Welcome to the UCL Crypto Group

The UCL Crypto Group gathers some twenty researchers with backgrounds from microelectronics, telecommunications, computer science and mathematics.

This wide diversity of knowledge allowed the group to develop a strong expertise in cryptography but also in its applications to various security related issues, including physical attacks and countermeasures on hardware devices (smart-cards, FPGAs, ASICs), efficient implementation of cryptosystems, design and analysis of cryptosystems and protocols, elliptic curve and identity based cryptography, formal foundations of cryptography, zero-knowledge identification, privacy enhancing technologies, voting systems, spam analysis, etc.

Through strong commitment to academic research (more than 150 international publications since 2004) and its numerous collaborations with industrial partners, the UCL Crypto Group is intensively involved in the evolution of security technology, including the design of the next generation of smart-cards, sensor networks, privacy preserving systems, etc.

Forthcoming seminars

» Click here for more information...

Latest news

Latest publications

Geoffroy Couteau, Thomas Peters, and David Pointcheval. Encryption Switching Protocols, In M. Robshow & J. Katz, editor(s), Crypto'16, Lecture Notes in Computer Science, Spinger, August 2016, To appear BibTeX

Édouard Cuvelier, and Olivier Pereira. Verifiable Multi-Party Computation with Perfectly Private Audit Trail, June 2016, To appear BibTeX

Benoit Libert, Fabrice Mouhartem, Thomas Peters, and Moti Yung. Practical ``Signatures with Efficient Protocols'' from Simple Assumptions, In X.F. Wang & X. Huang, editor(s), ASIACCS 2016, ACM, May 2016 BibTeX

Benoit Libert, Thomas Peters, Marc Joye, and Moti Yung. Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications, In T. Iwata & J. H. Cheon, editor(s), Asiacrypt'15, Volume 9452 of Lecture Notes in Computer Science, Spinger, December 2015 BibTeX

Vincent Grosso, and François-Xavier Standaert. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?, In T. Iwata & J. H. Cheon, editor(s), Asiacrypt, Volume 9452 of Lecture Notes in Computer Science (LNCS), Springer, December 2015 PDF BibTeX