The page lists 72 projects related to the topic "cryptography".
# | |||
---|---|---|---|
1 | FOC | Foundations of Cryptographic Hardness | 2015 |
2 | FELICITY | Foundations of Efficient Lattice Cryptography | 2015 |
3 | CLC | Cryptography with Low Complexity | 2015 |
4 | DCM | Distributed Cryptography Module | 2014 |
5 | IQCC | Integrated quantum correlation counter | 2015 |
6 | HECTOR | HARDWARE ENABLED CRYPTO AND RANDOMNESS | 2015 |
7 | HEAT | Homomorphic Encryption Applications and Technology | 2015 |
8 | WITDOM | empoWering prIvacy and securiTy in non-trusteD envirOnMents | 2015 |
9 | SAFEcrypto | Secure Architectures of Future Emerging Cryptography | 2015 |
10 | ECRYPT-CSA | European Coordination and Support Action in Cryptology | 2015 |
11 | PQCRYPTO | Post-quantum cryptography for long-term security | 2015 |
12 | CC | Combinatorial Construction | 2016 |
13 | CREDENTIAL | Secure Cloud Identity Wallet | 2015 |
14 | FLYELEC | Quantum Optics with single flying electrons | 2015 |
15 | ETAB | Entangled Twin Atom Beams | 2015 |
16 | GroupsComputability | Algorithms in algebra and topology | 2015 |
17 | ENCASE | EnhaNcing seCurity And privacy in the Social wEb: a user centered approach for the protection of minors | 2016 |
18 | 3D-COUNT | 3D-Integrated single photon detector | 2016 |
19 | AlmaCrypt | Algorithmic and Mathematical Cryptology | 2016 |
20 | ATOM | Advancing the state of the art of MIMO: the key to the successful evolution of wireless networks | 2016 |
21 | SOPHIA | Securing Software against Physical Attacks | 2016 |
22 | TOCNeT | Teaching Old Crypto New Tricks | 2016 |
23 | TempoQ | Temporal Quantum Correlations | 2016 |
24 | ESTIA | Exponential sums, translation invariance, and applications | 2016 |
25 | SeQuCom | Secure Quantum Communication and Computation | 2017 |
26 | LipVerify | Feasibility study on the development of LipVerify - a new viseme based user authentication service. | 2016 |
27 | QTOOL | Commercialization of Single-Photon Light Sources | 2016 |
28 | EPoCH | Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks | 2016 |
29 | QUASYModo | Symmetric Cryptography in the Post-Quantum World | 2017 |
30 | FAFC | Foundations and Applications of Functional Cryptography | 2017 |
31 | REASSURE | Robust and Efficient Approaches to Evaluating Side Channel and Fault Attack Resilience | 2017 |
32 | ERIDIAN | Ensured Randomness Integrity in Device-Independent Networks | 2016 |
33 | ROSETTA | Robust self-testing with applications to device-independent cryptography | 2017 |
34 | PREP-CRYPTO | Preparing Cryptography for Modern Applications | 2017 |
35 | ALGSTRONGCRYPTO | Algebraic Methods for Stronger Crypto | 2017 |
36 | ResearchProof | An online digital logbook to protect and prove authorship, and to share scientific results | 2017 |
37 | PPSSR | Privacy Preserving Secure Speech Recognition | 2017 |
38 | NTSC | New Techniques for Secure Computation | 2017 |
39 | REACT | Realizable Advanced Cryptography | 2017 |
40 | LightCrypt | New Directions in Lightweight Cryptanalysis | 2017 |
41 | QUSCO | Quantum superiority with coherent states | 2018 |
42 | BLOCKCHAINSOCIETY | The Disrupted Society: mapping the societal effects of blockchain technology diffusion | 2018 |
43 | FutureTPM | Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module | 2018 |
44 | FENTEC | Functional Encryption Technologies | 2018 |
45 | PROMETHEUS | PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS | 2018 |
46 | OLYMPUS | Oblivious identitY Management for Private and User-friendly Services | 2018 |
47 | CLOUDMAP | Cloud Computing via Homomorphic Encryption and Multilinear Maps | 2018 |
48 | GENIUS | Gaussian entropic inequalities and uncertainty relations for communication and secure quantum key distribution | 2018 |
49 | QQT | Identification of quantum resources in thermodynamic systems | 2018 |
50 | IDPOQ | Evaluation and implementation of post-quantum cryptographic schemes | 2018 |
51 | ESCADA | Energy-optimized Symmetric Cryptography by Algebraic Duality Analysis | 2018 |
52 | PIEDMONS | Portable Ion Devices for Mobile-Oriented Next-generation semiconductor Technologies | 2018 |
53 | EyeCode | A frictionless two-factor authentication software for secure transactions | 2018 |
54 | QMiCS | Quantum Microwave Communcation and Sensing | 2018 |
55 | QRANGE | Quantum Random Number Generators: cheaper, faster and more secure | 2018 |
56 | REWOCRYPT | Theoretically-Sound Real-World Cryptography | 2019 |
57 | EPOQUE | Engineering post-quantum cryptography | 2018 |
58 | ASCLEPIOS | Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare | 2018 |
59 | Safe-DEED | Safe Data Enabled Economic Development | 2018 |
60 | VERICOMP | Foundations of Verifiable Computing | 2019 |
61 | IONPEN | Trapped-ion quantum information in 2-dimensional Penning trap arrays | 2019 |
62 | SCARE | Side-Channel Aware Engineering | 2018 |
63 | CerQuS | Certified Quantum Security | 2019 |
64 | SPARTA | Strategic programs for advanced research and technology in Europe | 2019 |
65 | LocalGlobal0Cycles | Local-global principles and zero-cycles | 2019 |
66 | CRITICAL-CHAINS | IOT- & Blockchain-Enabled Security Framework for New Generation Critical Cyber-Physical Systems In Finance Sector | 2019 |
67 | CERQUTE | Certification of quantum technologies | 2020 |
68 | SatCV | Satellite CV-QKD | 2019 |
69 | StrongPIN | The first mobile app to enable LoA 4 hardware backed security on any existing mobile phone safeguarding the identity and privacy on the everyday digital life in an easy to use and scalable manner | 2019 |
70 | KRAKEN | Brokerage and market platform for personal data | 2019 |
71 | TNT | Truth-not-Trust | 2020 |
72 | MCT | Metacomputational Complexity Theory | 2020 |