Description

Leader of the group Cryptology: Ronald Cramer.

Our research group is concerned with digital security, an area of increasingly pressing concern for industry, government and society at large. We investigate how cryptologic methods can contribute to solving security issues, for example through encryption, digital signatures and secure computation. Furthermore, we seek to establish the reliability of current cryptologic methods, how they can be improved, and what better alternatives there might be.
Quantum safety, meaning security in a possible future age of quantum computing, is a particular focus of our research.

News

CWI and Google announce first collision for Industry Security Standard SHA-1

CWI and Google announce first collision for Industry Security Standard SHA-1

'Industry deprecation proved to be too slow' Today, Thursday 23 February 2017, researchers at the Dutch research institute CWI and Google jointly announce that they have broken the SHA-1 internet security standard in practice. This industry standard is used for digital signatures and file integrity verification, which secure credit card transactions, electronic documents, GIT open-source software repositories and software distribution.

CWI and Google announce first collision for Industry Security Standard SHA-1 - Read More…

Three articles from the Netherlands published in ERCIM News 106 on Cybersecurity

Three articles from the Netherlands published in ERCIM News 106 on Cybersecurity

In July 2016, ERCIM News 106 was published: ercim-news.ercim.eu/en106. This issue featured a special theme on Cybersecurity, in which three articles from the Netherlands were published and one from Belgium. Another article from the Netherlands, on the 100th birthday of former CWI (MC) director and informatics pioneer Aad van Wijngaarden, was published in the Research & Society section.

Three articles from the Netherlands published in ERCIM News 106 on Cybersecurity - Read More…

Members

Associated Members

Publications

Software

Current projects with external funding

  • Applications of Arithmetic Secret Sharing Schemes in Two-Party Cryptography
  • Cryptanalysis of Lattice-based Cryptography
  • Cryptanalysis of Widely-used Hash Function Standards and Beyond
  • Samenwerkingsovereenkomst met TNO vwb promotieonderzoek Thomas Attema
  • Secure scalable policy-enforced distributed data processing
  • Algebraic Methods for Stronger Crypto (ALGSTRONGCRYPTO)
  • PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS (PROMETHEUS)
  • Scalable Oblivious Data Analytics (SODA)

Related partners

  • IBM
  • Orange SA
  • Philips
  • Royal Holloway & Bedford New College, University of London
  • Ruhr-Universität Bochum, Germany
  • Scytl Secure Electronic Voting SA
  • Thales
  • Université de Rennes
  • Weizmann Institute
  • Ecole Normale Superieure
  • Ecole Polytechnique Federale de Lausanne
  • TNO
  • Technische Universiteit Eindhoven
  • Universidad Politecnica Catalunya