Internationally acclaimed groups for research in cryptography and related fields.
More information
More information
Sites 16
Research Interests: Security Protocols, Formal Methods, Reliability of Security Systems, Medical Information Security, Cryptographic Algorithms, Steganography and Information Hiding, Digital Watermarking, Hardware Security, Electronic Commerce
Interests: Security for Pervasive Computing Environments, Hash Functions, Pseudorandom Sequences, Computational Number Theory, Distributed Cryptographic Protocols, Key Distribution, Cryptographic Computations - Algorithms, Architectures and Fault Tolerance, Quantum Cryptography, Side-Channel Attacks, Copyright Protection
Kuleuven Univ, Belgium. Interests: Design, evaluation, and implementation of crypto algorithms and protocols, and on the development of security architectures for computer systems and telecom networks. Also theoretical work in crypto algorithms related to discrete mathematics.
MIT cryptographic research group founded by Ron Rivest. Projects, publications and theses.
Researching new cryptographic methods and applications. Working with standards bodies to develop security protocols. Providing internal security to Microsoft products.
Dartmouth College institute for security and technology studies. Research, faculty, and publication library.
Ruhr-University of Bochum, Germany : Cryptographic and security protocols, Security architectures, Digital Rights Management systems, Cryptographic embedded applications, Network security etc.
Lists group members, current research, recent publications, and speakers and other activities at the T.J. Watson Research Center.
Interests: Boolean functions, Stream ciphers, Block Ciphers, Hash functions, Database security, Digital Watermarking, Elliptic/HyperElliptic Curve Crypto, Visual Crypto, Digital Signature Schemes
Interests: Information-theoretic cryptography, Secure distributed computation, Public-key cryptography and digital signatures, Number-theoretic and algebraic cryptography, Zero-knowledge protocols, Complexity theory
Interests: Security techniques for wired and wireless networks, fixed and mobile distributed applications, practical quantum cryptography, Cryptography and Information Security, Computational Number Theory, Algebraic and Combinatorial Algorithms.
Interests: Security Analysis of AES, PKI, Quantum Cryptography, mobile privacy, ECC, Digital signatures, Authentication protocols
Information security and cryptography group. Research, publications, and contact information.
Interests: Security of cryptographic primitives and protocols, Identity Based Encryption Email system, Intrusion tolerance via threshold cryptography, Electronic wallets, RSA keys bits generation
Development and analysis of crypto protocols and algos, Interests: Security of systems and networks, e-commerce, computational complexity theory, Formal methods for computer security, digital signatures, incremental cryptography
Internet Security, Applications, Authentication, and Cryptography research group.
Interests: Security Analysis of AES, PKI, Quantum Cryptography, mobile privacy, ECC, Digital signatures, Authentication protocols
Researching new cryptographic methods and applications. Working with standards bodies to develop security protocols. Providing internal security to Microsoft products.
Lists group members, current research, recent publications, and speakers and other activities at the T.J. Watson Research Center.
Kuleuven Univ, Belgium. Interests: Design, evaluation, and implementation of crypto algorithms and protocols, and on the development of security architectures for computer systems and telecom networks. Also theoretical work in crypto algorithms related to discrete mathematics.
Development and analysis of crypto protocols and algos, Interests: Security of systems and networks, e-commerce, computational complexity theory, Formal methods for computer security, digital signatures, incremental cryptography
Information security and cryptography group. Research, publications, and contact information.
Ruhr-University of Bochum, Germany : Cryptographic and security protocols, Security architectures, Digital Rights Management systems, Cryptographic embedded applications, Network security etc.
MIT cryptographic research group founded by Ron Rivest. Projects, publications and theses.
Interests: Security for Pervasive Computing Environments, Hash Functions, Pseudorandom Sequences, Computational Number Theory, Distributed Cryptographic Protocols, Key Distribution, Cryptographic Computations - Algorithms, Architectures and Fault Tolerance, Quantum Cryptography, Side-Channel Attacks, Copyright Protection
Research Interests: Security Protocols, Formal Methods, Reliability of Security Systems, Medical Information Security, Cryptographic Algorithms, Steganography and Information Hiding, Digital Watermarking, Hardware Security, Electronic Commerce
Interests: Security techniques for wired and wireless networks, fixed and mobile distributed applications, practical quantum cryptography, Cryptography and Information Security, Computational Number Theory, Algebraic and Combinatorial Algorithms.
Interests: Boolean functions, Stream ciphers, Block Ciphers, Hash functions, Database security, Digital Watermarking, Elliptic/HyperElliptic Curve Crypto, Visual Crypto, Digital Signature Schemes
Interests: Security of cryptographic primitives and protocols, Identity Based Encryption Email system, Intrusion tolerance via threshold cryptography, Electronic wallets, RSA keys bits generation
Internet Security, Applications, Authentication, and Cryptography research group.
Dartmouth College institute for security and technology studies. Research, faculty, and publication library.
Interests: Information-theoretic cryptography, Secure distributed computation, Public-key cryptography and digital signatures, Number-theoretic and algebraic cryptography, Zero-knowledge protocols, Complexity theory
Last update:
August 20, 2022 at 20:16:05 UTC
Check out
Shopping: Crafts: Woodcraft
- Recently edited by lisagirl
- Recently edited by lisagirl