g EiPSI Staff
/ W&I / EiΨ
 

 



General information
Staff
Seminars / Courses
Project involvement
Publications
Education
Press releases
Upcoming /
Past events

Job opportunities
Contact information

Staff


PROFESSOR:

Bernstein, Daniel J.
Etalle, Sandro
(TU Eindhoven / Univ. Twente)

Security and trust management. Security of embedded systems, protocol verification, intrusion detection and risk management.
Lange, Tanja     

Public key cryptography, in particular curve based cryptography and post-quantum cryptography; efficient implementation; side-channel attacks and countermeasures; computational number theory.

PARTTIME PROFESSOR:

Petkovic, Milan    (TU Eindhoven / Philips)

Information security, secure data management, digital rights management, privacy enhancing technology, database security, trust management.

ASSOCIATE PROFESSOR:

Schoenmakers, Berry

Cryptographic protocols and applications.

ASSISTANT PROFESSOR:

Hartog, Jerry den

Security, Smartcards, Formal methods.
Pellikaan, Ruud

Applications of algebraic geometry.
Škorić, Boris

Security with noisy data, collusion-resistant watermarking codes, computations under the encryption.
Weger, Benne de

Computational number theory, public key cryptography, hash functions.
Zannone, Nicola

Security requirements engineering, access control, data protection, risk analysis, formal methods.

POSTDOC:

Niederhagen, Ruben

Cryptography and cryptanalysis on massively parallel systems.
Turkmen, Fatih

Kaluvuri, Samuel

Egner, Alexandru

Veeningen, Meilof

Mobile identity management
Project: Mobiman
Investigating techniques in the area of identity management (privacy policy matching, automated trust negotiation) while taking into account specific demands to make the techniques implementable on mobile devices (light-weightness, usability).

Ph.D. STUDENT:

Boesten, Dion

The CREST project (Collusion RESistant Tracing) investigates the resilience of digital watermarks against coalition attacks. A watermark is a sequence of hidden data embedded in audio/video or other data, and is intended e.g. to trace the origin and distribution of files. A collusion attack is an attempt by multiple people, who each possess a differently marked version of the same file, to remove or distort the watermark.
Costante, Elisa

I am working for the TASł Project. It aims to have a European- wide impact on services based upon personal information¸ which is typically generated over a human lifetime and therefore is collected & stored at distributed locations and used in a multitude of business processes. My research is focused on trust management, user’s perception of trust and measurement of factors influencing trust such as security, privacy and risk.
Because of this, many supply chain projects premised on collaboration through data sharing have failed. In secureSCM, we try to build secure protocols that enables collaborative supply chain management without the risk of leaking relevant data.
Laarhoven, Thijs

Project: SLABAC – Security of Lattice-Based Cryptosystems.
Lattice-based cryptosystems are cryptosystems based on hard problems in lattices, such as finding the shortest vector in a lattice. Using lattice basis reduction, one can
sometimes solve these hard problems and attack these cryptosystems. To estimate the security of these cryptosystems, it is therefore essential we get a better understanding of lattice basis reduction algorithms, such as LLL and BKZ.
Oosterwijk, Jan-Jaap

The CREST project (Collusion RESistant Tracing, ) investigates the resilience of digital watermarks against coalition attacks. The cat-and-mouse game of attack and defense gives rise to nontrivial mathematics, involving combinatorics, coding theory, information theory and broadcast encryption. The practical side is equally complex, with much work in progress on attack strategies, signal processing attacks, optimal code constructions, efficient decoding algorithms, and embedding methods.
Pan, Jing

Side-channel attacks, Javacard application and security.
The project treats the enforcement of security policies running in mobile systems. The goal is to create a framework of technological solutions for trusted deployment and execution of mobile applications in heterogeneous environments.
My focus is on modeling, verification and policy specification design. The techniques developed within this project are aimed at every type of nomadic devices, from smart phones to PDA, from RFID systems to cars, and are of interest for several entities, including mobile platform manufacturers, service and application providers.
Vavilis, Sokratis

Project: THeCs
THeCS project aims to create measurable and enforceable trust. This notion is new for electronic healthcare services and it is fundamental for their success. This project creates new techniques to measure and control the reliability and use of (healthcare) information. These techniques allow users and service providers to trust each other and to benefit from these new services. In a healthcare setting, trust is of special relevance because of the sensitive and personal nature of health information and because of the possibly very adverse consequences of late or incorrect decisions related to one’s health.
Yuksel, Omer


Thaler, Stefan


Alizadeh, Mehdi


Umbreen Sabir, Mian



IT SPECIALIST:

Kortsmit, Wil

SECRETARY:

Matthijsse-van Geenen, Jolande

SECRETARY CRYPTOGRAPHY WORKING GROUP:

Klooster-Derks, Anita


Guests



Asim, Muhammad  (Ph.D. STUDENT)


Founder



Tilborg, Henk van     

Mathematical aspects of coding theory and cryptology,
in particular, coding theory based cryptosystems, authentication codes, broadcast schemes, key scheduling schemes, secret sharing schemes.


Former Members



Simone, Antonino

Collusion-resistant watermarking codes.
Bruso', Mayla

Verification of security protocols. Project: PEARL - Privacy Enhanced security Architecture for RFID Labels.
Hoogh, Sebastiaan de   (Ph.D. STUDENT)

It is a well known fact that collaboration and information sharing in supply chains reduce costs and allow for enhanced optimization. Nevertheless most companies are reluctant to share their data, since its revelation has a negative impact on their bargaining power, and may even benefit the competition.
Areas where the results can directly be applied include digital rights management, biological authentication, threshold cryptography, profile matching, electronic voting, secure data-mining among others.
Jurrius, Relinde (Ph.D. STUDENT)

My reseach is on coding theory. I study weight enumerators of linear codes, and generalizations of this polynomial. Also, I link these to polynomials associated with other mathematical structures, such as matroids, arrangements of hyperplanes and algebraic curves.
Ben Othmane, Lotfi   (POSTDOC)

Security and privacy in vehicular network, self-protecting data, mobile agents security, web services security.
Bisson, Gaetan   (Ph.D. STUDENT)

Computational theory and algorithms related to hyperelliptic pairings with a view toward cryptography.
Brouwer, Andries   (Professor)

Security aspects of Unix and Linux; ethical hacker.
Chatzikokolakis, Kostas   (POSTDOC)

Verification of security protocols, mostly in the area of anonymity and privacy. Also working on process algebras, mainly in a probabilistic setting, and information theory.
Krøigård, Mikkel   (POSTDOC)

Cryptophraphic protocols. In particular, theoretical and practical aspects of multiparty computation.
Liesdonk, Peter van

My research topic is searchable data encryption. This means finding ways to securely store information on an untrusted database server, while still being able to efficiently retrieve specific data. Further interests are pairing-based cryptography, identity-based encryption, provable security and cryptographic protocols.
Lu, Jiqiang   (POSTDOC)

Side-channel analysis, block cipher analysis and hash function analysis.
Peters, Christiane   (Ph.D. STUDENT, graduated cum laude)

My research topic is coding-based cryptography. In particular, I am interested in attacking the McEliece cryptosystem. Furthermore I want to focus on algebraic geometry codes and find out whether they are suitable for cryptographic applications. I am also interested in elliptic curve cryptography; especially in elliptic curves in Edwards form as well as point counting algorithms for elliptic curves over finite fields.
Pontes Soares Rocha, Bruno   (Ph.D. STUDENT)

Security of Services on Mobile Systems
Project: S-Mobile
Schwabe, Peter   (Ph.D. STUDENT, graduated cum laude)

Efficient implementation of cryptographic algorithms, elliptic and hyperelliptic curve cryptography and pairing based cryptography.
Spiessens, Fred   (POSTDOC)

Distributed Trust Management in dynamic coalitions.
Trivellato, Daniel   (Ph.D. STUDENT)

Distributed Trust Management in dynamic coalitions.
Project: POSEIDON

Back to the top of this page.