Cryptography and Information Security

Cryptography and information security





Cryptography and Information Security seek at building tools that enable to secure data and to communicate in a reliable, fair, and private way. Over thirty researchers are active in this field.

Principal Investigators :

Axel Legay, Olivier Pereira, Thomas Peters, Etienne Rivière, Ramin Sadre, François-Xavier Standaert, Luc Vandendorpe

Research Labs :

Crypto Group, Cloud and Large Scale computing group, Image and Signal Processing Group (ISPGroup), Security and Performance of Networked Systems Group

Research Areas :

The research expertise at UCL, strong of over 30 researchers, covers the various layers of cryptography and its application to information security, namely:

  • Design and analysis of strong security protocols: authentication, multiparty computation, voting, provable security, evaluations, ...;
  • Design and analysis of efficient and secure cryptographic primitives symmetric and asymmetric encryption, digital signatures, ... ;
  • Efficient implementations of cryptographic primitives under various environmental constraints, both in software and hardware smart card, RFID, FPGA, ASIC, sensor networks, ...;
  • Implementation-related attacks (fault injection, side-channel) and countermeasures (distance-bounding protocols, masking, ...);
  • Practical attacks against security applications: time-memory tradeoff, biometric passport, ...;
  • Security from the physical layer: information theoretic cryptography, cooperative communications, ...;
  • Algebra: number theory, algebraic geometry, quadratic forms, algebras over arbitrary fields, ...;
  • Privacy-related issues at all levels ;
  • Computer security: viruses, spam, distributed attacks, wireless networks, ...

Most recent publications

Below are listed the 10 most recent journal articles and conference papers produced in this research area. You also can access all publications by following this link : see all publications.

Journal Articles

1. Standaert, François-Xavier; Bronchain, Olivier; Masure, Loïc; Durvaux, François. Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended. In: IEEE Transactions on Information Forensics and Security, Vol. 17, p. 574-584 (2022). doi:10.1109/TIFS.2022.3144871.

2. Berti, Francesco; Poussier, Romain; Breier, Jakub; Udvarhelyi, Balazs; Standaert, François-Xavier; Hou, Xiaolu; Bhasin, Shivam. A Finer-Grain Analysis of the Leakage (Non)Resilience of OCB. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, no.1, p. 461-481 (2022). doi:10.46586/tches.v2022.i1.461-481.

3. Yu, Yu; Guo, Chun; Standaert, François-Xavier; Wang, Xiao; Wang, Weijia. Provable Security of SP Networks with Partial Non-Linear Layers. In: IACR Transactions on Symmetric Cryptography, Vol. 2021, no.2, p. 353-388 (2021). doi:10.46586/tosc.v2021.i2.353-388.

4. Standaert, François-Xavier; Momin, Charles; Peters, Thomas; Bronchain, Olivier. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors. In: IACR Transactions on Cryptographic Hardware and Emebedded Systems, Vol. 2021, no.3, p. 641-676 (2021). doi:10.46586/tches.v2021.i3.641-676.

5. Yu, Yu; Méaux, Pierrick; Standaert, François-Xavier; Hoffmann, Clément; Kamel, Dina; Bellizia, Davide; Liu, Hanlin. Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, no.3, p. 390-417 (2021). doi:10.46586/tches.v2021.i3.390-417.

6. Standaert, François-Xavier; Bronchain, Olivier. Breaking Masked Implementations with ManyShares on 32-bit Software Platformsor or When the Security Order Does Not Matter. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, no.3, p. 202-234 (2021). doi:10.46586/tches.v2021.i3.202-234.

7. Cassiers, Gaëtan; Standaert, François-Xavier. Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, no.2, p. 136-158 (2021). doi:10.46586/tches.v2021.i2.136-158.

8. Momin, Charles; Standaert, François-Xavier; Bronchain, Olivier. A Stealthy Hardware Trojan based on a Statistical Fault Attack. In: Cryptography and Communications, Vol. 13, no.4, p. 587-600 (2021). doi:10.1007/s12095-021-00480-4.

9. Cassiers, Gaëtan; Grégoire, Benjamin; Standaert, François-Xavier; Levi, Itamar. Hardware Private Circuits: From Trivial Composition to Full Verification. In: IEEE Transactions on Sustainable Computing70, Vol. 70, no.10, p. 1677-1690 (2020). doi:10.1109/TC.2020.3022979.

10. Méaux, Pierrick; Momin, Charles; Standaert, François-Xavier; Duval, Sébastien. Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying. In: Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, no.1, p. 373-401 (2021). doi:10.46586/tches.v2021.i1.373-401.

Conference Papers

1. Cassiers, Gaëtan; Momin, Charles; Standaert, François-Xavier. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations. In: Lecture Notes in Computer Science. Vol. 13211, p. 257-275 (2022). In: Proceedings of COSADE 2022, Springer: Heidelberg, 2022 xxx. doi:10.1007/978-3-030-99766-3\_12.

2. Azouaoui, Melissa; Standaert, François-Xavier; Kuzovkova,Yulia; Hoffmann, Clément; Schneider, Tobias; Bronchain, Olivier. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber. In: Lecture Notes in Computer Science. Vol. 13211, p. 236-256 (2022). In: Proceedings of COSADE 2022, Springer: Heidelberg, 2022 xxx. doi:10.1007/978-3-030-99766-3\_11.

3. Pereira, Olivier. Individual Verifiability and Revoting in the Estonian Internet Voting System. 2022 xxx.

4. Standaert, François-Xavier; Udvarhelyi, Balazs; Bellizia, Davide. Towards a Better Understanding of Side-Channel Analysis Measurements Setups. In: Lecture Notes in Computer Science. Vol. 13173, p. 64-79 (2021). Springer: Heidelberg, 2021 xxx. doi:10.1007/978-3-030-97348-3\_4.

5. Udvarhelyi, Balazs; Standaert, François-Xavier; Bronchain, Olivier. Security Analysis of Deterministic Re-Keying with Masking & Shuffling: Application to ISAP. In: Lecture Notes in Computer Science. Vol. 12910, p. 168-183. In: Proceedings of COSADE 2021, Shivam Bhasin and Fabrizio De Santis, 2021 xxx. doi:10.1007/978-3-030-89915-8\_8.

6. Standaert, François-Xavier; Bronchain, Olivier; Papagiannopoulos, Kostas; Azouaoui, Melissa; Grosso, Vincent. Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?. In: IACR Transactions on Cryptographic Hardware and Embedded Systems. p. 25 (2021). In: Transactions of Cryptographic Hardware and Embedded Systems (TCHES)., IACR, 2021 xxx.

7. Cassiers, Gaëtan; Orlt, Maximilian; Standaert, François-Xavier; Faust, Sebastian. Towards Tight Random Probing Security - extended version. In: Lecture Notes in Computer Science. Vol. 12827, p. 185-214 (2021). Springer: Heidelberg, 2021 xxx. doi:10.1007/978-3-030-84252-9\_7.

8. Yung, Moti; Nguyen, Khoa; Devevey, Julien; Peters, Thomas; Libert, Benoît. Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. In: Lecture Notes in Computer Science. Vol. 12710, p. 659-690 (2021). Springer, 2021 xxx. doi:10.1007/978-3-030-75245-3/_24;

9. Udvarhelyi, Balazs; Standaert, François-Xavier; Bronchain, Olivier; van Wassenhove, Antoine. On the Security of Off-the-Shelf Microcontrollers: Hardware is not Enough. In: Lecture Notes in Computer Science. Vol. 12609, p. 103-118 (2020). Springer: Heidelberg, 2020 xxx. doi:10.1007/978-3-030-68487-7\_7.

10. Zhou, Yuanyuan; Standaert, François-Xavier; Duval, Sébastien. Scatter: a Missing Case?. In: Lecture Notes in Computer Science. Vol. 12244, p. 90--103 (2020). Springer, 2020 xxx. doi:10.1007/978-3-030-68773-1\_5.