Leader of the group Cryptology: Ronald Cramer.

Our research group is concerned with digital security, an area of increasingly pressing concern for industry, government and society at large. We investigate how cryptologic methods can contribute to solving security issues, for example through encryption, digital signatures and secure computation. Furthermore, we seek to establish the reliability of current cryptologic methods, how they can be improved, and what better alternatives there might be.
Quantum safety, meaning security in a possible future age of quantum computing, is a particular focus of our research.


Cécile Pierrot wins Cercle K2 Cybersecurity Trophy 2017

Cécile Pierrot wins Cercle K2 Cybersecurity Trophy 2017

Cécile Pierrot from the Cryptology research group at CWI won the first Cybersecurity Trophy granted by Cercle K2. This French think tank awards prizes in 22 topics every two years. It aims at stimulating interdisciplinarity and promoting young researchers. The Cybersecurity Trophy 2017 rewarded Pierrot’s PhD thesis, which she defended at UPMC in Paris on 25 November 2016. The jury praised her for both theoretical and practical impacts of her results.

Cécile Pierrot wins Cercle K2 Cybersecurity Trophy 2017 - Read More…

Current events

PhD defence Max Fillinger (CR)

  • 2019-03-19T10:00:00+01:00
  • 2019-03-19T11:00:00+01:00
March 19 Tuesday

Start: 2019-03-19 10:00:00+01:00 End: 2019-03-19 11:00:00+01:00

Academy Building, Rapenburg 73, 2311 GJ Leiden

Everybody is welcome to attend the public defence of Max Fillinger (CWI  & Universiteit Leiden)

of his thesis 'Two-Prover Bit-Commitments: Classical, Quantum and Non-Signaling'.

Promotor: Prof.dr. S. Fehr (CWI & Universiteit Leiden)

- Prof.dr. A. W. van der Vaart (Universiteit Leiden)
- Prof.dr. B. de Smit (Universiteit Leiden)
- Dr. S. Jeffery (CWI)
- Prof.dr. A. Kent (University of Cambridge)
- Prof.dr. S. Wolf (Universita della Svizzera italiana, Lugano)


Associated Members



Current projects with external funding

  • Applications of Arithmetic Secret Sharing Schemes in Two-Party Cryptography
  • Cryptanalysis of Lattice-based Cryptography
  • Cryptanalysis of Widely-used Hash Function Standards and Beyond
  • Samenwerkingsovereenkomst met TNO vwb promotieonderzoek Thomas Attema
  • Secure scalable policy-enforced distributed data processing
  • Algebraic Methods for Stronger Crypto (ALGSTRONGCRYPTO)
  • PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS (PROMETHEUS)
  • Scalable Oblivious Data Analytics (SODA)

Related partners

  • ABN AMRO Bank
  • IBM
  • ING Bank
  • KLM
  • Orange SA
  • Philips
  • Royal Holloway & Bedford New College, University of London
  • Ruhr-Universität Bochum, Germany
  • Scytl Secure Electronic Voting SA
  • Thales
  • Université de Rennes
  • Weizmann Institute
  • Ecole Normale Superieure
  • Ecole Polytechnique Federale de Lausanne
  • TNO
  • Technische Universiteit Eindhoven
  • Universidad Politecnica Catalunya
  • Universiteit van Amsterdam
  • Vrije Universiteit Amsterdam