{"id":3660,"date":"2023-11-13T14:58:17","date_gmt":"2023-11-13T13:58:17","guid":{"rendered":"https:\/\/www.uni.lu\/research-en\/blog\/research-areas\/information-security-research\/"},"modified":"2026-03-04T09:29:02","modified_gmt":"2026-03-04T08:29:02","slug":"information-security","status":"publish","type":"research-areas","link":"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"\n<div class=\"wp-block-unilux-blocks-wrapper max-w-screen-3xl mx-auto section\">\n<section class=\"section no-padding-y wp-block-unilux-blocks-hero\">\n    <div class=\"hero hero--2 hero--overlay-top hero--overlay-bottom\">\n        \n<header class=\"wp-block-unilux-blocks-wrapper hero__header\">\n<div class=\"wp-block-unilux-blocks-wrapper hero__container\">\n<span class=\"hero__title__subject wp-block-unilux-blocks-plain-text\"><\/span>\n\n\n<h1 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"a-multifaceted-approach-to-cryptography\"\n    >\nA multifaceted approach to cryptography <\/h1>\n<\/div>\n<\/header>\n<figure class=\"wp-block-dev4-reusable-blocks-image hero__visual object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"UniLu ResearchArea DCS InformationSecurity-adi-goldstein-EUsVwEOsblE-unsplash\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf-300x200.jpg 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf-1024x684.jpg 1024w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf-768x513.jpg 768w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf-1536x1025.jpg 1536w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg 2000w\"\n                style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: cover; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 16\/9; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure>\n<div class=\"wp-block-unilux-blocks-wrapper hero__body\">\n<div class=\"wp-block-unilux-blocks-wrapper hero__container\">\n<p class=\"wp-block-unilux-blocks-plain-text\">We tackle cryptography-related research topics, from an algorithmic point of view.<\/p>\n\n\n<ul class=\"wp-block-unilux-blocks-custom-buttons btn-list\"><li class=\"wp-block-unilux-blocks-custom-button\"    aria-disabled=\"false\"\n    >\n    <a\n        role=\"link\"\n        aria-disabled=\"false\"\n                    href=\"#groups\"\n                target=\"_self\"\n        class=\"btn btn--primary\"\n            >Research groups<\/a>\n<\/li>\n\n\n<\/ul>\n<\/div>\n<\/div>\n    <\/div>\n<\/section><\/div>\n\n\n\n<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\">\n<h2 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"about\"\n    >\nAbout<\/h2>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The Information Security research area investigates methods and tools relevant to cryptography and information security.<\/p>\n\n\n\n<p><strong>We cover the following topics<\/strong><br>\u2022 Symmetric and public key cryptography<br>\u2022 Efficient software and hardware implementation of cryptograhy<br>\u2022 Side-channel analysis of smartcards and embedded devices<br>\u2022 Security protocols<br>\u2022 Network, mobile, and embedded systems security<br>\u2022 Privacy and anonymity<br>\u2022 Verifiable voting systems, E-democracy<br>\u2022 Cloud computing, reputation-based systems<br>\u2022 Cryptocurrencies, blockchain, and distributed ledger technologies<br>\u2022 Mathematics of security<br>\u2022 Socio-technical aspects of security and trust<br>\u2022 Quantum information assurance<br>\u2022 Formal methods for security and privacy<br>\u2022 Security and privacy in machine learning<br>\u2022 AI security<br><br>This research area is managed to a large extent by the <strong>Laboratory of Algorithmics, Cryptology and Security (LACS).<\/strong><br><br>The following professors and their teams contribute to this research area through work in the domains listed.<\/p>\n\n\n\n<div class=\"wp-block-unilux-blocks-accordion accordion accordion--theme accordion-standard\" data-reference=\"c7aaf932-2a74-431d-9133-4191fe4b8bd7\" data-accordion-type=\"standard\"><div class=\"accordion__item  wp-block-unilux-blocks-accordion-item\">\n    <h3 class=\"accordion__header\"\n        >\n        <button\n            type=\"button\"\n            id=\"accordion-labelledby-45f14391-32ca-4ee2-a32e-0f2e10b24558\"\n            class=\"accordion__button collapsed\"\n            aria-expanded=\"false\"\n            aria-controls=\"accordion-panel-45f14391-32ca-4ee2-a32e-0f2e10b24558\"\n            data-bs-toggle=\"collapse\"\n            data-bs-target=\"#accordion-panel-45f14391-32ca-4ee2-a32e-0f2e10b24558\"\n        >\n            <span class=\"accordion__title\">\n                                List of professors and their domains            <\/span>\n\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-down \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\"><\/use><\/svg>        <\/button>\n    <\/h3>\n    <div id=\"accordion-panel-45f14391-32ca-4ee2-a32e-0f2e10b24558\"\n        class=\"accordion__collapse collapse\"\n        aria-labelledby=\"accordion-labelledby-45f14391-32ca-4ee2-a32e-0f2e10b24558\"\n        data-bs-parent=\"[data-reference=&quot;c7aaf932-2a74-431d-9133-4191fe4b8bd7&quot;]\"\n    >\n        <div class=\"accordion__body \">\n            \n<ul class=\"wp-block-unilux-blocks-highlighted-list list-highlighted list-highlighted--architectural\"><li class=\"list-highlighted__item  wp-block-unilux-blocks-highlighted-list-item\">\n    <header class=\"list-highlighted__header wp-block-unilux-blocks-highlighted-list-item-header\">\n    \n<h4 class=\"title text-18 font-bold has-text-align-left wp-block-unilux-blocks-heading\"        id=\"alexei-biryukov\"\n    >\nAlexei Biryukov<\/h4>\n<div class=\"wp-block-unilux-blocks-bigtext\">\n    <span>\n        \n    <\/span>\n<\/div><\/header><div class=\"list-highlighted__body wp-block-unilux-blocks-highlighted-list-item-body\">\n    <div class=\"wp-block-unilux-blocks-highlighted-list-item-free-content-area\">\n    \n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\">Cryptanalysis<\/li>\n\n\n\n<li class=\"ulux-list-item\">Cryptography<\/li>\n\n\n\n<li class=\"ulux-list-item\">Hardware and Software Security<\/li>\n\n\n\n<li class=\"ulux-list-item\">Network, Mobile, and Embedded Systems Security<\/li>\n\n\n\n<li class=\"ulux-list-item\">Privacy and Anonymity<\/li>\n\n\n\n<li class=\"ulux-list-item\">Virtual and Crypto Currencies<\/li>\n<\/ul>\n<\/div><\/div><\/li>\n\n<li class=\"list-highlighted__item  wp-block-unilux-blocks-highlighted-list-item\">\n    <header class=\"list-highlighted__header wp-block-unilux-blocks-highlighted-list-item-header\">\n    \n<h4 class=\"title text-18 font-bold has-text-align-left wp-block-unilux-blocks-heading\"        id=\"jean-sebastien-coron\"\n    >\nJean-S\u00e9bastien Coron<\/h4>\n<div class=\"wp-block-unilux-blocks-bigtext\">\n    <span>\n        \n    <\/span>\n<\/div><\/header><div class=\"list-highlighted__body wp-block-unilux-blocks-highlighted-list-item-body\">\n    <div class=\"wp-block-unilux-blocks-highlighted-list-item-free-content-area\">\n    \n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\">Computational Number Theory<\/li>\n\n\n\n<li class=\"ulux-list-item\">Public Key Cryptography<\/li>\n\n\n\n<li class=\"ulux-list-item\">Side-Channel Attacks<\/li>\n<\/ul>\n<\/div><\/div><\/li>\n\n<li class=\"list-highlighted__item  wp-block-unilux-blocks-highlighted-list-item\">\n    <header class=\"list-highlighted__header wp-block-unilux-blocks-highlighted-list-item-header\">\n    \n<h4 class=\"title text-18 font-bold has-text-align-left wp-block-unilux-blocks-heading\"        id=\"yves-le-traon\"\n    >\nYves Le Traon<\/h4>\n<div class=\"wp-block-unilux-blocks-bigtext\">\n    <span>\n        \n    <\/span>\n<\/div><\/header><div class=\"list-highlighted__body wp-block-unilux-blocks-highlighted-list-item-body\">\n    <div class=\"wp-block-unilux-blocks-highlighted-list-item-free-content-area\">\n    \n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\">Automated implementation of security mechanisms<\/li>\n\n\n\n<li class=\"ulux-list-item\">Malware detection and prevention<\/li>\n\n\n\n<li class=\"ulux-list-item\">Model-Driven Security<\/li>\n\n\n\n<li class=\"ulux-list-item\">Big Data at Runtime<\/li>\n\n\n\n<li class=\"ulux-list-item\">Modelling at Runtime<\/li>\n\n\n\n<li class=\"ulux-list-item\">Software Testing<\/li>\n<\/ul>\n<\/div><\/div><\/li>\n\n<li class=\"list-highlighted__item  wp-block-unilux-blocks-highlighted-list-item\">\n    <header class=\"list-highlighted__header wp-block-unilux-blocks-highlighted-list-item-header\">\n    \n<h4 class=\"title text-18 font-bold has-text-align-left wp-block-unilux-blocks-heading\"        id=\"franck-leprevost\"\n    >\nFranck Lepr\u00e9vost<\/h4>\n<div class=\"wp-block-unilux-blocks-bigtext\">\n    <span>\n        \n    <\/span>\n<\/div><\/header><div class=\"list-highlighted__body wp-block-unilux-blocks-highlighted-list-item-body\">\n    <div class=\"wp-block-unilux-blocks-highlighted-list-item-free-content-area\">\n    \n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\">Computational Number Theory<\/li>\n\n\n\n<li class=\"ulux-list-item\">Security of Convolutional Neural Networks<\/li>\n\n\n\n<li class=\"ulux-list-item\">Evolutionary Algorithms<\/li>\n\n\n\n<li class=\"ulux-list-item\">Geopolitics of Security Issues<\/li>\n<\/ul>\n<\/div><\/div><\/li>\n\n<li class=\"list-highlighted__item  wp-block-unilux-blocks-highlighted-list-item\">\n    <header class=\"list-highlighted__header wp-block-unilux-blocks-highlighted-list-item-header\">\n    \n<h4 class=\"title text-18 font-bold has-text-align-left wp-block-unilux-blocks-heading\"        id=\"sjouke-mauw\"\n    >\nSjouke Mauw<\/h4>\n<div class=\"wp-block-unilux-blocks-bigtext\">\n    <span>\n        \n    <\/span>\n<\/div><\/header><div class=\"list-highlighted__body wp-block-unilux-blocks-highlighted-list-item-body\">\n    <div class=\"wp-block-unilux-blocks-highlighted-list-item-free-content-area\">\n    \n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\">Attack Trees<\/li>\n\n\n\n<li class=\"ulux-list-item\">Formal Methods<\/li>\n\n\n\n<li class=\"ulux-list-item\">Location-based Services<\/li>\n\n\n\n<li class=\"ulux-list-item\">Network Security<\/li>\n\n\n\n<li class=\"ulux-list-item\">Privacy<\/li>\n\n\n\n<li class=\"ulux-list-item\">RFIDs<\/li>\n\n\n\n<li class=\"ulux-list-item\">Security Assessment<\/li>\n\n\n\n<li class=\"ulux-list-item\">Security Protocols<\/li>\n<\/ul>\n<\/div><\/div><\/li>\n\n<li class=\"list-highlighted__item  wp-block-unilux-blocks-highlighted-list-item\">\n    <header class=\"list-highlighted__header wp-block-unilux-blocks-highlighted-list-item-header\">\n    \n<h4 class=\"title text-18 font-bold has-text-align-left wp-block-unilux-blocks-heading\"        id=\"volker-muller\"\n    >\nVolker M\u00fcller<\/h4>\n<div class=\"wp-block-unilux-blocks-bigtext\">\n    <span>\n        \n    <\/span>\n<\/div><\/header><div class=\"list-highlighted__body wp-block-unilux-blocks-highlighted-list-item-body\">\n    <div class=\"wp-block-unilux-blocks-highlighted-list-item-free-content-area\">\n    \n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\">Computational Number Theory<\/li>\n\n\n\n<li class=\"ulux-list-item\">Security Primitives in Business Applications<\/li>\n<\/ul>\n<\/div><\/div><\/li>\n\n<li class=\"list-highlighted__item  wp-block-unilux-blocks-highlighted-list-item\">\n    <header class=\"list-highlighted__header wp-block-unilux-blocks-highlighted-list-item-header\">\n    \n<h4 class=\"title text-18 font-bold has-text-align-left wp-block-unilux-blocks-heading\"        id=\"jun-pang\"\n    >\nJun Pang<\/h4>\n<div class=\"wp-block-unilux-blocks-bigtext\">\n    <span>\n        \n    <\/span>\n<\/div><\/header><div class=\"list-highlighted__body wp-block-unilux-blocks-highlighted-list-item-body\">\n    <div class=\"wp-block-unilux-blocks-highlighted-list-item-free-content-area\">\n    \n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\">Complex networks<\/li>\n\n\n\n<li class=\"ulux-list-item\">Formal models and methods for security<\/li>\n\n\n\n<li class=\"ulux-list-item\">Formal verification<\/li>\n\n\n\n<li class=\"ulux-list-item\">Graph machine learning<\/li>\n\n\n\n<li class=\"ulux-list-item\">Privacy and anonymity<\/li>\n\n\n\n<li class=\"ulux-list-item\">Security and privacy in machine learning<\/li>\n<\/ul>\n<\/div><\/div><\/li>\n\n<li class=\"list-highlighted__item  wp-block-unilux-blocks-highlighted-list-item\">\n    <header class=\"list-highlighted__header wp-block-unilux-blocks-highlighted-list-item-header\">\n    \n<h4 class=\"title text-18 font-bold has-text-align-left wp-block-unilux-blocks-heading\"        id=\"peter-y-a-ryan\"\n    >\n<strong>Peter Y A Ryan<\/strong><\/h4>\n<div class=\"wp-block-unilux-blocks-bigtext\">\n    <span>\n        \n    <\/span>\n<\/div><\/header><div class=\"list-highlighted__body wp-block-unilux-blocks-highlighted-list-item-body\">\n    <div class=\"wp-block-unilux-blocks-highlighted-list-item-free-content-area\">\n    \n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\">Analysis of Information Flow<\/li>\n\n\n\n<li class=\"ulux-list-item\">Cryptographic Protocols<\/li>\n\n\n\n<li class=\"ulux-list-item\">Cryptographic Voting Schemes<\/li>\n\n\n\n<li class=\"ulux-list-item\">Cryptography<\/li>\n\n\n\n<li class=\"ulux-list-item\">Information Assurance<\/li>\n\n\n\n<li class=\"ulux-list-item\">Modelling and Analysis of Secure Systems and Security Policies<\/li>\n\n\n\n<li class=\"ulux-list-item\">Quantum Cryptography<\/li>\n\n\n\n<li class=\"ulux-list-item\">Socio-technical Aspects of Security.<\/li>\n<\/ul>\n<\/div><\/div><\/li>\n\n<li class=\"list-highlighted__item  wp-block-unilux-blocks-highlighted-list-item\">\n    <header class=\"list-highlighted__header wp-block-unilux-blocks-highlighted-list-item-header\">\n    \n<h4 class=\"title text-18 font-bold has-text-align-left wp-block-unilux-blocks-heading\"        id=\"andy-rupp\"\n    >\n<strong>Andy Rupp<\/strong><\/h4>\n<div class=\"wp-block-unilux-blocks-bigtext\">\n    <span>\n        \n    <\/span>\n<\/div><\/header><div class=\"list-highlighted__body wp-block-unilux-blocks-highlighted-list-item-body\">\n    <div class=\"wp-block-unilux-blocks-highlighted-list-item-free-content-area\">\n    \n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\">Provable Security<\/li>\n\n\n\n<li class=\"ulux-list-item\">Privacy-Enhancing Technologies<\/li>\n\n\n\n<li class=\"ulux-list-item\">Foundations of Cryptography<\/li>\n\n\n\n<li class=\"ulux-list-item\">Cryptographic Protocols<\/li>\n\n\n\n<li class=\"ulux-list-item\">Security and Privacy of Electronic Payments<\/li>\n\n\n\n<li class=\"ulux-list-item\">Security and Privacy in the Mobility Domain&nbsp;<\/li>\n\n\n\n<li class=\"ulux-list-item\">Anonymous Communication<\/li>\n\n\n\n<li class=\"ulux-list-item\">Auditable and Accountable Surveillance Technologies<\/li>\n<\/ul>\n<\/div><\/div><\/li><\/ul>\n        <\/div>\n    <\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"py-0 wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\">\n<h3 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"groups\"\n    >\nResearch groups<\/h3>\n\n\n<ul class=\"flex flex-wrap mt-24 -mx-16  wp-block-unilux-blocks-free-content-card\">\n    <li class=\"w-full sm:w-1\/2 lg:w-1\/3 px-16  wp-block-unilux-blocks-free-content-card-item\">\n    <div class=\"ulux-card card-residence bg-theme\">\n        <div class=\"ulux-card__container card__container\">\n                        <div class=\"ulux-card__visual wp-block-unilux-blocks-free-content-card-item-visual\">\n    \n<div class=\"wp-block-unilux-blocks-image-video-wrapper\">\n    <figure class=\"wp-block-dev4-reusable-blocks-image  object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Crypto.png\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Crypto-300x133.png 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Crypto-1024x453.png 1024w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Crypto-768x340.png 768w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Crypto-1536x680.png 1536w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Crypto.png 2000w\"\n                style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: cover; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 4\/3; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure><\/div><\/div><div class=\"ulux-card__body wp-block-unilux-blocks-free-content-card-item-body\">\n    \n<div class=\"ulux-card__category wp-block-unilux-blocks-plain-text\"><\/div>\n<h3 class=\"ulux-card__title has-text-align-left wp-block-unilux-blocks-heading\"        id=\"applied-cryto-group-acg\"\n    >\n<strong><strong>Applied Cryto Group<\/strong><\/strong> (ACG)<\/h3>\n<div class=\"ulux-card__link-wrapper card__link wp-block-unilux-blocks-simple-cta\">\n    <a\n        href=\"https:\/\/www.uni.lu\/fstm-en\/research-groups\/applied-cryto-group\/\"\n        title=\"Learn more\"\n        class=\"link-text link-text--icon ulux-card__link link-text link-absolute\"\n        target=\"\"\n    >\n        <span class=\"link-text__body\">\n            <span class=\"link-text__name\">Learn more<\/span>\n        <\/span>\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>    <\/a>\n<\/div>\n<\/div>        <\/div>\n    <\/div>\n<\/li><li class=\"w-full sm:w-1\/2 lg:w-1\/3 px-16  wp-block-unilux-blocks-free-content-card-item\">\n    <div class=\"ulux-card card-residence bg-theme\">\n        <div class=\"ulux-card__container card__container\">\n                        <div class=\"ulux-card__visual wp-block-unilux-blocks-free-content-card-item-visual\">\n    \n<div class=\"wp-block-unilux-blocks-image-video-wrapper\">\n    <figure class=\"wp-block-dev4-reusable-blocks-image  object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/APSIA.png\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/APSIA-300x173.png 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/APSIA-768x443.png 768w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/APSIA.png 826w\"\n                style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: cover; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 4\/3; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure><\/div><\/div><div class=\"ulux-card__body wp-block-unilux-blocks-free-content-card-item-body\">\n    \n<div class=\"ulux-card__category wp-block-unilux-blocks-plain-text\"><\/div>\n<h3 class=\"ulux-card__title has-text-align-left wp-block-unilux-blocks-heading\"        id=\"applied-security-and-information-assurance-apsia\"\n    >\n<strong>Applied Security and Information Assurance (APSIA)<\/strong><\/h3>\n<div class=\"ulux-card__link-wrapper card__link wp-block-unilux-blocks-simple-cta\">\n    <a\n        href=\"https:\/\/www.uni.lu\/snt-en\/research-groups\/apsia\/\"\n        title=\"Learn more\"\n        class=\"link-text link-text--icon ulux-card__link link-text link-absolute\"\n        target=\"\"\n    >\n        <span class=\"link-text__body\">\n            <span class=\"link-text__name\">Learn more<\/span>\n        <\/span>\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>    <\/a>\n<\/div>\n<\/div>        <\/div>\n    <\/div>\n<\/li><li class=\"w-full sm:w-1\/2 lg:w-1\/3 px-16  wp-block-unilux-blocks-free-content-card-item\">\n    <div class=\"ulux-card card-residence bg-theme\">\n        <div class=\"ulux-card__container card__container\">\n                        <div class=\"ulux-card__visual wp-block-unilux-blocks-free-content-card-item-visual\">\n    \n<div class=\"wp-block-unilux-blocks-image-video-wrapper\">\n    <figure class=\"wp-block-dev4-reusable-blocks-image  object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"Statistics and Data Science\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/ResearchArea_DMATH_SDS_crypto-monnaie-numerique-graphique-boursJ69sck.jpg\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/ResearchArea_DMATH_SDS_crypto-monnaie-numerique-graphique-boursJ69sck-300x166.jpg 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/ResearchArea_DMATH_SDS_crypto-monnaie-numerique-graphique-boursJ69sck.jpg 560w\"\n                style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: cover; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 4\/3; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure><\/div><\/div><div class=\"ulux-card__body wp-block-unilux-blocks-free-content-card-item-body\">\n    \n<div class=\"ulux-card__category wp-block-unilux-blocks-plain-text\"><\/div>\n<h3 class=\"ulux-card__title has-text-align-left wp-block-unilux-blocks-heading\"        id=\"cryptographic-protocols-cpro\"\n    >\nCryptographic Protocols (CPRO)<\/h3>\n<\/div>        <\/div>\n    <\/div>\n<\/li><li class=\"w-full sm:w-1\/2 lg:w-1\/3 px-16  wp-block-unilux-blocks-free-content-card-item\">\n    <div class=\"ulux-card card-residence bg-theme\">\n        <div class=\"ulux-card__container card__container\">\n                        <div class=\"ulux-card__visual wp-block-unilux-blocks-free-content-card-item-visual\">\n    \n<div class=\"wp-block-unilux-blocks-image-video-wrapper\">\n    <figure class=\"wp-block-dev4-reusable-blocks-image  object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Cryptolux.png\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Cryptolux-300x173.png 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Cryptolux-768x443.png 768w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Cryptolux.png 826w\"\n                style=\"object-position: 49.00% 55.00%; font-family: &quot;object-fit: cover; object-position: 49.00% 55.00%;&quot;; aspect-ratio: 4\/3; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure><\/div><\/div><div class=\"ulux-card__body wp-block-unilux-blocks-free-content-card-item-body\">\n    \n<div class=\"ulux-card__category wp-block-unilux-blocks-plain-text\"><\/div>\n<h3 class=\"ulux-card__title has-text-align-left wp-block-unilux-blocks-heading\"        id=\"cryptology-research-group-cryptolux\"\n    >\n<strong><strong><strong>Cryptology research group (CRYPTOLUX)<\/strong><\/strong><\/strong><\/h3>\n<div class=\"ulux-card__link-wrapper card__link wp-block-unilux-blocks-simple-cta\">\n    <a\n        href=\"https:\/\/www.uni.lu\/snt-en\/research-groups\/Cryptolux\/\"\n        title=\"Learn more\"\n        class=\"link-text link-text--icon ulux-card__link link-text link-absolute\"\n        target=\"\"\n    >\n        <span class=\"link-text__body\">\n            <span class=\"link-text__name\">Learn more<\/span>\n        <\/span>\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>    <\/a>\n<\/div>\n<\/div>        <\/div>\n    <\/div>\n<\/li><li class=\"w-full sm:w-1\/2 lg:w-1\/3 px-16  wp-block-unilux-blocks-free-content-card-item\">\n    <div class=\"ulux-card card-residence bg-theme\">\n        <div class=\"ulux-card__container card__container\">\n                        <div class=\"ulux-card__visual wp-block-unilux-blocks-free-content-card-item-visual\">\n    \n<div class=\"wp-block-unilux-blocks-image-video-wrapper\">\n    <figure class=\"wp-block-dev4-reusable-blocks-image  object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Team-Leprevost.jpg\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Team-Leprevost-300x200.jpg 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Team-Leprevost-1024x683.jpg 1024w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Team-Leprevost-768x512.jpg 768w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Team-Leprevost-1536x1024.jpg 1536w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Team-Leprevost.jpg 1920w\"\n                style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: cover; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 4\/3; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure><\/div><\/div><div class=\"ulux-card__body wp-block-unilux-blocks-free-content-card-item-body\">\n    \n<div class=\"ulux-card__category wp-block-unilux-blocks-plain-text\"><\/div>\n<h3 class=\"ulux-card__title has-text-align-left wp-block-unilux-blocks-heading\"        id=\"mathematics-of-security\"\n    >\nMathematics of Security<\/h3>\n<div class=\"ulux-card__link-wrapper card__link wp-block-unilux-blocks-simple-cta\">\n    <a\n        href=\"https:\/\/www.uni.lu\/fstm-en\/research-groups\/mathematics-of-security\/\"\n        title=\"Learn more\"\n        class=\"link-text link-text--icon ulux-card__link link-text link-absolute\"\n        target=\"\"\n    >\n        <span class=\"link-text__body\">\n            <span class=\"link-text__name\">Learn more<\/span>\n        <\/span>\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>    <\/a>\n<\/div>\n<\/div>        <\/div>\n    <\/div>\n<\/li><li class=\"w-full sm:w-1\/2 lg:w-1\/3 px-16  wp-block-unilux-blocks-free-content-card-item\">\n    <div class=\"ulux-card card-residence bg-theme\">\n        <div class=\"ulux-card__container card__container\">\n                        <div class=\"ulux-card__visual wp-block-unilux-blocks-free-content-card-item-visual\">\n    \n<div class=\"wp-block-unilux-blocks-image-video-wrapper\">\n    <figure class=\"wp-block-dev4-reusable-blocks-image  object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf-300x200.jpg 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf-1024x684.jpg 1024w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf-768x513.jpg 768w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf-1536x1025.jpg 1536w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg 2000w\"\n                style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: cover; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 4\/3; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure><\/div><\/div><div class=\"ulux-card__body wp-block-unilux-blocks-free-content-card-item-body\">\n    \n<div class=\"ulux-card__category wp-block-unilux-blocks-plain-text\"><\/div>\n<h3 class=\"ulux-card__title has-text-align-left wp-block-unilux-blocks-heading\"        id=\"security-and-trust-of-software-systems-satoss\"\n    >\n<strong>Security and Trust of Software Systems (SaToSS)<\/strong><\/h3>\n<div class=\"ulux-card__link-wrapper card__link wp-block-unilux-blocks-simple-cta\">\n    <a\n        href=\"https:\/\/www.uni.lu\/fstm-en\/research-groups\/security-and-trust-of-software-systems\/\"\n        title=\"Learn more\"\n        class=\"link-text link-text--icon ulux-card__link link-text link-absolute\"\n        target=\"\"\n    >\n        <span class=\"link-text__body\">\n            <span class=\"link-text__name\">Learn more<\/span>\n        <\/span>\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>    <\/a>\n<\/div>\n<\/div>        <\/div>\n    <\/div>\n<\/li><\/ul><\/div><\/section>\n\n\n\n<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\">\n<h3 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"research-takes-place-at\"\n    >\nResearch takes place at:<\/h3>\n\n\n<ul class=\"wp-block-unilux-blocks-button-list\">\n    <li class=\"normal wp-block-unilux-blocks-button-list-item\">\n    <a\n            href=\"https:\/\/www.uni.lu\/fstm-en\/\"\n            class=\"quick-link wp-block-unilux-blocks-anchor\"        target=\"\"\n>\n    \n<span class=\"wp-block-unilux-blocks-wrapper quick-link__container\"><figure class=\"wp-block-dev4-reusable-blocks-image quick-link__img object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2026\/03\/01200346\/university-of-luxembourg-fstm-symbol-only.svg\"\n                    style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: cover; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 1\/1; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure>\n\n\n<span class=\"quick-link__name wp-block-unilux-blocks-plain-text\">Faculty of Science, Technology and Medicine (FSTM)<\/span>\n\n<svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg><\/span>\n<\/a>\n<\/li><li class=\"image-rounded wp-block-unilux-blocks-button-list-item\">\n    <a\n            href=\"https:\/\/dcs.uni.lu\/\"\n            class=\"quick-link wp-block-unilux-blocks-anchor\"        target=\"\"\n>\n    \n<span class=\"wp-block-unilux-blocks-wrapper quick-link__container\"><figure class=\"wp-block-dev4-reusable-blocks-image quick-link__img object-fit--cover\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Logo-Computer-Science-test.png\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Logo-Computer-Science-test-300x300.png 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Logo-Computer-Science-test-1024x1024.png 1024w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Logo-Computer-Science-test-150x150.png 150w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Logo-Computer-Science-test-768x768.png 768w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Logo-Computer-Science-test-1536x1536.png 1536w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/Logo-Computer-Science-test-2048x2048.png 2048w\"\n                style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: cover; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 1\/1; object-fit: cover; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure>\n\n\n<span class=\"quick-link__name wp-block-unilux-blocks-plain-text\">Department of Computer Science<\/span>\n\n<svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg><\/span>\n<\/a>\n<\/li><li class=\"wp-block-unilux-blocks-button-list-item\">\n    <a\n            href=\"https:\/\/www.uni.lu\/snt-en\/\"\n            class=\"quick-link wp-block-unilux-blocks-anchor\"        target=\"\"\n>\n    \n<span class=\"wp-block-unilux-blocks-wrapper quick-link__container\"><figure class=\"wp-block-dev4-reusable-blocks-image quick-link__img object-fit--scale-down\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2026\/03\/01200351\/university-of-luxembourg-snt-symbol-only.svg\"\n                    style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: scale-down; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 1\/1; object-fit: scale-down; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure>\n\n\n<span class=\"quick-link__name wp-block-unilux-blocks-plain-text\">Interdisciplinary Centre for Security, Reliability and Trust (SnT)<\/span>\n\n<svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg><\/span>\n<\/a>\n<\/li><\/ul>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\">\n<h3 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"related-research-areas\"\n    >\nRelated research areas<\/h3>\n\n\n\n<ul class=\"wp-block-unilux-blocks-quick-link-highlight quick-link-list\">\n<li class=\"wp-block-unilux-blocks-quick-link-highlight-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/research-en\/research-areas\/autonomous-vehicles-and-iot\/\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__body\">\n                    <span class=\"quick-link__number\">\n                        Autonomous vehicles and IoT                    <\/span>\n                    <span class=\"quick-link__title\">\n                                            <\/span>\n                    <span class=\"quick-link__action\">\n                                            <\/span>\n                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-unilux-blocks-quick-link-highlight-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/research-en\/research-areas\/communicative-systems\/\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__body\">\n                    <span class=\"quick-link__number\">\n                        Communicative Systems                    <\/span>\n                    <span class=\"quick-link__title\">\n                                            <\/span>\n                    <span class=\"quick-link__action\">\n                                            <\/span>\n                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-unilux-blocks-quick-link-highlight-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/research-en\/research-areas\/cybersecurity\/\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__body\">\n                    <span class=\"quick-link__number\">\n                        Cybersecurity                    <\/span>\n                    <span class=\"quick-link__title\">\n                                            <\/span>\n                    <span class=\"quick-link__action\">\n                                            <\/span>\n                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-unilux-blocks-quick-link-highlight-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/research-en\/research-areas\/intelligent-and-adaptive-systems\/\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__body\">\n                    <span class=\"quick-link__number\">\n                        Intelligent and Adaptive Systems                    <\/span>\n                    <span class=\"quick-link__title\">\n                                            <\/span>\n                    <span class=\"quick-link__action\">\n                                            <\/span>\n                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-unilux-blocks-quick-link-highlight-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/research-en\/research-areas\/software-and-systems\/\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__body\">\n                    <span class=\"quick-link__number\">\n                        Software and Systems                    <\/span>\n                    <span class=\"quick-link__title\">\n                                            <\/span>\n                    <span class=\"quick-link__action\">\n                                            <\/span>\n                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-unilux-blocks-quick-link-highlight-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/research-en\/research-areas\/space-systems\/\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__body\">\n                    <span class=\"quick-link__number\">\n                        Space Systems                    <\/span>\n                    <span class=\"quick-link__title\">\n                                            <\/span>\n                    <span class=\"quick-link__action\">\n                                            <\/span>\n                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n<\/ul>\n<\/div><\/section>\n\n\n<section class=\"section section wp-block-unilux-blocks-quick-link-discover-section\">\n    <div class=\"container xl:max-w-screen-xl\">\n        \n<h2 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"discover-more\"\n    >\nDiscover more<\/h2>\n\n<ul class=\"wp-block-unilux-blocks-quick-link-discover quick-link-list\">\n<li class=\"wp-block-unilux-blocks-quick-link-discover-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/en\/about\/profile\/mission-strategy-values\/#strategic-development-areas\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__text\">\n                    Key areas                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-unilux-blocks-quick-link-discover-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/en\/about\/organisation\/faculties-departments\/\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__text\">\n                    Faculties                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-unilux-blocks-quick-link-discover-item\">\n    <a\n                    href=\"https:\/\/www.uni.lu\/en\/about\/organisation\/centres\/\"\n                    class=\"quick-link\"\n            target=\"\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__text\">\n                    Interdisciplinary centres                <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n<\/ul>\n    <\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":3659,"parent":0,"menu_order":0,"template":"","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"Information Security","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false},"field-of-interest":[44,47,48,50,52,58],"organisation":[61,59],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security - Research area I University of Luxembourg<\/title>\n<meta name=\"description\" content=\"The Information Security research area investigates methods and tools relevant to cryptography and information security. We cover the following topics\u2022\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security\" \/>\n<meta property=\"og:description\" content=\"The Information Security research area investigates methods and tools relevant to cryptography and information security. We cover the following topics\u2022\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Research EN\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-04T08:29:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1335\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/\",\"url\":\"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/\",\"name\":\"Information Security - Research area I University of Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/research-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg\",\"datePublished\":\"2023-11-13T13:58:17+00:00\",\"dateModified\":\"2026-03-04T08:29:02+00:00\",\"description\":\"The Information Security research area investigates methods and tools relevant to cryptography and information security. We cover the following topics\u2022\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg\",\"width\":2000,\"height\":1335},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research\",\"item\":\"https:\/\/www.uni.lu\/research-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Research Areas\",\"item\":\"https:\/\/www.uni.lu\/research-en\/research-areas\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/research-en\/#website\",\"url\":\"https:\/\/www.uni.lu\/research-en\/\",\"name\":\"Uni.lu\",\"description\":\"Research at the University of Luxembourg\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/research-en\/#organization\"},\"alternateName\":\"University of Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/research-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/research-en\/#organization\",\"name\":\"University of Luxembourg\",\"alternateName\":\"Uni.lu\",\"url\":\"https:\/\/www.uni.lu\/research-en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/research-en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2026\/03\/03115550\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2026\/03\/03115550\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"University of Luxembourg\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/research-en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security - Research area I University of Luxembourg","description":"The Information Security research area investigates methods and tools relevant to cryptography and information security. We cover the following topics\u2022","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/","og_locale":"en_GB","og_type":"article","og_title":"Information Security","og_description":"The Information Security research area investigates methods and tools relevant to cryptography and information security. We cover the following topics\u2022","og_url":"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/","og_site_name":"Research EN","article_modified_time":"2026-03-04T08:29:02+00:00","og_image":[{"width":2000,"height":1335,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/","url":"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/","name":"Information Security - Research area I University of Luxembourg","isPartOf":{"@id":"https:\/\/www.uni.lu\/research-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg","datePublished":"2023-11-13T13:58:17+00:00","dateModified":"2026-03-04T08:29:02+00:00","description":"The Information Security research area investigates methods and tools relevant to cryptography and information security. We cover the following topics\u2022","breadcrumb":{"@id":"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2023\/11\/UniLu_ResearchArea_DCS_InformationSecurity-adi-goldstein-EUsVwE98W3Pf.jpg","width":2000,"height":1335},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/research-en\/research-areas\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/en"},{"@type":"ListItem","position":2,"name":"Research","item":"https:\/\/www.uni.lu\/research-en\/"},{"@type":"ListItem","position":3,"name":"Research Areas","item":"https:\/\/www.uni.lu\/research-en\/research-areas\/"},{"@type":"ListItem","position":4,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/research-en\/#website","url":"https:\/\/www.uni.lu\/research-en\/","name":"Uni.lu","description":"Research at the University of Luxembourg","publisher":{"@id":"https:\/\/www.uni.lu\/research-en\/#organization"},"alternateName":"University of Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/research-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/research-en\/#organization","name":"University of Luxembourg","alternateName":"Uni.lu","url":"https:\/\/www.uni.lu\/research-en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/research-en\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2026\/03\/03115550\/UNIV_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/8\/2026\/03\/03115550\/UNIV_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"University of Luxembourg"},"image":{"@id":"https:\/\/www.uni.lu\/research-en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/research-en\/wp-json\/wp\/v2\/research-areas\/3660"}],"collection":[{"href":"https:\/\/www.uni.lu\/research-en\/wp-json\/wp\/v2\/research-areas"}],"about":[{"href":"https:\/\/www.uni.lu\/research-en\/wp-json\/wp\/v2\/types\/research-areas"}],"author":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/research-en\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":5,"href":"https:\/\/www.uni.lu\/research-en\/wp-json\/wp\/v2\/research-areas\/3660\/revisions"}],"predecessor-version":[{"id":17017,"href":"https:\/\/www.uni.lu\/research-en\/wp-json\/wp\/v2\/research-areas\/3660\/revisions\/17017"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/research-en\/wp-json\/wp\/v2\/media\/3659"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/research-en\/wp-json\/wp\/v2\/media?parent=3660"}],"wp:term":[{"taxonomy":"field-of-interest","embeddable":true,"href":"https:\/\/www.uni.lu\/research-en\/wp-json\/wp\/v2\/field-of-interest?post=3660"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/research-en\/wp-json\/wp\/v2\/organisation?post=3660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}