Research area Information Security Research

A multifaceted approach to cryptography

UniLu ResearchArea DCS InformationSecurity-adi-goldstein-EUsVwEOsblE-unsplash

We tackle cryptography-related research topics, from an algorithmic point of view.


The Information Security research area investigates methods and tools relevant to cryptography and information security.
We cover the following topics:
• Symmetric and public key cryptography
• Efficient software and hardware implementation of cryptograhy
• Side-channel analysis of smartcards and embedded devices
• Security protocols
• Network, mobile, and embedded systems security
• Privacy and anonymity
• Verifiable voting systems, E-democracy
• Cloud computing, reputation-based systems
• Cryptocurrencies, blockchain, and distributed ledger technologies
• Mathematics of security
• Socio-technical aspects of security and trust
• Quantum information assurance
• Formal methods for security and privacy
• Security and privacy in machine learning
• AI security.

This research area is managed to a large extent by the Laboratory of Algorithmics, Cryptology and Security (LACS).

The following professors and their teams contribute to this research area through work in the domains listed:
• Alexei BIRYUKOV:
o Cryptanalysis
o Cryptography
o Hardware and Software Security
o Network, Mobile, and Embedded Systems Security
o Privacy and Anonymity
o Virtual and Crypto Currencies
• Jean-Sébastien CORON:
o Computational Number Theory
o Public Key Cryptography
o Side-Channel Attacks
• Yves LE TRAON:
o Automated implementation of security mechanisms
o Malware detection and prevention
o Model-Driven Security
o Big Data at Runtime
o Modelling at Runtime
o Software Testing
o Computational Number Theory
o Security of Convolutional Neural Networks
o Evolutionary Algorithms
o Geopolitics of Security Issues
• Sjouke MAUW:
o Attack Trees
o Formal Methods
o Location-based Services
o Network Security
o Privacy
o Security Assessment
o Security Protocols
• Volker MÜLLER:
o Computational Number Theory
o Security Primitives in Business Applications
• Jun PANG
o Complex networks
o Formal models and methods for security
o Formal verification
o Graph machine learning
o Privacy and anonymity
o Security and privacy in machine learning
• Peter Y A RYAN:
o Analysis of Information Flow
o Cryptographic Protocols
o Cryptographic Voting Schemes
o Cryptography
o Information Assurance
o Modelling and Analysis of Secure Systems and Security Policies
o Quantum Cryptography
o Socio-technical Aspects of Security.

Research groups