Description

Leader of the group Cryptology: Ronald Cramer.

Our research group is concerned with digital security, an area of increasingly pressing concern for industry, government and society at large. We investigate how cryptologic methods can contribute to solving security issues, for example through encryption, digital signatures and secure computation. Furthermore, we seek to establish the reliability of current cryptologic methods, how they can be improved, and what better alternatives there might be.
Quantum safety, meaning security in a possible future age of quantum computing, is a particular focus of our research.

News

Cécile Pierrot wins Cercle K2 Cybersecurity Trophy 2017

Cécile Pierrot wins Cercle K2 Cybersecurity Trophy 2017

Cécile Pierrot from the Cryptology research group at CWI won the first Cybersecurity Trophy granted by Cercle K2. This French think tank awards prizes in 22 topics every two years. It aims at stimulating interdisciplinarity and promoting young researchers. The Cybersecurity Trophy 2017 rewarded Pierrot’s PhD thesis, which she defended at UPMC in Paris on 25 November 2016. The jury praised her for both theoretical and practical impacts of her results.

Cécile Pierrot wins Cercle K2 Cybersecurity Trophy 2017 - Read More…

ERC Advanced Grant for CWI cryptographer Ronald Cramer

ERC Advanced Grant for CWI cryptographer Ronald Cramer

CWI cryptographer Ronald Cramer has been awarded an ERC Advanced Grant of 2.5 million euro for his proposal 'Algebraic Methods for Stronger Crypto'. He leads the Cryptology Research group at Centrum Wiskunde & Informatica (CWI) in Amsterdam and is a full professor at the Mathematical Institute of Leiden University. The European Research Council awards these most prestigious personal grants to outstanding, well-established scientists with novel ideas towards high-risk, groundbreaking research that impacts both science and society at large.

ERC Advanced Grant for CWI cryptographer Ronald Cramer - Read More…

Current events

CWI Lectures on privacy & security 2018

  • 2018-11-15T12:00:00+01:00
  • 2018-11-15T18:00:00+01:00
November 15 Thursday

Start: 2018-11-15 12:00:00+01:00 End: 2018-11-15 18:00:00+01:00

Turing zaal

Our privacy is a fundamental right. Unfortunately, it is severely threatened by ubiquitous surveillance by governments and Internet moguls alike. Even worse, intense analysis of all this personal data by smart algorithms promises to make us completely transparent and predictable, and hence even more vulnerable. Will we be able to salvage our privacy from the claws of the 'intelligent' machines?

In this years' CWI Lectures four renowned scientists and policy advisors will discuss the state of the art in protecting privacy as well as the policy challenges to be faced when implementing these.

The CWI Lectures 2018 will be held on Thursday 15 November and the symposium is aimed towards a general academic audience. The theme will be Privacy and Security and the program committee for this afternoon consists of Prof. Ronald Cramer (CWI, Leiden University) and Dr. Jaap-Henk Hoepman (Radboud University, University of Groningen, Tilburg University).

Registration:
The event will be held at the Amsterdam Science Park Congress Center and participation is free after registration.
 
***Please note that a possible cancellation of your participation needs to be done by email (kollerie@cwi.nl) on Wednesday 7 November at the latest. When you don’t cancel your participation and you do not show up at the event, we are unfortunately obliged to charge you 100 euro no-show fee (invoice will be sent to you).***

Confirmed speakers:

-- Prof. Marc Rotenberg

Marc Rotenberg is President of the Electronic Privacy Information Center (EPIC) in Washington, D.C. He teaches privacy and open government at Georgetown Law and frequently testifies before the US Congress on emerging privacy and civil liberties issues. He has served on several national and international advisory panels. In 2015, he urged the establishment of Algorithmic Transparency as fundamental right. And in 2018, EPIC launched a campaign to make the development of the US AI policy more inclusive of public concerns.

 

-- Dr. Jan Camenisch

Jan is the Head of Cryptography Research at Dfinity.org. Prior to that Jan was a Principle Researcher at IBM Research - Zurich. Jan is a leading scientist in the area of privacy and cryptography, has published over 130 widely cited papers, and has received a number of awards for his work, including the 2010 ACM SIGSAC outstanding innovation award and the 2013 IEEE computer society technical achievement award. Jan is also a co-inventor of Identity Mixer, a unique cryptographic protocol suite for privacy-preserving authentication and transfer of certified attributes. He is a Fellow of IEEE and IACR.

 

-- Prof. Adam Smith

Adam Smith is a professor of computer science at Boston University. He obtained his Ph.D. from MIT in 2004, and was a faculty member at Penn State from 2007 to 2017. His research interests lie in data privacy and cryptography, and their connections to machine learning, statistics, information theory, and quantum computing. He received a Presidential Early Career Award for Scientists and Engineers (PECASE) in 2009; a Theory of Cryptography Test of Time award in 2016; and the 2017 Gödel Prize.

 

-- Prof. Ed Felten

Edward W. Felten is the Robert E. Kahn Professor of Computer Science and Public Affairs at Princeton University, and the
founding Director of Princeton's Center for Information Technology Policy. In 2015-2017 he served in the
White House as Deputy U.S. Chief Technology Officer. In 2011-12 he served as the first Chief Technologist at the U.S. Federal Trade Commission. His research interests include computer security and privacy, and technology law and policy. He has published more than 150 papers in the research literature, and three books. He is a member of the National Academy of Engineering and the American Academy of Arts and Sciences, and is a Fellow of the ACM.


For titles and abstracts of all four presentations, please click here.

Concept program:
12.00-12.45 buffet lunch + registration
12.45-13.00 Welcome
13.00-13.45 Marc Rotenberg
13.45-14.30 Jan Camenisch
14.30-15.15 break
15.15-16.00 Adam Smith
16.00-16.45 Ed Felten
16.45-16.50 Closing
16.50-18.00 drinks


 

Members

Associated Members

Publications

Software

Current projects with external funding

  • Applications of Arithmetic Secret Sharing Schemes in Two-Party Cryptography
  • Cryptanalysis of Lattice-based Cryptography
  • Cryptanalysis of Widely-used Hash Function Standards and Beyond
  • Samenwerkingsovereenkomst met TNO vwb promotieonderzoek Thomas Attema
  • Secure scalable policy-enforced distributed data processing
  • Algebraic Methods for Stronger Crypto (ALGSTRONGCRYPTO)
  • PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS (PROMETHEUS)
  • Scalable Oblivious Data Analytics (SODA)

Related partners

  • IBM
  • Orange SA
  • Philips
  • Royal Holloway & Bedford New College, University of London
  • Ruhr-Universität Bochum, Germany
  • Scytl Secure Electronic Voting SA
  • Thales
  • Université de Rennes
  • Weizmann Institute
  • Ecole Normale Superieure
  • Ecole Polytechnique Federale de Lausanne
  • TNO
  • Technische Universiteit Eindhoven
  • Universidad Politecnica Catalunya