Cryptography and Information Security

Cryptography and information security

 

 

 

 

Cryptography and Information Security seek at building tools that enable to secure data and to communicate in a reliable, fair, and private way. Over thirty researchers are active in this field.

Principal Investigators :

Axel Legay, Olivier Pereira, Etienne Rivière, Ramin Sadre, François-Xavier Standaert, Luc Vandendorpe

Research Labs :

Crypto Group, Cloud and Large Scale computing group, Image and Signal Processing Group (ISPGroup), Security and Performance of Networked Systems Group

Research Areas :

The research expertise at UCL, strong of over 30 researchers, covers the various layers of cryptography and its application to information security, namely:

  • Design and analysis of strong security protocols: authentication, multiparty computation, voting, provable security, evaluations, ...;
  • Design and analysis of efficient and secure cryptographic primitives symmetric and asymmetric encryption, digital signatures, ... ;
  • Efficient implementations of cryptographic primitives under various environmental constraints, both in software and hardware smart card, RFID, FPGA, ASIC, sensor networks, ...;
  • Implementation-related attacks (fault injection, side-channel) and countermeasures (distance-bounding protocols, masking, ...);
  • Practical attacks against security applications: time-memory tradeoff, biometric passport, ...;
  • Security from the physical layer: information theoretic cryptography, cooperative communications, ...;
  • Algebra: number theory, algebraic geometry, quadratic forms, algebras over arbitrary fields, ...;
  • Privacy-related issues at all levels ;
  • Computer security: viruses, spam, distributed attacks, wireless networks, ...

Most recent publications

Below are listed the 10 most recent journal articles and conference papers produced in this research area. You also can access all publications by following this link : see all publications.


Journal Articles


1. Levi, Itamar; Bellizia, Davide; Standaert, François-Xavier. Beyond algorithmic noise or how to shuffle parallel implementations?. In: International Journal of Circuit Theory and Applications, Vol. 48, no.5, p. 674-695 (2020). doi:10.1002/cta.2756. http://hdl.handle.net/2078.1/230058

2. Wang, Weijia; Yu, Yu; Standaert, François-Xavier. Provable Order Amplification for Code-based Masking: How to Avoid Non-linear Leakages due to Masked Operations. In: IEEE Transactions on Information Forensics and Security, Vol. 14, no.11, p. 3069-3082 (2019). doi:10.1109/TIFS.2019.2912549. http://hdl.handle.net/2078.1/226265

3. Cassiers, Gaëtan; Standaert, François-Xavier. Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 162-198 (2019). doi:10.13154/tches.v2019.i2.162-198. http://hdl.handle.net/2078.1/226238

4. Levi, Itamar; Bellizia, Davide; Standaert, François-Xavier. Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 293-317 (2019). doi:10.13154/tches.v2019.i2.293-317. http://hdl.handle.net/2078.1/226195

5. Bronchain, Olivier; Schneider, Tobias; Standaert, François-Xavier. Multi-Tuple Leakage Detection and the Dependent Signal Issue. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 318-345 (2019). doi:10.13154/tches.v2019.i2.318-345. http://hdl.handle.net/2078.1/225499

6. Moos, Thorben; Moradi, Amir; Schneider, Tobias; Standaert, François-Xavier. Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 256-292 (2019). doi:10.13154/tches.v2019.i2.256-292. http://hdl.handle.net/2078.1/225487

7. Duc, Alexandre; Faust, Sebastian; Standaert, François-Xavier. Making Masking Security Proofs Concrete. Or How to Evaluate the Security of any Leaking Device -Extended Version-. In: Journal of Cryptology, Vol. 32, no.4, p. 1263-1297 (2019). doi:10.1007/s00145-018-9277-0. http://hdl.handle.net/2078.1/225460

8. Moradi, Amir; Richter, Bastian; Schneider, Tobias; Standaert, François-Xavier. Leakage detection with the X²-Test. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, no.1, p. 209-237. doi:10.13154/tches.v2018.i1.209-237. http://hdl.handle.net/2078.1/199339

9. Kamel, Dina; Standaert, François-Xavier; Duc, Alexandre; Flandre, Denis; Berti, Francesco. Learning with Physical Noise or Errors. In: IEEE Transaction on Dependable and Secure Computing, , p. 14 (2018). http://hdl.handle.net/2078.1/199135

10. Rochet, Florentin; Pereira, Olivier. Waterfilling: Balancing the Tor network with maximum diversity. In: PoPETS "Proceedings on Privacy Enhancing Technologies", Vol. 2, p. 4-22 (2017). doi:10.1515/popets-2017-0013. http://hdl.handle.net/2078.1/192336


Conference Papers


1. Haines, Thomas; Lewis, Sarah Jamie; Pereira, Olivier; Teague, Vanessa. How not to prove your election outcome. In: 2020 {IEEE} Symposium on Security and Privacy, SP 2020, 2020. http://hdl.handle.net/2078.1/223906

2. Standaert, François-Xavier. Analyzing the Leakage-Resistance of some Round-2 Candidates of the NIST’s Lightweight Crypto Standardization Process. In: Proceedings of the NIST Lightweight Cryptography Workshop 2019, 2019. http://hdl.handle.net/2078.1/226506

3. Barthe, Gilles; Belaïd, Sonia; Cassiers, Gaëtan; Fouque, Pierre-Alain; Grégoire, Benjamin; Standaert, François-Xavier. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults. In: Proceedings of the 24th European Symposium on Research in Computer Security (ESORICS 2019) (Lecture Notes in Computer Science), Springer, 2019, 978-3-030-29958-3, p. 300-318. doi:10.1007/978-3-030-29959-0. http://hdl.handle.net/2078.1/226296

4. Bronchain, Olivier; Hendrickx, Julien M.; Massart, Clément; Olshevsky, Alex; Standaert, François-Xavier. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations. In: Proceedings of the 39th Annual International Cryptology Conference - Advances in Cryptology (CRYPTO 2019)-Part I (Lecture Notes in Computer Science), Springer, 2019, 978-3-030-26947-0, p. 713-737. doi:10.1007/978-3-030-26948-7_25. http://hdl.handle.net/2078.1/226294

5. Massart, Clément; Standaert, François-Xavier. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint. In: Proceedings of the 11th International Conference on Cryptology in Africa - Progress in Cryptology (AFRICACRYPT 2019) (Lecture Notes in Computer Science), Springer, 2019, 978-3-030-23695-3, 333-351. doi:10.1007/978-3-030-23696-0. http://hdl.handle.net/2078.1/226278

6. Massart, Clément; Standaert, François-Xavier. Towards Long-Term Privacy Bounds in Open Data Publishing. In: Proceedings of the 40th WIC Symposium on Information Theory in the Benelux, 2019. http://hdl.handle.net/2078.1/226277

7. Momin, Charles; Bronchain, Olivier; Standaert, François-Xavier. Time-Modulated Hardware Trojans: Clock-Based and Interface-Based Examples. In: Proceedings of the 40th WIC Symposium on Information Theory in the Benelux, 2019. http://hdl.handle.net/2078.1/226276

8. Zhou, Yuanyuan; Standaert, François-Xavier. Simplified Single-Trace Side-Channel Attacks on Elliptic Curve Scalar Multiplication using Fully Convolutional Networks. In: Proceedings of the 40th WIC Symposium on Information Theory in the Benelux, 2019. http://hdl.handle.net/2078.1/226275

9. Standaert, François-Xavier. Towards an Open Approach to Side-Channel Resistant Authenticated Encryption. doi:10.1145/3338508.3359579. http://hdl.handle.net/2078.1/226272

10. Azouaoui, Melissa; Poussier, Romain; Standaert, François-Xavier. Fast Side-Channel Security Evaluation of ECC Implementations - Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder. In: Proceedings of COSADE 2019 (Lecture Notes in Computer Science), Springer: Heidelberg, 2019, 978-3-030-16349-5, p. 25-42. doi:10.1007/978-3-030-16350-1_3. http://hdl.handle.net/2078.1/226243