EU - ECRYPT II - European network of excellence in cryptology - Phase II

  • Schmidt, Jörn-Marc (Teilnehmer (Co-Investigator))
  • Nad, Tomislav (Teilnehmer (Co-Investigator))
  • Kirschbaum, Mario (Teilnehmer (Co-Investigator))
  • Feldhofer, Martin (Teilnehmer (Co-Investigator))
  • Schläffer, Martin (Teilnehmer (Co-Investigator))
  • Aigner, Manfred Josef (Teilnehmer (Co-Investigator))
  • Rechberger, Christian (Teilnehmer (Co-Investigator))
  • Lamberger, Mario (Teilnehmer (Co-Investigator))
  • Tillich, Stefan (Teilnehmer (Co-Investigator))
  • Medwed, Marcel (Teilnehmer (Co-Investigator))
  • Hutter, Michael (Teilnehmer (Co-Investigator))
  • Rijmen, Vincent (Teilnehmer (Co-Investigator))
  • Mendel, Florian (Teilnehmer (Co-Investigator))
  • Posch, Reinhard (Projektleiter (Principal Investigator))

Projekt: Forschungsprojekt

Projektdetails

Beschreibung

ECRYPT II is a NoE in the area of cryptology with a duration of 48 months. Cryptology is the science that studies mathematical techniques in order to provide secrecy, authenticity and related properties for digital information including the secure implementations of these techniques. It is an interdisciplinary research area with a high strategic impact for European industry and for the society as a whole. It is a fundamental enabler for secure, dependable and trusted infrastructures.

The ECRYPT II research roadmap is motivated by the changing environment and threat models in which cryptology is deployed, by the gradual erosion of the computational difficulty of the mathematical problems on which cryptology is based, and by the requirements of new applications and cryptographic implementations. Its main objective is to ensure a durable integration of European research in both academia and industry and to maintain and strengthen the European excellence in these areas. In order to reach this goal, 11 leading players propose to integrate their research capabilities within three virtual labs focusing on symmetric key algorithms, public key algorithms and protocols, and hardware and software implementation.

They will be joined by more than 20 adjoint members to the network who will closely collaborate with the core partners. ECRYPT II plans to build on an expand the integration activities developed within ECRYPT that include joint workshops, exchange of researchers and students, development of common tools and benchmarks and a website and forum which will be a focal point for the network and the wider cryptographic community. Spreading activities will include a training program, a substantial contribution towards standardization, bodies and an active publication policy. The project team has the critical mass and breadth to address the key questions in these areas.
StatusAbgeschlossen
Tatsächlicher Beginn/ -es Ende1/08/0831/01/13

Fingerprint

Erkunden Sie die Forschungsthemen, die von diesem Projekt angesprochen werden. Diese Bezeichnungen werden den ihnen zugrunde liegenden Bewilligungen/Fördermitteln entsprechend generiert. Zusammen bilden sie einen einzigartigen Fingerprint.
  • Collisions for the WIDEA-8 Compression Function

    Mendel, F., Rijmen, V., Toz, D. & Varici, K., 2013, Topics in Cryptology - CT-RSA 2013. Berlin; Heidelberg: Springer, S. 162-173 (Lecture Notes in Computer Science; Band 7779).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

    Open Access
    Datei
  • Efficient Vector Implementations of AES-based Designs: A Case Study and New Implementations for Grøstl

    Holzer-Graf, S., Krinninger, T., Pernull, M. A., Schläffer, M., Schwabe, P., Seywald, D. & Wieser, W., 2013, Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013x^x. S. 145-161 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band LNCS 7779).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

    Datei
  • Finding Collisions for Round-Reduced SM3

    Mendel, F., Nad, T. & Schläffer, M., 2013, Topics in Cryptology - CT-RSA 2013. Berlin; Heidelberg: Springer, S. 174-188 (Lecture Notes in Computer Science; Band 7779).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

    Open Access
    Datei