Explore the words cloud of the ECRYPT-CSA project. It provides you a very rough idea of what is the project "ECRYPT-CSA" about.
The following table provides information about the project.
Coordinator |
KATHOLIEKE UNIVERSITEIT LEUVEN
Organization address contact info |
Coordinator Country | Belgium [BE] |
Project website | http://www.ecrypt.eu.org/csa/ |
Total cost | 1˙000˙000 € |
EC max contribution | 1˙000˙000 € (100%) |
Programme |
1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT)) |
Code Call | H2020-ICT-2014-1 |
Funding Scheme | CSA |
Starting year | 2015 |
Duration (year-month-day) | from 2015-03-01 to 2018-02-28 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | KATHOLIEKE UNIVERSITEIT LEUVEN | BE (LEUVEN) | coordinator | 329˙000.00 |
2 | RUHR-UNIVERSITAET BOCHUM | DE (BOCHUM) | participant | 172˙000.00 |
3 | TECHNISCHE UNIVERSITEIT EINDHOVEN | NL (EINDHOVEN) | participant | 172˙000.00 |
4 | UNIVERSITY OF BRISTOL | UK (BRISTOL) | participant | 172˙000.00 |
5 | CRYPTOEXPERTS SAS | FR (PARIS) | participant | 155˙000.00 |
This CSA intends to strengthen European excellence in the area of cryptology and to achieve a durable integration and structuring of the European cryptography community, involving academia, industry, government stakeholders and defence agencies. The project will coordinate ongoing research, develop a joint research agenda and foresight study, identify technology gaps and market and innovation opportunities and coordinate and strengthen standardization efforts; it will also address governance of security standards at a European level. The project will tackle through advanced training initiatives the skill shortage of academia and industry. The CSA responds to the growing attention of EU policy makers for societal needs related to privacy and cybersecurity and more in particular the trust and security component of the Digital Agenda for Europe and the European Cyber Security Strategy. The project will help to bridge the gap between academic research on the one hand and standards and industry innovations on the other hand, hereby strengthening the European industrial landscape in a strategic area. The project will result in the availability of more trustworthy security and privacy solutions `made in Europe’, resulting in an increased user trust in ICT and online services and empowerment of users to take control over their data and trust relations. The work will also result in more resilient critical infrastructures and services. The project intends to reach out beyond its constituency to the broader public and to policy makers. The ECYPT-CSA consortium consists of five leading players in cryptographic research, including one SME. In order to ensure the involvement of the broader community, the project will build on a Research Advisory Board consisting of leading European researchers and a Strategic Advisory Board with leading experts from the security industry and relevant government actors.
Workshop on Multilinear Maps and Obfuscation | Other | 2019-04-18 14:33:22 |
Workshop on Tools for Security Modelling and Proofs | Other | 2019-04-18 14:33:24 |
Report on hot topics (technology driven) RP1 | Documents, reports | 2019-03-11 14:26:00 |
Workshop on Symmetric cryptography designed for side channel and fault resistance | Other | 2019-03-11 14:25:30 |
Final Report on hot topics (technology driven) | Documents, reports | 2019-03-11 14:25:30 |
Workshop on Cryptographic standards and evaluations | Other | 2019-03-11 14:26:03 |
Key length and algorithm consultation rep | Documents, reports | 2019-03-11 14:25:54 |
Final Report on application areas (application driven) | Documents, reports | 2019-03-11 14:25:23 |
School on symmetric cryptography: design, cryptanalysis and implementations | Other | 2019-03-11 14:25:47 |
Workshop on Random Number Generation | Other | 2019-03-11 14:25:38 |
Final Management Report | Documents, reports | 2019-03-11 14:25:14 |
Final Research agenda and foresight study | Documents, reports | 2019-03-11 14:25:22 |
Workshop on Cryptocurrencies | Other | 2019-03-11 14:25:11 |
Workshop on Software benchmarking | Other | 2019-03-11 14:25:55 |
Workshop on Privacy Enhancing Technologies | Other | 2019-03-11 14:25:12 |
Workshop on Computing on Encrypted Data | Other | 2019-02-27 09:49:44 |
Final Dissemination Plan | Documents, reports | 2019-02-27 09:48:38 |
Final Report on standardisation | Documents, reports | 2019-02-26 17:46:22 |
Workshop in Internet of Things | Other | 2019-02-26 17:46:10 |
Intermediate Research agenda and foresight study | Documents, reports | 2019-02-26 17:45:52 |
Workshop on Cryptographic protocols with complex functionalities | Other | 2019-02-26 17:46:07 |
Report on application areas (application driven) RP1 | Documents, reports | 2019-02-26 17:45:52 |
Report on standardisation RP1 | Documents, reports | 2019-02-26 17:46:04 |
Workshop on Post-quantum cryptography (including lattices) | Other | 2019-02-26 17:46:16 |
Workshop on Authenticated encryption | Other | 2019-02-26 17:46:07 |
School on post-quantum cryptography | Other | 2019-02-27 09:49:45 |
Workshop on Tools for asymmetric cryptanalysis | Other | 2019-02-27 09:49:02 |
Workshop on Security evaluation of implementations | Other | 2019-02-27 09:49:11 |
Final Key length and algorithm consultation report | Documents, reports | 2019-02-26 17:46:21 |
School on societal aspects of cryptology and on business and innovation in cryptology | Other | 2019-02-26 17:46:19 |
Workshop on Ultra low energy/power cryptography | Other | 2019-02-27 09:49:18 |
Intermediate Dissemination Plan | Documents, reports | 2019-02-26 17:46:07 |
Intermediate Communication Plan | Documents, reports | 2019-02-26 17:46:00 |
School on cryptographic modelling | Other | 2019-02-26 17:46:10 |
Workshop on Post-Snowden crypto for the Internet | Other | 2019-02-26 17:46:07 |
Periodic Management Report RP1 | Documents, reports | 2019-02-26 17:46:07 |
Workshop on Evaluation of symmetric standards | Other | 2019-02-26 17:46:01 |
Workshop on Cryptographic protocols for small devices | Other | 2019-02-26 17:45:49 |
Workshop on Hardware benchmarking | Other | 2019-02-26 17:46:12 |
Final Communication Plan | Documents, reports | 2019-02-27 09:48:50 |
Take a look to the deliverables list in detail: detailed list of ECRYPT-CSA deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2016 |
Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar,
Peter Schwabe, Ralf Zimmermann Faster elliptic-curve discrete logarithms on FP-GAs published pages: , ISSN: , DOI: |
eprint | 2019-05-30 |
2015 |
Daniel J. Bernstein, Tanja Lange Failures in NIST\'s ECC standards published pages: , ISSN: , DOI: |
NIST | 2019-05-30 |
2015 |
Elena Andreeva, Bart Mennink, Bart Preneel Open problems in hash function security published pages: 611-631, ISSN: 0925-1022, DOI: 10.1007/s10623-015-0096-0 |
Designs, Codes and Cryptography 77/2-3 | 2019-05-30 |
2015 |
Atul Luykx, Bart Mennink, Bart Preneel, Laura Winnen Two-permutation-based hashing with binary mixing published pages: , ISSN: 1862-2976, DOI: 10.1515/jmc-2015-0015 |
Journal of Mathematical Cryptology 9/3 | 2019-05-30 |
2016 |
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vreden-
daal \"\"\"NTRU Prime.\"\" \" published pages: , ISSN: , DOI: |
eprint | 2019-05-30 |
2015 |
Marijn Scheir, Josep Balasch, Alfredo Rial, Bart Preneel, Ingrid Verbauwhede Anonymous Split E-Cash—Toward Mobile Anonymous Payments published pages: 1-25, ISSN: 1539-9087, DOI: 10.1145/2783439 |
ACM Transactions on Embedded Computing Systems 14/4 | 2019-05-30 |
2015 |
Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis published pages: 889-902, ISSN: 0278-0070, DOI: 10.1109/TCAD.2014.2370531 |
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34/6 | 2019-05-30 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "ECRYPT-CSA" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "ECRYPT-CSA" are provided by the European Opendata Portal: CORDIS opendata.
Multibeam Femtosecond Laser System for High Throughput Micro-drilling of HLFC Structures
Read More