Description

Leader of the group Cryptology: Ronald Cramer.

Our research group is concerned with digital security, an area of increasingly pressing concern for industry, government and society at large. We investigate how cryptologic methods can contribute to solving security issues, for example through encryption, digital signatures and secure computation. Furthermore, we seek to establish the reliability of current cryptologic methods, how they can be improved, and what better alternatives there might be.
Quantum safety, meaning security in a possible future age of quantum computing, is a particular focus of our research.

Vacancies

Tenure-Track and Senior Researcher Positions in Secure Software Systems in Amsterdam

CWI is looking for candidates to initiate and develop new research directions in Secure Software Systems, addressing major challenges in software systems relating to security and privacy. We are looking for researchers with excellent track records in computer science, with a focus on privacy and security in software systems and their scientific foundations. The tenure-track candidates are expected to develop a research program that addresses current societal demands on secure software systems, whereas senior candidates are expected to develop and lead a new group in this area. The candidates are expected to utilise synergies with other CWI research groups, like the cryptology group of prof. Ronald Cramer.

News

Cécile Pierrot wins Cercle K2 Cybersecurity Trophy 2017

Cécile Pierrot wins Cercle K2 Cybersecurity Trophy 2017

Cécile Pierrot from the Cryptology research group at CWI won the first Cybersecurity Trophy granted by Cercle K2. This French think tank awards prizes in 22 topics every two years. It aims at stimulating interdisciplinarity and promoting young researchers. The Cybersecurity Trophy 2017 rewarded Pierrot’s PhD thesis, which she defended at UPMC in Paris on 25 November 2016. The jury praised her for both theoretical and practical impacts of her results.

Cécile Pierrot wins Cercle K2 Cybersecurity Trophy 2017 - Read More…

Members

Associated Members

Publications

Software

Current projects with external funding

  • Applications of Arithmetic Secret Sharing Schemes in Two-Party Cryptography
  • Cryptanalysis of Lattice-based Cryptography
  • Cryptanalysis of Widely-used Hash Function Standards and Beyond
  • Samenwerkingsovereenkomst met TNO vwb promotieonderzoek Thomas Attema
  • Secure scalable policy-enforced distributed data processing
  • Algebraic Methods for Stronger Crypto (ALGSTRONGCRYPTO)
  • PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS (PROMETHEUS)
  • Scalable Oblivious Data Analytics (SODA)

Related partners

  • IBM
  • Orange SA
  • Philips
  • Royal Holloway & Bedford New College, University of London
  • Ruhr-Universität Bochum, Germany
  • Scytl Secure Electronic Voting SA
  • Thales
  • Université de Rennes
  • Weizmann Institute
  • Ecole Normale Superieure
  • Ecole Polytechnique Federale de Lausanne
  • TNO
  • Technische Universiteit Eindhoven
  • Universidad Politecnica Catalunya