About
The Information Security research area investigates methods and tools relevant to cryptography and information security.
We cover the following topics
• Symmetric and public key cryptography
• Efficient software and hardware implementation of cryptograhy
• Side-channel analysis of smartcards and embedded devices
• Security protocols
• Network, mobile, and embedded systems security
• Privacy and anonymity
• Verifiable voting systems, E-democracy
• Cloud computing, reputation-based systems
• Cryptocurrencies, blockchain, and distributed ledger technologies
• Mathematics of security
• Socio-technical aspects of security and trust
• Quantum information assurance
• Formal methods for security and privacy
• Security and privacy in machine learning
• AI security
This research area is managed to a large extent by the Laboratory of Algorithmics, Cryptology and Security (LACS).
The following professors and their teams contribute to this research area through work in the domains listed.
- 
    
Alexei Biryukov
- Cryptanalysis
 - Cryptography
 - Hardware and Software Security
 - Network, Mobile, and Embedded Systems Security
 - Privacy and Anonymity
 - Virtual and Crypto Currencies
 
 - 
    
Jean-Sébastien Coron
- Computational Number Theory
 - Public Key Cryptography
 - Side-Channel Attacks
 
 - 
    
Yves Le Traon
- Automated implementation of security mechanisms
 - Malware detection and prevention
 - Model-Driven Security
 - Big Data at Runtime
 - Modelling at Runtime
 - Software Testing
 
 - 
    
Franck Leprévost
- Computational Number Theory
 - Security of Convolutional Neural Networks
 - Evolutionary Algorithms
 - Geopolitics of Security Issues
 
 - 
    
Sjouke Mauw
- Attack Trees
 - Formal Methods
 - Location-based Services
 - Network Security
 - Privacy
 - RFIDs
 - Security Assessment
 - Security Protocols
 
 - 
    
Volker Müller
- Computational Number Theory
 - Security Primitives in Business Applications
 
 - 
    
Jun Pang
- Complex networks
 - Formal models and methods for security
 - Formal verification
 - Graph machine learning
 - Privacy and anonymity
 - Security and privacy in machine learning
 
 - 
    
Peter Y A Ryan
- Analysis of Information Flow
 - Cryptographic Protocols
 - Cryptographic Voting Schemes
 - Cryptography
 - Information Assurance
 - Modelling and Analysis of Secure Systems and Security Policies
 - Quantum Cryptography
 - Socio-technical Aspects of Security.
 
 - 
    
Andy Rupp
- Provable Security
 - Privacy-Enhancing Technologies
 - Foundations of Cryptography
 - Cryptographic Protocols
 - Security and Privacy of Electronic Payments
 - Security and Privacy in the Mobility Domain
 - Anonymous Communication
 - Auditable and Accountable Surveillance Technologies
 
 
Research groups
- 
    
    Applied Cryto Group (ACG)
 - 
    
    Applied Security and Information Assurance (APSIA)
 - 
    
    Cryptographic Protocols (CPRO)
 - 
    
    Cryptology research group (CRYPTOLUX)
 - 
    
    Mathematics of Security
 - 
    
    Security and Trust of Software Systems (SaToSS)