Description
Leader of the group Cryptology: Ronald Cramer.
Vacancies
No vacancies currently.
News

Marc Stevens’ project awarded funding in ‘Big Data: real time ICT for logistics’ programme
NWO has granted five applications within the ‘Big Data: real time ICT for logistics’ research programme. CWI’s Marc Stevens is the main applicant of one of the five granted research projects: 'Secure scalable policy-enforced distributed data processing'.

Cécile Pierrot wins Cercle K2 Cybersecurity Trophy 2017
Cécile Pierrot from the Cryptology research group at CWI won the first Cybersecurity Trophy granted by Cercle K2. This French think tank awards prizes in 22 topics every two years. It aims at stimulating interdisciplinarity and promoting young researchers. The Cybersecurity Trophy 2017 rewarded Pierrot’s PhD thesis, which she defended at UPMC in Paris on 25 November 2016. The jury praised her for both theoretical and practical impacts of her results.

ERC Advanced Grant for CWI cryptographer Ronald Cramer
CWI cryptographer Ronald Cramer has been awarded an ERC Advanced Grant of 2.5 million euro for his proposal 'Algebraic Methods for Stronger Crypto'. He leads the Cryptology Research group at Centrum Wiskunde & Informatica (CWI) in Amsterdam and is a full professor at the Mathematical Institute of Leiden University. The European Research Council awards these most prestigious personal grants to outstanding, well-established scientists with novel ideas towards high-risk, groundbreaking research that impacts both science and society at large.

CWI and Google announce first collision for Industry Security Standard SHA-1
'Industry deprecation proved to be too slow' Today, Thursday 23 February 2017, researchers at the Dutch research institute CWI and Google jointly announce that they have broken the SHA-1 internet security standard in practice. This industry standard is used for digital signatures and file integrity verification, which secure credit card transactions, electronic documents, GIT open-source software repositories and software distribution.
Members
Associated Members
Publications
-
Kopparty, S, Resch, N.A, Ron-Zewi, N, Saraf, S, & Silas, S. (2021). On list recovery of high-rate tensor codes. IEEE Transactions on Information Theory, 67(1), 296–316. doi:10.1109/TIT.2020.3023962
-
Cramer, R.J.F, Xing, C, & Yuan, C. (2020). On the complexity of arithmetic secret sharing. In TCC 2020: Theory of Cryptography (pp. 444–469). doi:10.1007/978-3-030-64381-2_16
-
Fehr, S, & Yuan, C. (2020). Robust secret sharing with almost optimal share size and security against rushing adversaries. In TCC 2020: Theory of Cryptography (pp. 470–498). doi:10.1007/978-3-030-64381-2_17
-
Jin, C, Burleson, W, van Dijk, M.E, & Rührmair, U. (2020). Erasable PUFs: Formal treatment and generic design. In ASHES 2020 - Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security (pp. 21–33). doi:10.1145/3411504.3421215
-
Wesolowski, B.P.C. (2020). Efficient Verifiable Delay Functions. Journal of Cryptology, 33(4), 2113–2147. doi:10.1007/s00145-020-09364-x
-
Attema, T, & Cramer, R.J.F. (2020). Compressed σ-protocol theory and practical application to plug & play secure algorithmics. In Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence. doi:10.1007/978-3-030-56877-1_18
-
Don, J.W, Fehr, S, & Majenz, C. (2020). The measure-and-reprogram technique 2.0: Multi-round Fiat-Shamir and more. In CRYPTO 2020: Advances in Cryptology (pp. 602–631). doi:10.1007/978-3-030-56877-1_21
-
Wisiol, N, Mühl, C, Pirnay, N, Nguyen, P.H, Margraf, M, Seifert, J.-P, … Rührmair, U. (2020). Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020(3). doi:10.13154/tches.v2020.i3.97-120
-
van Woerden, W.P.J. (2020). An upper bound on the number of perfect quadratic forms. Advances in Mathematics, 365. doi:10.1016/j.aim.2020.107031
-
Canetti, R, van Dijk, M.E, Maleki, H, Rührmair, U, & Schaumont, P. (2020). Using Universal Composition to Design and Analyze Secure Complex Hardware Systems. In Proceedings of 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE). doi:10.23919/DATE48585.2020.9116295
Software
NewHope: Fast implementation of a quantum-resistant key exchange
NewHope is the reference implementation of a quantum-resistant key exchange protocol.
Counter-Cryptanalysis: detecting forged digital MD5, SHA-1 signatures
The Counter-Cryptanalysis project provides a drop-in replacement for the existing cryptographic hash functions MD5 and SHA-1.
HashClash: A framework for studying the weaknesses of MD5 and SHA-1
HashClash is a software framework for cryptanalysis of the MD5 and SHA-1 cryptographic hash functions, and for Chosen-Prefix Collisions for MD5.
Current projects with external funding
-
Samenwerkingsovereenkomst met TNO vwb promotieonderzoek Thomas Attema ()
-
Secure scalable policy-enforced distributed data processing ()
-
Algebraic Methods for Stronger Crypto (ALGSTRONGCRYPTO)
-
A Reduction Theory for Codes and Lattices in Cryptography (ARTICULATE)
-
PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS (PROMETHEUS)
Related partners
-
ABN AMRO Bank
-
IBM
-
ING Bank
-
KLM
-
Orange SA
-
Royal Holloway & Bedford New College, University of London
-
Ruhr-Universität Bochum, Germany
-
Scytl Secure Electronic Voting SA
-
Thales
-
Université de Rennes
-
Weizmann Institute
-
Ecole Normale Superieure
-
TNO
-
Universidad Politecnica Catalunya
-
Universiteit van Amsterdam
-
Vrije Universiteit Amsterdam