Applied Cryptography

Applied Cryptography

Ein rotes Schloss mit Zahlen und Buchstaben – © https://stock.adobe.com/de/images/security-concept-with-a-lock/47331314

As today's world gets more and more connected, several parties with potentially conflicting interests need to interact with each other in a provably secure and privacy-preserving way. This can be achieved by means of cryptographic protocols.

We are doing research on:

  • Anonymity- and Privacy-Enhancing Protocols – including RFID Systems
  • Automatic Generation of Cryptographic Protocols / Cryptographic Compilers
  • Cryptographic Primitives and Protocols based on Hardware – including Physically Unclonable Functions (PUFs)
  • Secure Attestation and Identification Protocols
  • Secure Two-Party Computation Protocols (see TASTY Project)

Related Projects