrije Universiteit Amsterdam