Opendata, web and dolomites

ECRYPT-NET SIGNED

European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 ECRYPT-NET project word cloud

Explore the words cloud of the ECRYPT-NET project. It provides you a very rough idea of what is the project "ECRYPT-NET" about.

pro    broad    revelations    structure    makers    electrical    policy    visits    training    cloud    outreach    teams    cryptology    area    secondments    cryptographic    stakeholders    implementations    15    interdisciplinary    platforms    privacy    schools    intensive    itn    industry    things    physical    cybersecurity    clear    computation    trust    active    techniques    group    snowden    mass    societal    transfer    track    personal    supports    weaknesses    innovative    fragmentation    computer    record    surveillance    agenda    context    commercial    workshops    emphasized    engineering    responds    summer    complemented    usability    responsibilization    contributes    smes    seminars    mathematics    timeliness    erss    guided    industrial    helping    combining    companies    digital    nation    consists    serious    equip    security    era    transferable    etn    overcome    deployment    create    infrastructure    relevance    made    science    fellows    stage    plan    central    skills    internet    solutions   

Project "ECRYPT-NET" data sheet

The following table provides information about the project.

Coordinator
KATHOLIEKE UNIVERSITEIT LEUVEN 

Organization address
address: OUDE MARKT 13
city: LEUVEN
postcode: 3000
website: www.kuleuven.be

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Belgium [BE]
 Project website http://www.ecrypt.eu.org/net/
 Total cost 3˙893˙199 €
 EC max contribution 3˙893˙199 € (100%)
 Programme 1. H2020-EU.1.3.1. (Fostering new skills by means of excellent initial training of researchers)
 Code Call H2020-MSCA-ITN-2014
 Funding Scheme MSCA-ITN-ETN
 Starting year 2015
 Duration (year-month-day) from 2015-03-01   to  2019-02-28

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    KATHOLIEKE UNIVERSITEIT LEUVEN BE (LEUVEN) coordinator 501˙120.00
2    ROYAL HOLLOWAY AND BEDFORD NEW COLLEGE UK (EGHAM) participant 546˙575.00
3    UNIVERSITY OF BRISTOL UK (BRISTOL) participant 546˙575.00
4    ECOLE NORMALE SUPERIEURE FR (PARIS CEDEX 05) participant 525˙751.00
5    TECHNISCHE UNIVERSITEIT EINDHOVEN NL (EINDHOVEN) participant 510˙748.00
6    NXP SEMICONDUCTORS BELGIUM NV BE (LEUVEN) participant 501˙120.00
7    RUHR-UNIVERSITAET BOCHUM DE (BOCHUM) participant 498˙432.00
8    CRYPTOEXPERTS SAS FR (PARIS) participant 262˙875.00
9    IBM RESEARCH GMBH CH (RUESCHLIKON) partner 0.00
10    INTRINSIC ID B.V. NL (EINDHOVEN) partner 0.00
11    Mastercard International Incorporated UK (London) partner 0.00
12    NEC EUROPE LTD UK (LONDON) partner 0.00
13    ORANGE SA FR (PARIS) partner 0.00
14    RISCURE BV NL (DELFT) partner 0.00
15    Thales research and Technology Ltd UK (ADDLESTONE) partner 0.00

Map

 Project objective

The goal of this ETN is to develop advanced cryptographic techniques for the Internet of Things and the Cloud and to create implementations that offer a high level of security and increased usability, for a wide range of physical computation platforms. The ITN will equip a group of 15 early stage researchers with a set of interdisciplinary skills combining mathematics, computer science and electrical engineering that will allow them to create advanced cryptographic solutions that will be available for commercial applications. The 8 partners (including 2 companies) are leading research teams in the area of applied cryptology with a strong track record of collaboration; it is complemented by 6 partner organisations from industry (including 2 SMEs).The training from the ERSs will be guided by a personal development plan. A central component is training by research supported by an intensive program of workshops, summer schools, seminars, research visits, and secondments. The training will be complemented with transferable skills that also support the transfer of research to an industrial context. The management structure of the project is built on a pro-active approach with responsibilization of the fellows. The dissemination and outreach of the project activities target a broad range of stakeholders. The ITN contributes to the ERA by helping to overcome the fragmentation in the area of applied cryptology. The research supports the trust and security component of the Digital Agenda for Europe and responds to the growing attention of EU policy makers for societal needs related to privacy and cybersecurity. The societal relevance and timeliness of this research has been emphasized by revelations made by Snowden, that provide clear evidence of mass surveillance by nation states and of serious weaknesses of our current infrastructure. An essential component of a response to these revelations consists a broad deployment of advanced and innovative cryptographic techniques.

 Deliverables

List of deliverables.
Final Report on Dissemination, Press and Outreach Strategy Documents, reports 2019-07-22 16:49:48
Yearly report on training Y4 Documents, reports 2019-07-22 16:49:43
Yearly report on training Y3 Documents, reports 2019-07-22 16:50:11
Awarding of doctoral degrees Documents, reports 2019-07-22 16:49:53
Final Career Development Plan Y4 Documents, reports 2019-07-22 16:49:45
Tech report on Implementation results Documents, reports 2019-07-22 16:50:17
Technical report on Final designs and implementations Documents, reports 2019-07-22 16:49:57
Career Development Plan Y3 Documents, reports 2019-07-22 16:49:48
Half way Review of Dissemination, Press and Outreach Strategy Documents, reports 2019-07-10 14:20:49
Dissemination, Press and Outreach Strategy Documents, reports 2019-07-10 14:20:49
Yearly report on training Y1 Documents, reports 2019-07-10 14:20:49
Supervisory Board of the network Other 2019-07-10 14:20:49
Technical Report on Requirements and design constraints for IoT and Cloud Documents, reports 2019-07-10 14:20:49
Career Development Plan Y1 Documents, reports 2019-07-10 14:20:49
Technical Report on First designs for IoT and the Cloud Documents, reports 2019-07-10 14:20:49
ESRs declarations Other 2019-07-10 14:20:49
Network public website Websites, patent fillings, videos etc. 2019-07-10 14:20:49
Progress Report Documents, reports 2019-07-10 14:20:49
Yearly report on training Y2 Documents, reports 2019-07-10 14:20:49
Career Development Plan Y2 Documents, reports 2019-07-10 14:20:49
Draft Periodic Report Documents, reports 2019-07-10 14:20:49
Overall Recruitment Other 2019-07-10 14:20:49

Take a look to the deliverables list in detail:  detailed list of ECRYPT-NET deliverables.

 Publications

year authors and title journal last update
List of publications.
2017 Dušan Božilov, Begül Bilgin, Hacı Ali Sahin
A Note of 5-bit Quadratic Permutations\' Classification
published pages: 398-404, ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.398-404
IACR Transactions on Symmetric Cryptology 1 2019-07-10
2017 Chaoyun Li and Qingju Wang
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
published pages: 129-155, ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.129-155
IACR Transactions on Symmetric Cryptology 1 2019-07-10
2018 Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N’diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
DAGS: Key encapsulation using dyadic GS codes
published pages: 221-239, ISSN: 1862-2976, DOI: 10.1515/jmc-2018-0027
Journal of Mathematical Cryptology 12/4 2019-07-10
2017 Farshim, Pooya; Orlandi, Claudio; Roşie, Răzvan
Security of Symmetric Primitives under Incorrect Usage of Keys
published pages: 449-473, ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.449-473
IACR Transactions on Symmetric Cryptology 1 2019-07-10
2018 Lacharité, M.-S; Paterson, K.
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data
published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2018.i1.277-313
IACR Transactions on Symmetric Cryptology 2018(1) 277-313 1 2019-07-10
2018 Danilo Šijačić, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede
Towards Efficient and Automated Side Channel Evaluations at Design Time
published pages: 16--1, ISSN: , DOI: 10.29007/mbf3
Kalpa Publications in Computing volume 7 2019-07-10
2017 Guido Bertoni, Marco Martinoli, Maria Chiara Molteni
A Methodology for the Characterisation of Leakages in Combinatorial Logic
published pages: 269-281, ISSN: 2509-3428, DOI: 10.1007/s41635-017-0015-0
Journal of Hardware and Systems Security 1/3 2019-07-10
2019 Ankele, Ralph; Dobraunig, Christoph; Guo, Jian; Lambooij, Eran; Gregor, Leander; Todo, Yosuke
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
published pages: , ISSN: 2519-173X, DOI: 10.5281/zenodo.2593578
IACR Transactions on Symmetric Cryptology 1–43 1 2019-07-10
2018 Li, Lisha; Wang, Shi; Li, Chaoyun; Zeng, Xiangyong
Permutation polynomials (x pm − x + δ) s1 + (x pm − x + δ) s2 + x over Fp n
published pages: , ISSN: 1071-5797, DOI: 10.5281/zenodo.2594493
Finite Fields and Their Applications 51(May 2018) 31-61 1 2019-07-10
2018 Poddebniak, Damian; Dresen, Christian; Müller, Jens; Ising, Fabian; Schinzel, Sebastian; Friedberger, Simon; Somorovsky, Juraj; Somorovsky, Juraj Ruhr University Bochum Schwenk, Jörg
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
published pages: , ISSN: , DOI: 10.5281/zenodo.2594631
1 2019-07-10
2017 Bos, Joppe W.; Friedberger, Simon
Fast Arithmetic Modulo 2xpy±1
published pages: , ISSN: , DOI: 10.5281/zenodo.2594671
1 2019-07-10
2019 Lisha Li, Chaoyun Li, Chunlei Li, Xiangyong Zeng
New classes of complete permutation polynomials
published pages: 177-201, ISSN: 1071-5797, DOI: 10.1016/j.ffa.2018.10.001
Finite Fields and Their Applications 55 2019-07-10
2017 Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Strong 8-bit Sboxes with efficient masking in hardware extended version
published pages: 149-165, ISSN: 2190-8508, DOI: 10.1007/s13389-017-0156-7
Journal of Cryptographic Engineering 7/2 2019-07-10
2018 Marie-Sarah Lacharité
Security of BLS and BGLS signatures in a multi-user setting
published pages: 41-58, ISSN: 1936-2447, DOI: 10.1007/s12095-017-0253-6
Cryptography and Communications 10/1 2019-07-10
2018 Zibi Xiao, Xiangyong Zeng, Chaoyun Li, Yupeng Jiang
Binary sequences with period N and nonlinear complexity N − 2
published pages: , ISSN: 1936-2447, DOI: 10.1007/s12095-018-0324-3
Cryptography and Communications 2019-07-10
2018 Li, Wei; Rijmen, Vincent; Tao, Zhi; Wang, Qingju; Chen, Hua; Liu, Yunwen; Li, Chaoyun; Liu, Ya
Impossible Meet-in-the-middle Fault Analysis on the LED Lightweight Cipher in VANETs
published pages: , ISSN: 1869-1919, DOI: 10.5281/zenodo.2593621
SCIENCE CHINA Information Sciences 1 2019-07-10
2018 Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu
Ciphertext-only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things
published pages: 1-1, ISSN: 1545-5971, DOI: 10.1109/TDSC.2018.2857770
IEEE Transactions on Dependable and Secure Computing 2019-07-10
2018 Joppe Bos, Simon Friedberger
Arithmetic Considerations for Isogeny Based Cryptography
published pages: 1-1, ISSN: 0018-9340, DOI: 10.1109/TC.2018.2851238
IEEE Transactions on Computers 2019-07-10
2019 Gustavo Banegas, Ricardo Custódio, Daniel Panario
A new class of irreducible pentanomials for polynomial-based multipliers in binary fields
published pages: , ISSN: 2190-8508, DOI: 10.1007/s13389-018-0197-6
Journal of Cryptographic Engineering 2019-07-10
2018 Gustavo Banegas and Paulo S. L. M. Barreto and Brice Odilon Boidje and Pierre-Louis Cayrel and Gilbert Ndollane Dione and Kris Gaj and Cheikh Thiecoumba Gueye and Richard Haeussler and Jean Belo Klamti and Ousmane N\'diaye and Duc Tri Nguyen and Edoardo Persichetti and Jefferson E. Ricardini
DAGS: Reloaded Revisiting Dyadic Key Encapsulation
published pages: , ISSN: , DOI:
IACR ePrint archive 2019-07-10
2019 Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini
Designing Efficient Dyadic Operations for Cryptographic Applications
published pages: , ISSN: 1862-2976, DOI:
Journal of Mathematical Cryptology to appear 2019-07-10
2018 Steven Galbraith and Lorenz Panny and Benjamin Smith and Frederik Vercauteren
Quantum Equivalence of the DLP and CDHP for Group Actions
published pages: , ISSN: , DOI:
IACR ePrint 2018/1199 2019-07-10
2018 Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N’diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
DAGS: Key encapsulation using dyadic GS codes
published pages: 221-239, ISSN: 1862-2976, DOI: 10.1515/jmc-2018-0027
Journal of Mathematical Cryptology 12/4 2019-07-10
2019 Thomas Decru and Lorenz Panny and Frederik Vercauteren
Faster SeaSign signatures through improved rejection sampling
published pages: to appear, ISSN: , DOI:
PQCrypto 2019 2019-07-10
2019 Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini
Designing Efficient Dyadic Operations for Cryptographic Applications
published pages: , ISSN: 1862-2976, DOI:
Journal of Mathematical Cryptology to appear 2019-07-10
2017 Farshim, Pooya; Orlandi, Claudio; Roşie, Răzvan
Security of Symmetric Primitives under Incorrect Usage of Keys
published pages: 449-473, ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.449-473
IACR Transactions on Symmetric Cryptology 1 2019-07-10
2017 Chaoyun Li and Qingju Wang
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
published pages: 129-155, ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.129-155
IACR Transactions on Symmetric Cryptology 1 2019-07-10

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "ECRYPT-NET" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "ECRYPT-NET" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.1.3.1.)

SuperCol (2020)

SuperCol: Rational design of super-selective and responsive colloidal particles for biomedical applications

Read More  

NL4XAI (2019)

Interactive Natural Language Technology for Explainable Artificial Intelligence

Read More  

ORBITAL (2019)

Ocular Research By Integrated Training And Learning

Read More