Cryptography and Information Security

Cryptography and information security

 

 

 

 

Cryptography and Information Security seek at building tools that enable to secure data and to communicate in a reliable, fair, and private way. Over thirty researchers are active in this field.

Principal Investigators :

Olivier PereiraRamin Sadre, François-Xavier Standaert, Jean-Pierre Tignol, Luc Vandendorpe

Research Labs :

Crypto Group, Information Security Group, Image and Signal Processing Group (ISPGroup)

Research Areas :

The research expertise at UCL, strong of over 30 researchers, covers the various layers of cryptography and its application to information security, namely:

  • Design and analysis of strong security protocols: authentication, multiparty computation, voting, provable security, evaluations, ...;
  • Design and analysis of efficient and secure cryptographic primitives symmetric and asymmetric encryption, digital signatures, ... ;
  • Efficient implementations of cryptographic primitives under various environmental constraints, both in software and hardware smart card, RFID, FPGA, ASIC, sensor networks, ...;
  • Implementation-related attacks (fault injection, side-channel) and countermeasures (distance-bounding protocols, masking, ...);
  • Practical attacks against security applications: time-memory tradeoff, biometric passport, ...;
  • Security from the physical layer: information theoretic cryptography, cooperative communications, ...;
  • Algebra: number theory, algebraic geometry, quadratic forms, algebras over arbitrary fields, ...;
  • Privacy-related issues at all levels ;
  • Computer security: viruses, spam, distributed attacks, wireless networks, ...

Most recent publications

Below are listed the 10 most recent journal articles and conference papers produced in this research area. You also can access all publications by following this link : see all publications.


Journal Articles


1. Durvaux, François; Standaert, François-Xavier; Merino Del Pozo, Santos. Towards Easy Leakage Certification. In: Journal of Cryptographic Engineering, Vol. 7, no.2, p. 12-147 (17/05/2017). doi:10.1007/s13389-017-0150-0. http://hdl.handle.net/2078.1/187223

2. Journault, Anthony; Standaert, François-Xavier; Varici, Kerem. Improving the security and efficiency of block ciphers based on LS-designs. In: Designs, Codes and Cryptography, Vol. 82, no.1-2, p. 495-509 (09/01/2017). doi:10.1007/s10623-016-0193-8. http://hdl.handle.net/2078.1/181827

3. Zhang, Fan; Guo, Shize; Zhao, Xinjie; Wang, Tao; Yang, Jian; Standaert, François-Xavier. A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers. In: IEEE Transactions on Information Forensics and Security, Vol. 11, no.5, p. 1039-1054 (2016). doi:10.1109/TIFS.2016.2516905. http://hdl.handle.net/2078.1/176459

4. Libert, Benoît; Peters, Thomas; Joye, Marc; Yung, Moti. Linearly homomorphic structure-preserving signatures and their applications. In: Designs, Codes and Cryptography, Vol. 77, no.2-3, p. 441-477 (01/10/2015). doi:10.1007/s10623-015-0079-1. http://hdl.handle.net/2078.1/170330

5. Belaïd, Sonia; Grosso, Vincent; Standaert, François-Xavier. Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?. In: Cryptography and Communications, Vol. 7, no.1, p. 163-184 (2015). doi:10.1007/s12095-014-0113-6. http://hdl.handle.net/2078.1/156594

6. Bayrak, Ali Galip; Ragazzoni, Francesco; Novo, David; Brisk, Philip; Standaert, François-Xavier; Ienne, Paolo. Automatic Application of Power Analysis Countermeasures. In: IEEE Transactions on Computers, Vol. 64, no.2, p. 329-341 (2015). doi:10.1109/TC.2013.219. http://hdl.handle.net/2078.1/156457

7. Guo, Shize; Zhao, Xinjie; Zhang, Fan; Wa,g, Tao; Shi, Zhijie; Standaert, François-Xavier; Ma, Chujiao. Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations. In: IEEE Transactions on Information Forensics and Security, Vol. 9, no.6, p. 999-1014 (2014). doi:10.1109/TIFS.2014.2315534. http://hdl.handle.net/2078.1/152911

8. Belaïd, Sonia; De Santis, Frabrizio; Heyszl, Johann; Mangard, Stefan; Medwed, Marcel; Schmidt, Jörn-Marc; Standaert, François-Xavier; Tillich, Stefan. Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. In: Journal of Cryptographic Engineering, Vol. 4, no.3, p. 157-171 (2014). doi:10.1007/s13389-014-0079-5. http://hdl.handle.net/2078.1/152905

9. Kamel, Dina; Renauld, Mathieu; Flandre, Denis; Standaert, François-Xavier. Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations. In: Journal of Cryptographic Engineering, , no.4, p. 1987-1995 (18/04/2014). doi:10.1007/S13389-014-0080-z. http://hdl.handle.net/2078.1/152051

10. Petit, Christophe. Finding Roots in GF(p^n) with the Successive Resultant Algorithm. In: London Mathematical Society. Journal of Computation and Mathematics, Vol. 0, no.0, p. 0 (0). (Accepté/Sous presse). http://hdl.handle.net/2078.1/143016


Conference Papers


1. Wang, Weijia; Yu, Yu; Standaert, François-Xavier; Gu, Dawu; Sen, XU; Zhang, Chi. Ridge-Based Profiled Differential Power Analysis. Topics in Cryptology (CT-RSA) 2017 - The Cryptographers' Track at the RSA Conference 2017 (San Francisco (USA), du 14/02/2017 au 17/02/2017). In: Proceedings of the Topics in Cryptology (CT-RSA) 2017 - The Cryptographers' Track at the RSA Conference 2017 (Lecture Notes in Computer Science; 10159), Springer: Trier, 2017, 978-3-319-52152-7, p. 347-362. doi:10.1007/3-319-52153-4_20. http://hdl.handle.net/2078.1/187191

2. Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model. 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017) (Paris (France), du 30/04/2017 au 04/05/2017). In: Proceedings of the 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017) (Lecture Notes in Computer Science; 10210), Springer: Trier, 2017, 978-3-319-56619-1, p. 535-566. doi:10.1007/978-3-319-56620-7_19. http://hdl.handle.net/2078.1/187166

3. Wang, Weijia; Standaert, François-Xavier; Yu, Yu; Pu, Sihang; Liu, Junrong; Guo, Zheng; Gu, Dawu. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages. 15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016) (Cannes (France), du 07/11/2016 au 09/11/2016). In: Proceedings of the 15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016) (Lecture Notes in Computer Science; 10146), Springer: Trier, 2016, 978-3-319-54668-1, p. 174-191. doi:10.1007/978-3-319-54669-8_11. http://hdl.handle.net/2078.1/187158

4. Berti, Francesco; Standaert, François-Xavier. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks. 15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016) (Cannes (France), du 07/11/2016 au 09/11/2016). In: Proceedings of the 15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016) (Lecture Notes in Computer Science; 10146), Springer: Trier, 2016, 978-3-319-54668-1, p. 245-264. doi:10.1007/978-3-319-54669-8_15. http://hdl.handle.net/2078.1/187154

5. Couteau, Geoffroy; Peters, Thomas; Pointcheval, David. Secure Distributed Computation on Private Inputs. 8th International Symposium - Foundations and Practice of Security (FPS 2015) (Clermont-Ferrand (France), du 26/10/2016 au 28/10/2016). http://hdl.handle.net/2078.1/182382

6. Couteau, Geoffroy; Peters, Thomas; Pointcheval, David. Encryption Switching Protocols. 36th Annual International Cryptology Conference - Advances in Cryptology (CRYPTO 2016) (Santa Barbara (USA), du 14/08/2016 au 18/08/2016). doi:10.1007/978-3-662-53018-4_12. http://hdl.handle.net/2078.1/182381

7. LIBERT, Benoît; Mouhartem, Fabrice; Peters, Thomas. Practical "Signatures with Efficient Protocols" from Simple Assumptions. 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) (Xi'an (China), du 30/05/2016 au 03/06/2016). http://hdl.handle.net/2078.1/182380

8. Dziembowski, Stefan; Faust, Sebastian; Standaert, François-Xavier. Private Circuits III: Hardware Trojan-Resilience via Testing Amplification. 23rd ACM Conference on Computer and Communications Security (Vienna (Austria), du 24/10/2016 au 28/10/2016). doi:10.1145/2976749.2978419. http://hdl.handle.net/2078.1/181926

9. Medwed, Marcel; Standaert, François-Xavier; Feldhofer, Martin; Nikov, Ventzislav. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF. 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016) (Hanoi (Vietnam), du 04/12/2016 au 08/12/2016). In: Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016) (Lecture Notes in Computer Science; 10031), Springer, 2016, 978-3-662-53886-9, p. 602-623. doi:10.1007/978-3-662-53887-6_22. http://hdl.handle.net/2078.1/181924

10. Standaert, François-Xavier. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I -. 6th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2016) (Hyderabad (India), du 14/12/2016 au 18/12/2016). In: Proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2016) (Lecture Notes in Computer Science; 10076), Springer, 2016, 978-3-319-49444-9, p. 353-362. doi:10.1007/978-3-319-49445-6_20. http://hdl.handle.net/2078.1/181916