Explore the words cloud of the ECRYPT-NET project. It provides you a very rough idea of what is the project "ECRYPT-NET" about.
The following table provides information about the project.
Coordinator |
KATHOLIEKE UNIVERSITEIT LEUVEN
Organization address contact info |
Coordinator Country | Belgium [BE] |
Project website | http://www.ecrypt.eu.org/net/ |
Total cost | 3˙893˙199 € |
EC max contribution | 3˙893˙199 € (100%) |
Programme |
1. H2020-EU.1.3.1. (Fostering new skills by means of excellent initial training of researchers) |
Code Call | H2020-MSCA-ITN-2014 |
Funding Scheme | MSCA-ITN-ETN |
Starting year | 2015 |
Duration (year-month-day) | from 2015-03-01 to 2019-02-28 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | KATHOLIEKE UNIVERSITEIT LEUVEN | BE (LEUVEN) | coordinator | 501˙120.00 |
2 | ROYAL HOLLOWAY AND BEDFORD NEW COLLEGE | UK (EGHAM) | participant | 546˙575.00 |
3 | UNIVERSITY OF BRISTOL | UK (BRISTOL) | participant | 546˙575.00 |
4 | ECOLE NORMALE SUPERIEURE | FR (PARIS CEDEX 05) | participant | 525˙751.00 |
5 | TECHNISCHE UNIVERSITEIT EINDHOVEN | NL (EINDHOVEN) | participant | 510˙748.00 |
6 | NXP SEMICONDUCTORS BELGIUM NV | BE (LEUVEN) | participant | 501˙120.00 |
7 | RUHR-UNIVERSITAET BOCHUM | DE (BOCHUM) | participant | 498˙432.00 |
8 | CRYPTOEXPERTS SAS | FR (PARIS) | participant | 262˙875.00 |
9 | IBM RESEARCH GMBH | CH (RUESCHLIKON) | partner | 0.00 |
10 | INTRINSIC ID B.V. | NL (EINDHOVEN) | partner | 0.00 |
11 | Mastercard International Incorporated | UK (London) | partner | 0.00 |
12 | NEC EUROPE LTD | UK (LONDON) | partner | 0.00 |
13 | ORANGE SA | FR (PARIS) | partner | 0.00 |
14 | RISCURE BV | NL (DELFT) | partner | 0.00 |
15 | Thales research and Technology Ltd | UK (ADDLESTONE) | partner | 0.00 |
The goal of this ETN is to develop advanced cryptographic techniques for the Internet of Things and the Cloud and to create implementations that offer a high level of security and increased usability, for a wide range of physical computation platforms. The ITN will equip a group of 15 early stage researchers with a set of interdisciplinary skills combining mathematics, computer science and electrical engineering that will allow them to create advanced cryptographic solutions that will be available for commercial applications. The 8 partners (including 2 companies) are leading research teams in the area of applied cryptology with a strong track record of collaboration; it is complemented by 6 partner organisations from industry (including 2 SMEs).The training from the ERSs will be guided by a personal development plan. A central component is training by research supported by an intensive program of workshops, summer schools, seminars, research visits, and secondments. The training will be complemented with transferable skills that also support the transfer of research to an industrial context. The management structure of the project is built on a pro-active approach with responsibilization of the fellows. The dissemination and outreach of the project activities target a broad range of stakeholders. The ITN contributes to the ERA by helping to overcome the fragmentation in the area of applied cryptology. The research supports the trust and security component of the Digital Agenda for Europe and responds to the growing attention of EU policy makers for societal needs related to privacy and cybersecurity. The societal relevance and timeliness of this research has been emphasized by revelations made by Snowden, that provide clear evidence of mass surveillance by nation states and of serious weaknesses of our current infrastructure. An essential component of a response to these revelations consists a broad deployment of advanced and innovative cryptographic techniques.
Final Report on Dissemination, Press and Outreach Strategy | Documents, reports | 2019-07-22 16:49:48 |
Yearly report on training Y4 | Documents, reports | 2019-07-22 16:49:43 |
Yearly report on training Y3 | Documents, reports | 2019-07-22 16:50:11 |
Awarding of doctoral degrees | Documents, reports | 2019-07-22 16:49:53 |
Final Career Development Plan Y4 | Documents, reports | 2019-07-22 16:49:45 |
Tech report on Implementation results | Documents, reports | 2019-07-22 16:50:17 |
Technical report on Final designs and implementations | Documents, reports | 2019-07-22 16:49:57 |
Career Development Plan Y3 | Documents, reports | 2019-07-22 16:49:48 |
Half way Review of Dissemination, Press and Outreach Strategy | Documents, reports | 2019-07-10 14:20:49 |
Dissemination, Press and Outreach Strategy | Documents, reports | 2019-07-10 14:20:49 |
Yearly report on training Y1 | Documents, reports | 2019-07-10 14:20:49 |
Supervisory Board of the network | Other | 2019-07-10 14:20:49 |
Technical Report on Requirements and design constraints for IoT and Cloud | Documents, reports | 2019-07-10 14:20:49 |
Career Development Plan Y1 | Documents, reports | 2019-07-10 14:20:49 |
Technical Report on First designs for IoT and the Cloud | Documents, reports | 2019-07-10 14:20:49 |
ESRs declarations | Other | 2019-07-10 14:20:49 |
Network public website | Websites, patent fillings, videos etc. | 2019-07-10 14:20:49 |
Progress Report | Documents, reports | 2019-07-10 14:20:49 |
Yearly report on training Y2 | Documents, reports | 2019-07-10 14:20:49 |
Career Development Plan Y2 | Documents, reports | 2019-07-10 14:20:49 |
Draft Periodic Report | Documents, reports | 2019-07-10 14:20:49 |
Overall Recruitment | Other | 2019-07-10 14:20:49 |
Take a look to the deliverables list in detail: detailed list of ECRYPT-NET deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2017 |
Dušan Božilov, Begül Bilgin, Hacı Ali Sahin A Note of 5-bit Quadratic Permutations\' Classification published pages: 398-404, ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.398-404 |
IACR Transactions on Symmetric Cryptology 1 | 2019-07-10 |
2017 |
Chaoyun Li and Qingju Wang Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices published pages: 129-155, ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.129-155 |
IACR Transactions on Symmetric Cryptology 1 | 2019-07-10 |
2018 |
Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N’diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini DAGS: Key encapsulation using dyadic GS codes published pages: 221-239, ISSN: 1862-2976, DOI: 10.1515/jmc-2018-0027 |
Journal of Mathematical Cryptology 12/4 | 2019-07-10 |
2017 |
Farshim, Pooya; Orlandi, Claudio; Roşie, Răzvan Security of Symmetric Primitives under Incorrect Usage of Keys published pages: 449-473, ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.449-473 |
IACR Transactions on Symmetric Cryptology 1 | 2019-07-10 |
2018 |
Lacharité, M.-S; Paterson, K. Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data published pages: , ISSN: 2519-173X, DOI: 10.13154/tosc.v2018.i1.277-313 |
IACR Transactions on Symmetric Cryptology 2018(1) 277-313 1 | 2019-07-10 |
2018 |
Danilo Å ijaÄić, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede Towards Efficient and Automated Side Channel Evaluations at Design Time published pages: 16--1, ISSN: , DOI: 10.29007/mbf3 |
Kalpa Publications in Computing volume 7 | 2019-07-10 |
2017 |
Guido Bertoni, Marco Martinoli, Maria Chiara Molteni A Methodology for the Characterisation of Leakages in Combinatorial Logic published pages: 269-281, ISSN: 2509-3428, DOI: 10.1007/s41635-017-0015-0 |
Journal of Hardware and Systems Security 1/3 | 2019-07-10 |
2019 |
Ankele, Ralph; Dobraunig, Christoph; Guo, Jian; Lambooij, Eran; Gregor, Leander; Todo, Yosuke Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion published pages: , ISSN: 2519-173X, DOI: 10.5281/zenodo.2593578 |
IACR Transactions on Symmetric Cryptology 1–43 1 | 2019-07-10 |
2018 |
Li, Lisha; Wang, Shi; Li, Chaoyun; Zeng, Xiangyong Permutation polynomials (x pm − x + δ) s1 + (x pm − x + δ) s2 + x over Fp n published pages: , ISSN: 1071-5797, DOI: 10.5281/zenodo.2594493 |
Finite Fields and Their Applications 51(May 2018) 31-61 1 | 2019-07-10 |
2018 |
Poddebniak, Damian; Dresen, Christian; Müller, Jens; Ising, Fabian; Schinzel, Sebastian; Friedberger, Simon; Somorovsky, Juraj; Somorovsky, Juraj Ruhr University Bochum Schwenk, Jörg Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels published pages: , ISSN: , DOI: 10.5281/zenodo.2594631 |
1 | 2019-07-10 |
2017 |
Bos, Joppe W.; Friedberger, Simon Fast Arithmetic Modulo 2xpy±1 published pages: , ISSN: , DOI: 10.5281/zenodo.2594671 |
1 | 2019-07-10 |
2019 |
Lisha Li, Chaoyun Li, Chunlei Li, Xiangyong Zeng New classes of complete permutation polynomials published pages: 177-201, ISSN: 1071-5797, DOI: 10.1016/j.ffa.2018.10.001 |
Finite Fields and Their Applications 55 | 2019-07-10 |
2017 |
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider Strong 8-bit Sboxes with efficient masking in hardware extended version published pages: 149-165, ISSN: 2190-8508, DOI: 10.1007/s13389-017-0156-7 |
Journal of Cryptographic Engineering 7/2 | 2019-07-10 |
2018 |
Marie-Sarah Lacharité Security of BLS and BGLS signatures in a multi-user setting published pages: 41-58, ISSN: 1936-2447, DOI: 10.1007/s12095-017-0253-6 |
Cryptography and Communications 10/1 | 2019-07-10 |
2018 |
Zibi Xiao, Xiangyong Zeng, Chaoyun Li, Yupeng Jiang Binary sequences with period N and nonlinear complexity N − 2 published pages: , ISSN: 1936-2447, DOI: 10.1007/s12095-018-0324-3 |
Cryptography and Communications | 2019-07-10 |
2018 |
Li, Wei; Rijmen, Vincent; Tao, Zhi; Wang, Qingju; Chen, Hua; Liu, Yunwen; Li, Chaoyun; Liu, Ya Impossible Meet-in-the-middle Fault Analysis on the LED Lightweight Cipher in VANETs published pages: , ISSN: 1869-1919, DOI: 10.5281/zenodo.2593621 |
SCIENCE CHINA Information Sciences 1 | 2019-07-10 |
2018 |
Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu Ciphertext-only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things published pages: 1-1, ISSN: 1545-5971, DOI: 10.1109/TDSC.2018.2857770 |
IEEE Transactions on Dependable and Secure Computing | 2019-07-10 |
2018 |
Joppe Bos, Simon Friedberger Arithmetic Considerations for Isogeny Based Cryptography published pages: 1-1, ISSN: 0018-9340, DOI: 10.1109/TC.2018.2851238 |
IEEE Transactions on Computers | 2019-07-10 |
2019 |
Gustavo Banegas, Ricardo Custódio, Daniel Panario A new class of irreducible pentanomials for polynomial-based multipliers in binary fields published pages: , ISSN: 2190-8508, DOI: 10.1007/s13389-018-0197-6 |
Journal of Cryptographic Engineering | 2019-07-10 |
2018 |
Gustavo Banegas and Paulo S. L. M. Barreto and Brice Odilon Boidje and Pierre-Louis Cayrel and Gilbert Ndollane Dione and Kris Gaj and Cheikh Thiecoumba Gueye and Richard Haeussler and Jean Belo Klamti and Ousmane N\'diaye and Duc Tri Nguyen and Edoardo Persichetti and Jefferson E. Ricardini DAGS: Reloaded Revisiting Dyadic Key Encapsulation published pages: , ISSN: , DOI: |
IACR ePrint archive | 2019-07-10 |
2019 |
Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini Designing Efficient Dyadic Operations for Cryptographic Applications published pages: , ISSN: 1862-2976, DOI: |
Journal of Mathematical Cryptology to appear | 2019-07-10 |
2018 |
Steven Galbraith and Lorenz Panny and Benjamin Smith and Frederik Vercauteren Quantum Equivalence of the DLP and CDHP for Group Actions published pages: , ISSN: , DOI: |
IACR ePrint 2018/1199 | 2019-07-10 |
2018 |
Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N’diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini DAGS: Key encapsulation using dyadic GS codes published pages: 221-239, ISSN: 1862-2976, DOI: 10.1515/jmc-2018-0027 |
Journal of Mathematical Cryptology 12/4 | 2019-07-10 |
2019 |
Thomas Decru and Lorenz Panny and Frederik Vercauteren Faster SeaSign signatures through improved rejection sampling published pages: to appear, ISSN: , DOI: |
PQCrypto 2019 | 2019-07-10 |
2019 |
Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini Designing Efficient Dyadic Operations for Cryptographic Applications published pages: , ISSN: 1862-2976, DOI: |
Journal of Mathematical Cryptology to appear | 2019-07-10 |
2017 |
Farshim, Pooya; Orlandi, Claudio; Roşie, Răzvan Security of Symmetric Primitives under Incorrect Usage of Keys published pages: 449-473, ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.449-473 |
IACR Transactions on Symmetric Cryptology 1 | 2019-07-10 |
2017 |
Chaoyun Li and Qingju Wang Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices published pages: 129-155, ISSN: 2519-173X, DOI: 10.13154/tosc.v2017.i1.129-155 |
IACR Transactions on Symmetric Cryptology 1 | 2019-07-10 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "ECRYPT-NET" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "ECRYPT-NET" are provided by the European Opendata Portal: CORDIS opendata.