The UCL Crypto Group gathers some twenty researchers with backgrounds from microelectronics, telecommunications, computer science and mathematics.
This wide diversity of knowledge allowed the group to develop a strong expertise in cryptography but also in its applications to various security related issues, including physical attacks and countermeasures on hardware devices (smart-cards, FPGAs, ASICs), efficient implementation of cryptosystems, design and analysis of cryptosystems and protocols, elliptic curve and identity based cryptography, formal foundations of cryptography, zero-knowledge identification, privacy enhancing technologies, voting systems, spam analysis, etc.
Through strong commitment to academic research (more than 150 international publications since 2004) and its numerous collaborations with industrial partners, the UCL Crypto Group is intensively involved in the evolution of security technology, including the design of the next generation of smart-cards, sensor networks, privacy preserving systems, etc.
- Thomas Peters receives the IBM Innovation Award 2015 for his PhD thesis.
- Cryptographic Key Length Recommendation: http://www.keylength.com/
- The Safeonweb initiative by CERT.be
Dina Heidar Kamel, Guerric de Streel, Santos Merino Del Pozo, Kashif Nawaz, François-Xavier Standaert, Denis Flandre, and David Bol. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers, In C. Carlet and A. Hasan and V. Saraswat, editor(s), Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, Lecture Notes in Computer Science, Springer, December 2016, to appear BibTeX
François Durvaux, François-Xavier Standaert, and Santos Merino Del Pozo. Towards Easy Leakage Certification, In B. Gierlichs and A. Poschmann, editor(s), Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, California, USA, August 17-19, 2016, Proceedings, Volume 9813 of Lecture Notes in Computer Science, pages 40-60, Springer, August 2016, http://dx.doi.org/10.1007/978-3-662-53140-2_3 BibTeX
Geoffroy Couteau, Thomas Peters, and David Pointcheval. Encryption Switching Protocols, In M. Robshow & J. Katz, editor(s), Crypto'16, Lecture Notes in Computer Science, Spinger, August 2016, To appear BibTeX
Édouard Cuvelier, and Olivier Pereira. Verifiable Multi-Party Computation with Perfectly Private Audit Trail, In Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider, editor(s), 14th International Conference on Applied Cryptography and Network Security, Volume 9696 of Lecture Notes in Computer Science (LNCS), Springer, June 2016 PDF BibTeX
Benoit Libert, Fabrice Mouhartem, Thomas Peters, and Moti Yung. Practical ``Signatures with Efficient Protocols'' from Simple Assumptions, In X.F. Wang & X. Huang, editor(s), ASIACCS 2016, ACM, May 2016 BibTeX