The page lists 77 projects related to the topic "cryptographic".
# | |||
---|---|---|---|
1 | FOC | Foundations of Cryptographic Hardness | 2015 |
2 | FELICITY | Foundations of Efficient Lattice Cryptography | 2015 |
3 | CLC | Cryptography with Low Complexity | 2015 |
4 | DCM | Distributed Cryptography Module | 2014 |
5 | ECRYPT-NET | European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud | 2015 |
6 | HECTOR | HARDWARE ENABLED CRYPTO AND RANDOMNESS | 2015 |
7 | HEAT | Homomorphic Encryption Applications and Technology | 2015 |
8 | TREDISEC | Trust-aware, REliable and Distributed Information SEcurity in the Cloud. | 2015 |
9 | SCISSOR | Security In trusted SCADA and smart-grids | 2015 |
10 | SAFEcrypto | Secure Architectures of Future Emerging Cryptography | 2015 |
11 | PRISMACLOUD | PRIvacy and Security MAintaining services in the CLOUD | 2015 |
12 | ECRYPT-CSA | European Coordination and Support Action in Cryptology | 2015 |
13 | PQCRYPTO | Post-quantum cryptography for long-term security | 2015 |
14 | SPOOC | Automated Security Proofs of Cryptographic Protocols: Privacy, Untrusted Platforms and Applications to E-voting Protocols | 2015 |
15 | PANORAMIX | Privacy and Accountability in Networks via Optimized Randomized Mix-nets | 2015 |
16 | DSTB | Dyadic Secures The Breach | 2015 |
17 | MPCPRO | Better MPC Protocols in Theory and in Practice | 2015 |
18 | Excalibur 2.0 | Revolutionary trustworthy platform for seamless authentication of Internet users | 2015 |
19 | KMaaS | Key Management as-a-Service | 2016 |
20 | QINTERNET | Quantum communication networks | 2016 |
21 | SOPHIA | Securing Software against Physical Attacks | 2016 |
22 | CIRCUS | An end-to-end verification architecture for building Certified Implementations of Robust, Cryptographically Secure web applications | 2016 |
23 | POMEGRANATE | Practice-Oriented Security Models and Granular Designs for Future-Proof Authenticated Encryption | 2017 |
24 | GenoPri | Quantifying and Protecting the Privacy of Genomic Data | 2016 |
25 | QCALL | Quantum Communications for ALL | 2016 |
26 | Cathedral | Post-Snowden Circuits and Design Methods for Security | 2016 |
27 | EPoCH | Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks | 2016 |
28 | FAFC | Foundations and Applications of Functional Cryptography | 2017 |
29 | REASSURE | Robust and Efficient Approaches to Evaluating Side Channel and Fault Attack Resilience | 2017 |
30 | POPSTAR | Reasoning about Physical properties Of security Protocols with an Application To contactless Systems | 2017 |
31 | SWORD | Security Without Obscurity for Reliable Devices | 2017 |
32 | BROS | Blockchain: a new framework for swarm RObotic Systems | 2017 |
33 | PREP-CRYPTO | Preparing Cryptography for Modern Applications | 2017 |
34 | UFICS-QRNG | Development of an Ultra-Fast, Integrated, Certified Secure Quantum Random Number Generator for applications in Science and Information Technology | 2017 |
35 | SEAL | Sound and Early Assessment of Leakage for Embedded Software | 2017 |
36 | CASCAde | Confidentiality-preserving Security Assurance | 2017 |
37 | ALGSTRONGCRYPTO | Algebraic Methods for Stronger Crypto | 2017 |
38 | CerQUIT | Certifying Large-scale Quantum Information Technologies | 2018 |
39 | NTSC | New Techniques for Secure Computation | 2017 |
40 | REACT | Realizable Advanced Cryptography | 2017 |
41 | FutureTPM | Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module | 2018 |
42 | PRIViLEDGE | Privacy-Enhancing Cryptography in Distributed Ledgers | 2018 |
43 | PROMETHEUS | PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS | 2018 |
44 | OLYMPUS | Oblivious identitY Management for Private and User-friendly Services | 2018 |
45 | CLOUDMAP | Cloud Computing via Homomorphic Encryption and Multilinear Maps | 2018 |
46 | IDPOQ | Evaluation and implementation of post-quantum cryptographic schemes | 2018 |
47 | CoHuBiCoL | Counting as a Human Being in the Era of Computational Law | 2019 |
48 | EyeCode | A frictionless two-factor authentication software for secure transactions | 2018 |
49 | Be12 | A cyphered cloud based DataBank for the corporate sector | 2018 |
50 | Blocknetwork | Blocknetwork - Fusing Big Data and Implementing Novel Cyber Security Solutions | 2018 |
51 | INCOGNITO | IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online services | 2019 |
52 | SPEC | Secure, Private, Efficient Multiparty Computation | 2019 |
53 | QRANGE | Quantum Random Number Generators: cheaper, faster and more secure | 2018 |
54 | REWOCRYPT | Theoretically-Sound Real-World Cryptography | 2019 |
55 | EPOQUE | Engineering post-quantum cryptography | 2018 |
56 | ASCLEPIOS | Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare | 2018 |
57 | Safe-DEED | Safe Data Enabled Economic Development | 2018 |
58 | PANACEA | Protection and privAcy of hospital and health iNfrastructures with smArt Cyber sEcurity and cyber threat toolkit for dAta and people | 2019 |
59 | VERICOMP | Foundations of Verifiable Computing | 2019 |
60 | SCARE | Side-Channel Aware Engineering | 2018 |
61 | CerQuS | Certified Quantum Security | 2019 |
62 | BitBox | BitBox Enterprise - Enterprise-grade Solution for Digital Assets Custody | 2019 |
63 | KIProtect | KIProtect: The security layer for data science and artificial intelligence | 2019 |
64 | inCREASE | Coding for Security and DNA Storage | 2019 |
65 | CERQUTE | Certification of quantum technologies | 2020 |
66 | SatCV | Satellite CV-QKD | 2019 |
67 | ACCORD | Accelerated Ordering Service for Distributed Ledgers | 2019 |
68 | MAMONET | Massive MIMO for Securing Internet of Things Networks | 2020 |
69 | QuanTELCO | Quantum Emitters for Telecommunication in the O-Band | 2019 |
70 | AlgoQIP | Beyond Shannon: Algorithms for optimal information processing | 2020 |
71 | Ngrave | The World’s Most Secure Cryptocurrency Safeguarding Solution | 2019 |
72 | ARCAone | Next generation security platform to safeguard critical applications and sensitive digital assets | 2019 |
73 | TRIDENT | TRIDENT ELASTIC HSM PLATFORM | 2020 |
74 | DiFacturo | The Unique International Independent Decentralized Invoice Network | 2019 |
75 | CIPHRA | CIPHRA | 2020 |
76 | HSS | Homomorphic Secret Sharing: Secure Computation and Beyond | 2020 |
77 | MCT | Metacomputational Complexity Theory | 2020 |