14 search results for “cryptography” in the Public website
-
Lattice Cryptography, from Cryptanalysis to New Foundations
.
-
aspects of class group actions and applications to post-quantum cryptography
Most of current public-key cryptography is considered insecure against attacks from sufficiently powerful quantum computers. Post-quantum cryptography studies methods to secure information resistant against such attacks. One proposal is isogeny-based cryptography, which bases its security on computational…
-
Unconditionally secure cryptographic protocols from coding-theoretic primitives
This dissertation presents new cryptographic protocols, which can be divided into two families.
-
Secure Multiparty Computation and Secret Sharing
The first book ever on information-theoretically secure multiparty computation
- Visualizing Cryptographic Networks of Spies, Diplomats and Scientists, 1603-1701
-
Nele Mentens
Science
-
Knowledge extraction in the quantum random-oracle model
The aim of this thesis is to present novel techniques for proving cryptographic schemes secure against quantum adversaries. Most results are within the context of an idealized model called the ‘quantum random-oracle model’.
-
Ronald Cramer appointed ‘Fellow of IACR’
Prof. dr. Cramer (Leiden University / Centre for Mathematics & Computer Science) is appointed as ‘Fellow of IACR’. This was announced by the International Association for Cryptologic Research on 8 April 2013.
-
Prof. dr. Ronald Cramer appointed member of the Royal Dutch Academy of Sciences (KNAW)
Ronald Cramer, Professor at the Mathematical Institute of Leiden University and researcher and head of the research group Cryptology at ‘Centrum Wiskunde & Informatica (CWI), the national research center for mathematics and computers science in the Netherlands, is appointed as a member of the Royal…
-
Book publication Ronald Cramer: a world premiere
Ronald Cramer, in cooperation with Ivan Damgard and Jesper Nielsen (Aarhus University) have recently published the first book ever written on “quantum-secure multi-party computation”. The authors have spent six years to finish this comprising book.
-
Algebra, Geometry and Number Theory
The research of the Algebra, Geometry and Number Theory programme ranges from fundamental mathematical theory to algorithms and applications.
-
Nusa Zidaric
Science
-
Attacks on hash functions and applications
Promotores: R. Cramer, A.K. Lenstra, Co-Promotor: B.M.M. de Weger
-
Cryptanalysis research of prof. Ronald Cramer in WIRED
The American magazine WIRED recently published an article on ‘quantum-safe public key encryption’.