Novel technologies like Cloud Computing, Ubiquitous Computing, Big Data, Industry 4.0, and the Internet
of Things do not only come with a huge demand for practical and efficient cryptosystems, but also with many novel attack surfa...
ver más
¿Tienes un proyecto y buscas un partner? Gracias a nuestro motor inteligente podemos recomendarte los mejores socios y ponerte en contacto con ellos. Te lo explicamos en este video
Proyectos interesantes
ECRYPT-NET
European Integrated Research Training Network on Advanced Cr...
4M€
Cerrado
EPoCH
Exploring and Preventing Cryptographic Hardware Backdoors P...
2M€
Cerrado
TIN2017-84844-C2-2-R
MODELOS MATEMATICOS PARA LA SEGURIDAD EN REDES FRENTE A CIBE...
51K€
Cerrado
INTACT
“integrated software toolbox for secure IoT-to-Cloud computi...
7M€
Cerrado
PCIN-2016-010
FORTALECIMIENTO DE LA SEGURIDAD Y PRIVACIDAD DE LOS USUARIOS...
165K€
Cerrado
LightCrypt
New Directions in Lightweight Cryptanalysis
1M€
Cerrado
Información proyecto REWOCRYPT
Duración del proyecto: 65 meses
Fecha Inicio: 2018-10-19
Fecha Fin: 2024-03-31
Fecha límite de participación
Sin fecha límite de participación.
Descripción del proyecto
Novel technologies like Cloud Computing, Ubiquitous Computing, Big Data, Industry 4.0, and the Internet
of Things do not only come with a huge demand for practical and efficient cryptosystems, but also with many novel attack surfaces. The security properties required from cryptographic building blocks for these innovative applications go beyond classical security goals.
Modern theoretical cryptography has very successfully developed powerful techniques that enable the design and rigorous formal analysis of cryptosystems in theoretical security models. Now that these techniques are readily available, we have to take the next important step: the evolution of these techniques from idealized theoretical settings to the demands of real-world applications.
The REWOCRYPT project will tackle this main research challenge at the intersection of theoretical and real-world cryptography. It will provide a solid foundation for the design and mathematically rigorous security analysis of the next generation of cryptosystems that provably meet real-world security requirements and can safely be used to realize secure communication in trustworthy services and products for a modern interconnected society.