Explore the words cloud of the POMEGRANATE project. It provides you a very rough idea of what is the project "POMEGRANATE" about.
The following table provides information about the project.
Coordinator |
KATHOLIEKE UNIVERSITEIT LEUVEN
Organization address contact info |
Coordinator Country | Belgium [BE] |
Project website | https://www.kuleuven.be/english/research/EU/p/horizon2020/es/msca/if-projects/pomegranate |
Total cost | 172˙800 € |
EC max contribution | 172˙800 € (100%) |
Programme |
1. H2020-EU.1.3.2. (Nurturing excellence by means of cross-border and cross-sector mobility) |
Code Call | H2020-MSCA-IF-2015 |
Funding Scheme | MSCA-IF-EF-ST |
Starting year | 2017 |
Duration (year-month-day) | from 2017-09-01 to 2020-08-30 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | KATHOLIEKE UNIVERSITEIT LEUVEN | BE (LEUVEN) | coordinator | 172˙800.00 |
Authenticated-Encryption (AE) algorithms have recently faced an immense increase in popularity as appropriate cryptographic tools for providing data confidentiality and integrity services simultaneously. AE algorithms are ubiquitous in protocols to secure the very fundamentals of the information and communication infrastructure, being adopted into widely-deployed protocols, such as TLS, SSH, IPsec, IEEE 802.11 (Wi-Fi) and ANSI C12.22. A wide range of recently reported security vulnerabilities and exploits, arisen from either using insecure designs to achieve the AE goal or misusing supposedly secure AE schemes, has motivated the cryptographic community to run the CAESAR competition for designing new AE algorithms, boosting research on AE. Yet a critical look at the classical security models for AE, defined over the last decade, that guided the constructions of CAESAR submissions, and a review of practical applications for AE algorithms reveals several inconsistencies and remaining problems that must be carefully investigated before moving towards adoption of next-generation AE schemes for widespread use in governmental, industrial and financial ICT systems.
POMEGRANATE aims to critically rethink the existing security notions and robustness features for AE schemes and to develop fine-grained security models and modular, future-proof design paradigms that can flexibly capture a widening spectrum of disparate requirements in the emerging streaming media applications such as IPTV as well as in future heterogeneous environments such as Internet of Things and Cloud Computing infrastructures. We aim to proactively identify important ongoing challenges and to bridge the gaps between the theory and practice of AE, looking far beyond the design-centric CAESAR competition. Nevertheless, the results will also impact the evaluation and ranking of the CAESAR finalists, as those schemes should offer a set of envisioned new security and robustness needs for future applications.
year | authors and title | journal | last update |
---|---|---|---|
2018 |
Elena Andreeva, Reza Reyhanitabar, Kerem Varici, Damian Vizár Forking a Blockcipher for Authenticated Encryption of Very Short Messages published pages: , ISSN: , DOI: |
Cryptology ePrint Archive Report 2018/916 | 2019-07-26 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "POMEGRANATE" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "POMEGRANATE" are provided by the European Opendata Portal: CORDIS opendata.