Research area Information Security

A multifaceted approach to cryptography

UniLu ResearchArea DCS InformationSecurity-adi-goldstein-EUsVwEOsblE-unsplash

We tackle cryptography-related research topics, from an algorithmic point of view.

About

The Information Security research area investigates methods and tools relevant to cryptography and information security.

We cover the following topics
• Symmetric and public key cryptography
• Efficient software and hardware implementation of cryptograhy
• Side-channel analysis of smartcards and embedded devices
• Security protocols
• Network, mobile, and embedded systems security
• Privacy and anonymity
• Verifiable voting systems, E-democracy
• Cloud computing, reputation-based systems
• Cryptocurrencies, blockchain, and distributed ledger technologies
• Mathematics of security
• Socio-technical aspects of security and trust
• Quantum information assurance
• Formal methods for security and privacy
• Security and privacy in machine learning
• AI security

This research area is managed to a large extent by the Laboratory of Algorithmics, Cryptology and Security (LACS).

The following professors and their teams contribute to this research area through work in the domains listed.

  • Alexei Biryukov

    • Cryptanalysis
    • Cryptography
    • Hardware and Software Security
    • Network, Mobile, and Embedded Systems Security
    • Privacy and Anonymity
    • Virtual and Crypto Currencies
  • Jean-Sébastien Coron

    • Computational Number Theory
    • Public Key Cryptography
    • Side-Channel Attacks
  • Yves Le Traon

    • Automated implementation of security mechanisms
    • Malware detection and prevention
    • Model-Driven Security
    • Big Data at Runtime
    • Modelling at Runtime
    • Software Testing
  • Franck Leprévost

    • Computational Number Theory
    • Security of Convolutional Neural Networks
    • Evolutionary Algorithms
    • Geopolitics of Security Issues
  • Sjouke Mauw

    • Attack Trees
    • Formal Methods
    • Location-based Services
    • Network Security
    • Privacy
    • RFIDs
    • Security Assessment
    • Security Protocols
  • Volker Müller

    • Computational Number Theory
    • Security Primitives in Business Applications
  • Jun Pang

    • Complex networks
    • Formal models and methods for security
    • Formal verification
    • Graph machine learning
    • Privacy and anonymity
    • Security and privacy in machine learning
  • Peter Y A Ryan

    • Analysis of Information Flow
    • Cryptographic Protocols
    • Cryptographic Voting Schemes
    • Cryptography
    • Information Assurance
    • Modelling and Analysis of Secure Systems and Security Policies
    • Quantum Cryptography
    • Socio-technical Aspects of Security.
  • Andy Rupp

    • Provable Security
    • Privacy-Enhancing Technologies
    • Foundations of Cryptography
    • Cryptographic Protocols
    • Security and Privacy of Electronic Payments
    • Security and Privacy in the Mobility Domain 
    • Anonymous Communication
    • Auditable and Accountable Surveillance Technologies

Research groups