Cryptography and Information Security

Cryptography and information security

 

 

 

 

Cryptography and Information Security seek at building tools that enable to secure data and to communicate in a reliable, fair, and private way. Over thirty researchers are active in this field.

Principal Investigators :

Olivier Pereira, Etienne Rivière, Ramin Sadre, François-Xavier Standaert, Jean-Pierre Tignol, Luc Vandendorpe

Research Labs :

Crypto Group, Information Security Group, Image and Signal Processing Group (ISPGroup)

Research Areas :

The research expertise at UCL, strong of over 30 researchers, covers the various layers of cryptography and its application to information security, namely:

  • Design and analysis of strong security protocols: authentication, multiparty computation, voting, provable security, evaluations, ...;
  • Design and analysis of efficient and secure cryptographic primitives symmetric and asymmetric encryption, digital signatures, ... ;
  • Efficient implementations of cryptographic primitives under various environmental constraints, both in software and hardware smart card, RFID, FPGA, ASIC, sensor networks, ...;
  • Implementation-related attacks (fault injection, side-channel) and countermeasures (distance-bounding protocols, masking, ...);
  • Practical attacks against security applications: time-memory tradeoff, biometric passport, ...;
  • Security from the physical layer: information theoretic cryptography, cooperative communications, ...;
  • Algebra: number theory, algebraic geometry, quadratic forms, algebras over arbitrary fields, ...;
  • Privacy-related issues at all levels ;
  • Computer security: viruses, spam, distributed attacks, wireless networks, ...

Most recent publications

Below are listed the 10 most recent journal articles and conference papers produced in this research area. You also can access all publications by following this link : see all publications.


Journal Articles


1. Peters, Thomas; Shen, Yaobin; Standaert, François-Xavier. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate. In: IACR Transaction on Symmetric Cryptology, Vol. 2024, p. 1--34. http://hdl.handle.net/2078.1/273131

2. Masure, Loïc; Cristiani Valence; Lecomte, Maxime; Standaert, François-Xavier. Don't Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking. In: Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023, no.1, p. 32-59 (2023). doi:10.46586/tches.v2023.i1.32-59. http://hdl.handle.net/2078.1/279103

3. Azouaoui, Melissa; Bronchain, Olivier; Cassiers, Gaëtan; Standaert, François-Xavier. Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023, no.4, p. 58-79 (2023). doi:10.46586/tches.v2023.i4.58-79. http://hdl.handle.net/2078.1/278184

4. Shen, Yaobin; Standaert, François-Xavier. Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers. In: {IACR} Trans. Symmetric Cryptol., Vol. 2023, no.2, p. 47-68 (2023). doi:10.46586/tosc.v2023.i2.47-68. http://hdl.handle.net/2078.1/278180

5. Cassiers, Gaëtan; Devillez, Henri; Standaert, François-Xavier; Udvarhelyi, Balazs. Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations. In: IACR Transactions on Cryptographic Hardware and Embedded SystemsISSN 2569-2925, Vol. 2023, No. 3, pp. 270–293.DOI:10.46586, Vol. 2023, no.3, p. 270-293 (2023). doi:10.46586/tches.v2023.i3.270-293. http://hdl.handle.net/2078.1/278174

6. Masure, Loïc; Cassiers, Gaëtan; Hendrickx, Julien; Standaert, François-Xavier. Information Bounds and Convergence Rates for Side-Channel Security Evaluators. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023, no.3, p. 522-569 (2023). doi:10.46586/tches.v2023.i3.522-569. http://hdl.handle.net/2078.1/278173

7. Gur, Ofek; Gross, Tomer; Bellizia, Davide; Standaert, François-Xavier; Levi, Itamar. An In-Depth Evaluation of Externally Amplified Coupling (EAC) Attacks — a Concrete Threat for Masked Cryptographic Implementations. In: IEEE Transactions on Circuits and Systems, Vol. 70, no.2, p. 783-796 (2023). doi:10.1109/TCSI.2022.3222176. http://hdl.handle.net/2078.1/278164

8. Camurati, Giovanni; Dell'Amico, Matteo; Standaert, François-Xavier. MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023, no.1, p. 277-300 (2023). doi:10.46586/tches.v2023.i1.277-300. http://hdl.handle.net/2078.1/278163

9. Bellizia, Davide; Hoffmann, Clément; Kamel, Dina; Méaux, Pierrick; Standaert, François-Xavier. When Bad News Become Good News Towards Usable Instances of Learning with Physical Errors. In: Trans. Cryptogr. Hardw. Embed. Syst, Vol. 4, p. 1-24 (2022). doi:10.46586/tches.v2022.i4.1-24. http://hdl.handle.net/2078.1/272229

10. Breuer, Rinat; Standaert, François-Xavier; Levi, Itamar. Fully-Digital Randomization Based Side-Channel Security - Toward Ultra-Low Cost-per-Security. In: Springer Nature Computer Science, Vol. 10, p. 68440-68449 (2022). doi:10.1109/ACCESS.2022.3185995. http://hdl.handle.net/2078.1/272228


Conference Papers


1. Rimez, Dany; Legay, Axel; Macq, Benoît. Ensuring Data Security and Annotators Anonymity Through a Secure and Anonymous Multiparty Annotation System. In: Novel and Intelligent Digital Systems: Proceedings of the 4th International Conference NiDS 2024 (Lecture Notes in Networks and Systems), Springer: Cham, Switzerland, 2024, 978-3-031-73343-7, p. 620-631 xxx. doi:10.1007/978-3-031-73344-4_54. http://hdl.handle.net/2078.1/293819

2. Doan, Thi Van Thao; Pereira, Olivier; Peters, Thomas. Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections. In: Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, 2024, Proceedings, Part II. (LNCS), 2024 xxx. http://hdl.handle.net/2078.1/287726

3. Devillez, Henri; Pereira, Olivier; Peters, Thomas; Yang, Quentin. Can we cast a ballot as intended and be receipt free?. In: IEEE Symposium on Security and Privacy. Proceedings. I E E E, 2024 xxx. http://hdl.handle.net/2078.1/287724

4. Langlois, Quentin; Szelagowski, Nicolas; Vanderdonckt, Jean; Jodogne, Sébastien. Open Platform for the De-identification of Burned-in Texts in Medical Images using Deep Learning. In: Proc. of the 17th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2024). Vol. 1, p. 297-304 (2024). SCITEPRESS – Science and Technology Publications, Lda. 2024 xxx. doi:10.5220/0012430300003657. http://hdl.handle.net/2078.1/282801

5. Standaert, François-Xavier. Mid-Size Primes for Symmetric Cryptography with Strong Embedded Security. 2023 xxx. http://hdl.handle.net/2078.1/279110

6. Masure, Loïc; Standaert, François-Xavier. Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage Model. In: Lecture Notes in Computer Science. Vol. 14083, p. 343-376 (2023). Springer: Heidelberg, 2023 xxx. doi:10.1007/978-3-031-38548-3\_12. http://hdl.handle.net/2078.1/278182

7. Masure, Loïc; Méaux, Pierrick; Moos, Thorben; Standaert, François-Xavier. Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers. In: Lecture Notes in Computer Science. Vol. 14007, p. 596-627 (2023). Springer: Heidelberg, 2023 xxx. doi:10.1007/978-3-031-30634-1\_20. http://hdl.handle.net/2078.1/278169

8. Cosseron, Orel; Hoffmann, Clément; Méaux, Pierrick; Standaert, François-Xavier. Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher. In: Lecture Notes in Computer Science. Vol. 13793, p. 32-67 (2023). Springer: Heidelberg, 2023 xxx. doi:10.1007/978-3-031-22969-5\_2. http://hdl.handle.net/2078.1/272234

9. Zhou, Yuanyuan; van de Pol, Joop; Yu, Yu; Standaert, François-Xavier. A Third is All You Need: Extended Partial Key Exposure Attack on (CRT-RSA) with Additive Exponent Blinding. In: Lecture Notes in Computer Science. Vol. 13794, p. 508-536 (2023). Springer: Heidelberg, 2023 xxx. doi:10.1007/978-3-031-22972-5\_18. http://hdl.handle.net/2078.1/272231

10. Naseer, Mahnoor; Tariq, Sundas; Riaz, Naveed. Substitution Layer Analysis of NIST Lightweight Cryptography Competition Finalists. In: 2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST). 2022 xxx. doi:10.1109/ibcast54850.2022.9990069. http://hdl.handle.net/2078.1/291893