The UCL Crypto Group gathers some twenty researchers with backgrounds from microelectronics, telecommunications, computer science and mathematics.
This wide diversity of knowledge allowed the group to develop a strong expertise in cryptography but also in its applications to various security related issues, including physical attacks and countermeasures on hardware devices (smart-cards, FPGAs, ASICs), efficient implementation of cryptosystems, design and analysis of cryptosystems and protocols, elliptic curve and identity based cryptography, formal foundations of cryptography, zero-knowledge identification, privacy enhancing technologies, voting systems, spam analysis, etc.
Through strong commitment to academic research (more than 150 international publications since 2004) and its numerous collaborations with industrial partners, the UCL Crypto Group is intensively involved in the evolution of security technology, including the design of the next generation of smart-cards, sensor networks, privacy preserving systems, etc.
- June 16, 11:00 - Internet Voting on Insecure Platforms by Yvo Desmedt
- Thomas Peters receives the IBM Innovation Award 2015 for his PhD thesis.
- Cryptographic Key Length Recommendation: http://www.keylength.com/
- The Safeonweb initiative by CERT.be
Geoffroy Couteau, Thomas Peters, and David Pointcheval. Encryption Switching Protocols, In M. Robshow & J. Katz, editor(s), Crypto'16, Lecture Notes in Computer Science, Spinger, August 2016, To appear BibTeX
Benoit Libert, Fabrice Mouhartem, Thomas Peters, and Moti Yung. Practical ``Signatures with Efficient Protocols'' from Simple Assumptions, In X.F. Wang & X. Huang, editor(s), ASIACCS 2016, ACM, May 2016 BibTeX
Benoit Libert, Thomas Peters, Marc Joye, and Moti Yung. Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications, In T. Iwata & J. H. Cheon, editor(s), Asiacrypt'15, Volume 9452 of Lecture Notes in Computer Science, Spinger, December 2015 BibTeX
Vincent Grosso, and François-Xavier Standaert. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?, In T. Iwata & J. H. Cheon, editor(s), Asiacrypt, Volume 9452 of Lecture Notes in Computer Science (LNCS), Springer, December 2015 PDF BibTeX