Cryptography and Information Security

Cryptography and information security

 

 

 

 

Cryptography and Information Security seek at building tools that enable to secure data and to communicate in a reliable, fair, and private way. Over thirty researchers are active in this field.

Principal Investigators :

Olivier Pereira, Etienne Rivière, Ramin Sadre, François-Xavier Standaert, Jean-Pierre Tignol, Luc Vandendorpe

Research Labs :

Crypto Group, Information Security Group, Image and Signal Processing Group (ISPGroup)

Research Areas :

The research expertise at UCL, strong of over 30 researchers, covers the various layers of cryptography and its application to information security, namely:

  • Design and analysis of strong security protocols: authentication, multiparty computation, voting, provable security, evaluations, ...;
  • Design and analysis of efficient and secure cryptographic primitives symmetric and asymmetric encryption, digital signatures, ... ;
  • Efficient implementations of cryptographic primitives under various environmental constraints, both in software and hardware smart card, RFID, FPGA, ASIC, sensor networks, ...;
  • Implementation-related attacks (fault injection, side-channel) and countermeasures (distance-bounding protocols, masking, ...);
  • Practical attacks against security applications: time-memory tradeoff, biometric passport, ...;
  • Security from the physical layer: information theoretic cryptography, cooperative communications, ...;
  • Algebra: number theory, algebraic geometry, quadratic forms, algebras over arbitrary fields, ...;
  • Privacy-related issues at all levels ;
  • Computer security: viruses, spam, distributed attacks, wireless networks, ...

Most recent publications

Below are listed the 10 most recent journal articles and conference papers produced in this research area. You also can access all publications by following this link : see all publications.


Journal Articles


1. Moradi, Amir; Richter, Bastian; Schneider, Tobias; Standaert, François-Xavier. Leakage detection with the X²-Test. In: IACR Transactions on Cryptographic Hardware and Embedded Systems,. doi:10.13154/tches.v2018.i1.209-237. http://hdl.handle.net/2078.1/199339

2. Durvaux, François; Standaert, François-Xavier; Merino Del Pozo, Santos. Towards Easy Leakage Certification. In: Journal of Cryptographic Engineering,. doi:10.1007/s13389-017-0150-0. http://hdl.handle.net/2078.1/187223

3. Journault, Anthony; Standaert, François-Xavier; Varici, Kerem. Improving the security and efficiency of block ciphers based on LS-designs. In: Designs, Codes and Cryptography,. doi:10.1007/s10623-016-0193-8. http://hdl.handle.net/2078.1/181827

4. Zhang, Fan; Guo, Shize; Zhao, Xinjie; Wang, Tao; Yang, Jian; Standaert, François-Xavier. A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers. In: IEEE Transactions on Information Forensics and Security,. doi:10.1109/TIFS.2016.2516905. http://hdl.handle.net/2078.1/176459

5. Libert, Benoît; Peters, Thomas; Joye, Marc; Yung, Moti. Linearly homomorphic structure-preserving signatures and their applications. In: Designs, Codes and Cryptography,. doi:10.1007/s10623-015-0079-1. http://hdl.handle.net/2078.1/170330

6. Belaïd, Sonia; Grosso, Vincent; Standaert, François-Xavier. Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?. In: Cryptography and Communications,. doi:10.1007/s12095-014-0113-6. http://hdl.handle.net/2078.1/156594

7. Bayrak, Ali Galip; Ragazzoni, Francesco; Novo, David; Brisk, Philip; Standaert, François-Xavier; Ienne, Paolo. Automatic Application of Power Analysis Countermeasures. In: IEEE Transactions on Computers,. doi:10.1109/TC.2013.219. http://hdl.handle.net/2078.1/156457

8. Guo, Shize; Zhao, Xinjie; Zhang, Fan; Wa,g, Tao; Shi, Zhijie; Standaert, François-Xavier; Ma, Chujiao. Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations. In: IEEE Transactions on Information Forensics and Security,. doi:10.1109/TIFS.2014.2315534. http://hdl.handle.net/2078.1/152911

9. Belaïd, Sonia; De Santis, Frabrizio; Heyszl, Johann; Mangard, Stefan; Medwed, Marcel; Schmidt, Jörn-Marc; Standaert, François-Xavier; Tillich, Stefan. Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. In: Journal of Cryptographic Engineering,. doi:10.1007/s13389-014-0079-5. http://hdl.handle.net/2078.1/152905

10. Kamel, Dina; Renauld, Mathieu; Flandre, Denis; Standaert, François-Xavier. Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations. In: Journal of Cryptographic Engineering,. doi:10.1007/S13389-014-0080-z. http://hdl.handle.net/2078.1/152051


Conference Papers


1. Wang, Weijia; Yu, Yu; Standaert, François-Xavier; Gu, Dawu; Sen, XU; Zhang, Chi. Ridge-Based Profiled Differential Power Analysis. 2017, 978-3-319-52152-7. doi:10.1007/3-319-52153-4_20. http://hdl.handle.net/2078.1/187191

2. Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model. 2017, 978-3-319-56619-1. doi:10.1007/978-3-319-56620-7_19. http://hdl.handle.net/2078.1/187166

3. Wang, Weijia; Standaert, François-Xavier; Yu, Yu; Pu, Sihang; Liu, Junrong; Guo, Zheng; Gu, Dawu. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages. 2016, 978-3-319-54668-1. doi:10.1007/978-3-319-54669-8_11. http://hdl.handle.net/2078.1/187158

4. Berti, Francesco; Standaert, François-Xavier. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks. 2016, 978-3-319-54668-1. doi:10.1007/978-3-319-54669-8_15. http://hdl.handle.net/2078.1/187154

5. Couteau, Geoffroy; Peters, Thomas; Pointcheval, David. Encryption Switching Protocols. doi:10.1007/978-3-662-53018-4_12. http://hdl.handle.net/2078.1/182381

6. LIBERT, Benoît; Mouhartem, Fabrice; Peters, Thomas. Practical "Signatures with Efficient Protocols" from Simple Assumptions. In: Proceedings of the 11th ACM Asia Conference on Computer and Communication Security (ASIACCS 2016). http://hdl.handle.net/2078.1/182380

7. Dziembowski, Stefan; Faust, Sebastian; Standaert, François-Xavier. Private Circuits III: Hardware Trojan-Resilience via Testing Amplification. doi:10.1145/2976749.2978419. http://hdl.handle.net/2078.1/181926

8. Medwed, Marcel; Standaert, François-Xavier; Feldhofer, Martin; Nikov, Ventzislav. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF. 2016, 978-3-662-53886-9. doi:10.1007/978-3-662-53887-6_22. http://hdl.handle.net/2078.1/181924

9. Standaert, François-Xavier. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I -. 2016, 978-3-319-49444-9. doi:10.1007/978-3-319-49445-6_20. http://hdl.handle.net/2078.1/181916

10. Standaert, François-Xavier. Leakage-Resilient Symmetric Cryptography - Overview of the ERC Project CRASH, Part II -. 2016, 978-3-319-49890-8. doi:10.1007/978-3-319-49890-4. http://hdl.handle.net/2078.1/181910