The page lists 72 projects related to the topic "cryptography".
| # | |||
|---|---|---|---|
| 1 | FOC | Foundations of Cryptographic Hardness | 2015 |
| 2 | FELICITY | Foundations of Efficient Lattice Cryptography | 2015 |
| 3 | CLC | Cryptography with Low Complexity | 2015 |
| 4 | DCM | Distributed Cryptography Module | 2014 |
| 5 | IQCC | Integrated quantum correlation counter | 2015 |
| 6 | HECTOR | HARDWARE ENABLED CRYPTO AND RANDOMNESS | 2015 |
| 7 | HEAT | Homomorphic Encryption Applications and Technology | 2015 |
| 8 | WITDOM | empoWering prIvacy and securiTy in non-trusteD envirOnMents | 2015 |
| 9 | SAFEcrypto | Secure Architectures of Future Emerging Cryptography | 2015 |
| 10 | ECRYPT-CSA | European Coordination and Support Action in Cryptology | 2015 |
| 11 | PQCRYPTO | Post-quantum cryptography for long-term security | 2015 |
| 12 | CC | Combinatorial Construction | 2016 |
| 13 | CREDENTIAL | Secure Cloud Identity Wallet | 2015 |
| 14 | FLYELEC | Quantum Optics with single flying electrons | 2015 |
| 15 | ETAB | Entangled Twin Atom Beams | 2015 |
| 16 | GroupsComputability | Algorithms in algebra and topology | 2015 |
| 17 | ENCASE | EnhaNcing seCurity And privacy in the Social wEb: a user centered approach for the protection of minors | 2016 |
| 18 | 3D-COUNT | 3D-Integrated single photon detector | 2016 |
| 19 | AlmaCrypt | Algorithmic and Mathematical Cryptology | 2016 |
| 20 | ATOM | Advancing the state of the art of MIMO: the key to the successful evolution of wireless networks | 2016 |
| 21 | SOPHIA | Securing Software against Physical Attacks | 2016 |
| 22 | TOCNeT | Teaching Old Crypto New Tricks | 2016 |
| 23 | TempoQ | Temporal Quantum Correlations | 2016 |
| 24 | ESTIA | Exponential sums, translation invariance, and applications | 2016 |
| 25 | SeQuCom | Secure Quantum Communication and Computation | 2017 |
| 26 | LipVerify | Feasibility study on the development of LipVerify - a new viseme based user authentication service. | 2016 |
| 27 | QTOOL | Commercialization of Single-Photon Light Sources | 2016 |
| 28 | EPoCH | Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks | 2016 |
| 29 | QUASYModo | Symmetric Cryptography in the Post-Quantum World | 2017 |
| 30 | FAFC | Foundations and Applications of Functional Cryptography | 2017 |
| 31 | REASSURE | Robust and Efficient Approaches to Evaluating Side Channel and Fault Attack Resilience | 2017 |
| 32 | ERIDIAN | Ensured Randomness Integrity in Device-Independent Networks | 2016 |
| 33 | ROSETTA | Robust self-testing with applications to device-independent cryptography | 2017 |
| 34 | PREP-CRYPTO | Preparing Cryptography for Modern Applications | 2017 |
| 35 | ALGSTRONGCRYPTO | Algebraic Methods for Stronger Crypto | 2017 |
| 36 | ResearchProof | An online digital logbook to protect and prove authorship, and to share scientific results | 2017 |
| 37 | PPSSR | Privacy Preserving Secure Speech Recognition | 2017 |
| 38 | NTSC | New Techniques for Secure Computation | 2017 |
| 39 | REACT | Realizable Advanced Cryptography | 2017 |
| 40 | LightCrypt | New Directions in Lightweight Cryptanalysis | 2017 |
| 41 | QUSCO | Quantum superiority with coherent states | 2018 |
| 42 | BLOCKCHAINSOCIETY | The Disrupted Society: mapping the societal effects of blockchain technology diffusion | 2018 |
| 43 | FutureTPM | Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module | 2018 |
| 44 | FENTEC | Functional Encryption Technologies | 2018 |
| 45 | PROMETHEUS | PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS | 2018 |
| 46 | OLYMPUS | Oblivious identitY Management for Private and User-friendly Services | 2018 |
| 47 | CLOUDMAP | Cloud Computing via Homomorphic Encryption and Multilinear Maps | 2018 |
| 48 | GENIUS | Gaussian entropic inequalities and uncertainty relations for communication and secure quantum key distribution | 2018 |
| 49 | QQT | Identification of quantum resources in thermodynamic systems | 2018 |
| 50 | IDPOQ | Evaluation and implementation of post-quantum cryptographic schemes | 2018 |
| 51 | ESCADA | Energy-optimized Symmetric Cryptography by Algebraic Duality Analysis | 2018 |
| 52 | PIEDMONS | Portable Ion Devices for Mobile-Oriented Next-generation semiconductor Technologies | 2018 |
| 53 | EyeCode | A frictionless two-factor authentication software for secure transactions | 2018 |
| 54 | QMiCS | Quantum Microwave Communcation and Sensing | 2018 |
| 55 | QRANGE | Quantum Random Number Generators: cheaper, faster and more secure | 2018 |
| 56 | REWOCRYPT | Theoretically-Sound Real-World Cryptography | 2019 |
| 57 | EPOQUE | Engineering post-quantum cryptography | 2018 |
| 58 | ASCLEPIOS | Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare | 2018 |
| 59 | Safe-DEED | Safe Data Enabled Economic Development | 2018 |
| 60 | VERICOMP | Foundations of Verifiable Computing | 2019 |
| 61 | IONPEN | Trapped-ion quantum information in 2-dimensional Penning trap arrays | 2019 |
| 62 | SCARE | Side-Channel Aware Engineering | 2018 |
| 63 | CerQuS | Certified Quantum Security | 2019 |
| 64 | SPARTA | Strategic programs for advanced research and technology in Europe | 2019 |
| 65 | LocalGlobal0Cycles | Local-global principles and zero-cycles | 2019 |
| 66 | CRITICAL-CHAINS | IOT- & Blockchain-Enabled Security Framework for New Generation Critical Cyber-Physical Systems In Finance Sector | 2019 |
| 67 | CERQUTE | Certification of quantum technologies | 2020 |
| 68 | SatCV | Satellite CV-QKD | 2019 |
| 69 | StrongPIN | The first mobile app to enable LoA 4 hardware backed security on any existing mobile phone safeguarding the identity and privacy on the everyday digital life in an easy to use and scalable manner | 2019 |
| 70 | KRAKEN | Brokerage and market platform for personal data | 2019 |
| 71 | TNT | Truth-not-Trust | 2020 |
| 72 | MCT | Metacomputational Complexity Theory | 2020 |