Opendata, web and dolomites

H2020 projects about "cryptographic"

The page lists 77 projects related to the topic "cryptographic".

# achronym  title  year 
1 FOC Foundations of Cryptographic Hardness 2015
2 FELICITY Foundations of Efficient Lattice Cryptography 2015
3 CLC Cryptography with Low Complexity 2015
4 DCM Distributed Cryptography Module 2014
5 ECRYPT-NET European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud 2015
6 HECTOR HARDWARE ENABLED CRYPTO AND RANDOMNESS 2015
7 HEAT Homomorphic Encryption Applications and Technology 2015
8 TREDISEC Trust-aware, REliable and Distributed Information SEcurity in the Cloud. 2015
9 SCISSOR Security In trusted SCADA and smart-grids 2015
10 SAFEcrypto Secure Architectures of Future Emerging Cryptography 2015
11 PRISMACLOUD PRIvacy and Security MAintaining services in the CLOUD 2015
12 ECRYPT-CSA European Coordination and Support Action in Cryptology 2015
13 PQCRYPTO Post-quantum cryptography for long-term security 2015
14 SPOOC Automated Security Proofs of Cryptographic Protocols: Privacy, Untrusted Platforms and Applications to E-voting Protocols 2015
15 PANORAMIX Privacy and Accountability in Networks via Optimized Randomized Mix-nets 2015
16 DSTB Dyadic Secures The Breach 2015
17 MPCPRO Better MPC Protocols in Theory and in Practice 2015
18 Excalibur 2.0 Revolutionary trustworthy platform for seamless authentication of Internet users 2015
19 KMaaS Key Management as-a-Service 2016
20 QINTERNET Quantum communication networks 2016
21 SOPHIA Securing Software against Physical Attacks 2016
22 CIRCUS An end-to-end verification architecture for building Certified Implementations of Robust, Cryptographically Secure web applications 2016
23 POMEGRANATE Practice-Oriented Security Models and Granular Designs for Future-Proof Authenticated Encryption 2017
24 GenoPri Quantifying and Protecting the Privacy of Genomic Data 2016
25 QCALL Quantum Communications for ALL 2016
26 Cathedral Post-Snowden Circuits and Design Methods for Security 2016
27 EPoCH Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks 2016
28 FAFC Foundations and Applications of Functional Cryptography 2017
29 REASSURE Robust and Efficient Approaches to Evaluating Side Channel and Fault Attack Resilience 2017
30 POPSTAR Reasoning about Physical properties Of security Protocols with an Application To contactless Systems 2017
31 SWORD Security Without Obscurity for Reliable Devices 2017
32 BROS Blockchain: a new framework for swarm RObotic Systems 2017
33 PREP-CRYPTO Preparing Cryptography for Modern Applications 2017
34 UFICS-QRNG Development of an Ultra-Fast, Integrated, Certified Secure Quantum Random Number Generator for applications in Science and Information Technology 2017
35 SEAL Sound and Early Assessment of Leakage for Embedded Software 2017
36 CASCAde Confidentiality-preserving Security Assurance 2017
37 ALGSTRONGCRYPTO Algebraic Methods for Stronger Crypto 2017
38 CerQUIT Certifying Large-scale Quantum Information Technologies 2018
39 NTSC New Techniques for Secure Computation 2017
40 REACT Realizable Advanced Cryptography 2017
41 FutureTPM Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module 2018
42 PRIViLEDGE Privacy-Enhancing Cryptography in Distributed Ledgers 2018
43 PROMETHEUS PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS 2018
44 OLYMPUS Oblivious identitY Management for Private and User-friendly Services 2018
45 CLOUDMAP Cloud Computing via Homomorphic Encryption and Multilinear Maps 2018
46 IDPOQ Evaluation and implementation of post-quantum cryptographic schemes 2018
47 CoHuBiCoL Counting as a Human Being in the Era of Computational Law 2019
48 EyeCode A frictionless two-factor authentication software for secure transactions 2018
49 Be12 A cyphered cloud based DataBank for the corporate sector 2018
50 Blocknetwork Blocknetwork - Fusing Big Data and Implementing Novel Cyber Security Solutions 2018
51 INCOGNITO IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online services 2019
52 SPEC Secure, Private, Efficient Multiparty Computation 2019
53 QRANGE Quantum Random Number Generators: cheaper, faster and more secure 2018
54 REWOCRYPT Theoretically-Sound Real-World Cryptography 2019
55 EPOQUE Engineering post-quantum cryptography 2018
56 ASCLEPIOS Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare 2018
57 Safe-DEED Safe Data Enabled Economic Development 2018
58 PANACEA Protection and privAcy of hospital and health iNfrastructures with smArt Cyber sEcurity and cyber threat toolkit for dAta and people 2019
59 VERICOMP Foundations of Verifiable Computing 2019
60 SCARE Side-Channel Aware Engineering 2018
61 CerQuS Certified Quantum Security 2019
62 BitBox BitBox Enterprise - Enterprise-grade Solution for Digital Assets Custody 2019
63 KIProtect KIProtect: The security layer for data science and artificial intelligence 2019
64 inCREASE Coding for Security and DNA Storage 2019
65 CERQUTE Certification of quantum technologies 2020
66 SatCV Satellite CV-QKD 2019
67 ACCORD Accelerated Ordering Service for Distributed Ledgers 2019
68 MAMONET Massive MIMO for Securing Internet of Things Networks 2020
69 QuanTELCO Quantum Emitters for Telecommunication in the O-Band 2019
70 AlgoQIP Beyond Shannon: Algorithms for optimal information processing 2020
71 Ngrave The World’s Most Secure Cryptocurrency Safeguarding Solution 2019
72 ARCAone Next generation security platform to safeguard critical applications and sensitive digital assets 2019
73 TRIDENT TRIDENT ELASTIC HSM PLATFORM 2020
74 DiFacturo The Unique International Independent Decentralized Invoice Network 2019
75 CIPHRA CIPHRA 2020
76 HSS Homomorphic Secret Sharing: Secure Computation and Beyond 2020
77 MCT Metacomputational Complexity Theory 2020