g EiPSI Staff
/ W&I / EiΨ


General information
Seminars / Courses
Project involvement
Press releases
Upcoming /
Past events

Job opportunities
Contact information



Bernstein, Daniel J.
Etalle, Sandro
(TU Eindhoven / Univ. Twente)

Security and trust management. Security of embedded systems, protocol verification, intrusion detection and risk management.
Lange, Tanja      Scientific Director

Public key cryptography, in particular curve based cryptography and post-quantum cryptography; efficient implementation; side-channel attacks and countermeasures; computational number theory.


Petkovic, Milan    (TU Eindhoven / Philips)

Information security, secure data management, digital rights management, privacy enhancing technology, database security, trust management.


Schoenmakers, Berry

Cryptographic protocols and applications.


Hartog, Jerry den

Security, Smartcards, Formal methods.
Pellikaan, Ruud

Applications of algebraic geometry.
Škorić, Boris

Security with noisy data, collusion-resistant watermarking codes, computations under the encryption.
Weger, Benne de

Computational number theory, public key cryptography, hash functions.
Zannone, Nicola

Security requirements engineering, access control, data protection, risk analysis, formal methods.


Egner, Alexandru

Huelsing, Andreas

My research focuses on digital signature schemes that can withstand quantum-computer aided attacks. I am interested in the more theoretical topic of constructing digital signature schemes as well as in the applications of these schemes. So far, I spent most of my time working on hash-based signature schemes. On the more applied side, I was working on improvements of current PKI solutions, especially in the context of long-term security. I also got some side-projects on lattice-based cryptography and quantum cryptography.
Kaluvuri, Samuel

Niederhagen, Ruben

Cryptography and cryptanalysis on massively parallel systems.
Turkmen, Fatih


Alizadeh, Mehdi

Appelbaum, Jacob

Banegas, Gustavo S.

Chou, Tony

Efficient software implementation for post-quantum cryptography and elliptic curve cryptography.
Chuengsatiansup, Chitchanok

Short description of my research area: Elliptic and hyperelliptic curves, pairing-based cryptography, efficient implementation.
Costante, Elisa

I am working for the TASł Project. It aims to have a European- wide impact on services based upon personal information¸ which is typically generated over a human lifetime and therefore is collected & stored at distributed locations and used in a multitude of business processes. My research is focused on trust management, user’s perception of trust and measurement of factors influencing trust such as security, privacy and risk.
Because of this, many supply chain projects premised on collaboration through data sharing have failed. In secureSCM, we try to build secure protocols that enables collaborative supply chain management without the risk of leaking relevant data.
Laarhoven, Thijs

Project: SLABAC – Security of Lattice-Based Cryptosystems.
Lattice-based cryptosystems are cryptosystems based on hard problems in lattices, such as finding the shortest vector in a lattice. Using lattice basis reduction, one can
sometimes solve these hard problems and attack these cryptosystems. To estimate the security of these cryptosystems, it is therefore essential we get a better understanding of lattice basis reduction algorithms, such as LLL and BKZ.
Oosterwijk, Jan-Jaap

The CREST project (Collusion RESistant Tracing, ) investigates the resilience of digital watermarks against coalition attacks. The cat-and-mouse game of attack and defense gives rise to nontrivial mathematics, involving combinatorics, coding theory, information theory and broadcast encryption. The practical side is equally complex, with much work in progress on attack strategies, signal processing attacks, optimal code constructions, efficient decoding algorithms, and embedding methods.
Pan, Jing

Side-channel attacks, Javacard application and security.
The project treats the enforcement of security policies running in mobile systems. The goal is to create a framework of technological solutions for trusted deployment and execution of mobile applications in heterogeneous environments.
My focus is on modeling, verification and policy specification design. The techniques developed within this project are aimed at every type of nomadic devices, from smart phones to PDA, from RFID systems to cars, and are of interest for several entities, including mobile platform manufacturers, service and application providers.
Thaler, Stefan

Umbreen Sabir, Mian

Utomo, Putranto Haidi

I am currently working on the Erasure Decoding Problem.
Valence, Henry de

Vavilis, Sokratis

Project: THeCs
THeCS project aims to create measurable and enforceable trust. This notion is new for electronic healthcare services and it is fundamental for their success. This project creates new techniques to measure and control the reliability and use of (healthcare) information. These techniques allow users and service providers to trust each other and to benefit from these new services. In a healthcare setting, trust is of special relevance because of the sensitive and personal nature of health information and because of the possibly very adverse consequences of late or incorrect decisions related to one’s health.
Vredendaal van, Christine

The focus of my research is speeding up class group computations. These computations are a tool to break ideal-lattice-based cryptosystems. Lattice-based cryptosystems are systems based on the hardness of solving certain problems in lattices. By optimizing the implementation of the class group computations, we solve these problems faster and reduce the security of the system.
Yuksel, Omer


Klooster-Derks, Anita
Matthijsse-van Geenen, Jolande


Asim, Muhammad  (Ph.D. STUDENT)


Tilborg, Henk van     

Mathematical aspects of coding theory and cryptology,
in particular, coding theory based cryptosystems, authentication codes, broadcast schemes, key scheduling schemes, secret sharing schemes.


Bauch, Jens-Dietrich (POSTDOC)

My research interests focus on algorithms in number theory and algebraic geometry. Currently, I am trying to improve the basic arithmetic in number fields and function fields by using the OM representation of ideals and lattices.Moreover I am focusing on speeding up class group computations.
Ben Othmane, Lotfi   (POSTDOC)

Security and privacy in vehicular network, self-protecting data, mobile agents security, web services security.
Bisson, Gaetan   (Ph.D. STUDENT)

Computational theory and algorithms related to hyperelliptic pairings with a view toward cryptography.
Brouwer, Andries   (Professor)

Security aspects of Unix and Linux; ethical hacker.
Bruso', Mayla

Verification of security protocols. Project: PEARL - Privacy Enhanced security Architecture for RFID Labels.
Chatzikokolakis, Kostas   (POSTDOC)

Verification of security protocols, mostly in the area of anonymity and privacy. Also working on process algebras, mainly in a probabilistic setting, and information theory.
Hoogh, Sebastiaan de   (POSTDOC, Ph.D. STUDENT)

It is a well known fact that collaboration and information sharing in supply chains reduce costs and allow for enhanced optimization. Nevertheless most companies are reluctant to share their data, since its revelation has a negative impact on their bargaining power, and may even benefit the competition.
Areas where the results can directly be applied include digital rights management, biological authentication, threshold cryptography, profile matching, electronic voting, secure data-mining among others.
Jurrius, Relinde (Ph.D. STUDENT)

My reseach is on coding theory. I study weight enumerators of linear codes, and generalizations of this polynomial. Also, I link these to polynomials associated with other mathematical structures, such as matroids, arrangements of hyperplanes and algebraic curves.
Krøigård, Mikkel   (POSTDOC)

Cryptophraphic protocols. In particular, theoretical and practical aspects of multiparty computation.
Liesdonk, Peter van

My research topic is searchable data encryption. This means finding ways to securely store information on an untrusted database server, while still being able to efficiently retrieve specific data. Further interests are pairing-based cryptography, identity-based encryption, provable security and cryptographic protocols.
Lu, Jiqiang   (POSTDOC)

Side-channel analysis, block cipher analysis and hash function analysis.
Peters, Christiane   (Ph.D. STUDENT, graduated cum laude)

My research topic is coding-based cryptography. In particular, I am interested in attacking the McEliece cryptosystem. Furthermore I want to focus on algebraic geometry codes and find out whether they are suitable for cryptographic applications. I am also interested in elliptic curve cryptography; especially in elliptic curves in Edwards form as well as point counting algorithms for elliptic curves over finite fields.
Pontes Soares Rocha, Bruno   (Ph.D. STUDENT)

Security of Services on Mobile Systems
Project: S-Mobile
Schwabe, Peter   (Ph.D. STUDENT, graduated cum laude)

Efficient implementation of cryptographic algorithms, elliptic and hyperelliptic curve cryptography and pairing based cryptography.
Simone, Antonino

Collusion-resistant watermarking codes.
Spiessens, Fred   (POSTDOC)

Distributed Trust Management in dynamic coalitions.
Trivellato, Daniel   (Ph.D. STUDENT)

Distributed Trust Management in dynamic coalitions.
Veeningen, Meilof (POSTDOC, Ph.D. STUDENT)

Mobile identity management
Project: Mobiman
Investigating techniques in the area of identity management (privacy policy matching, automated trust negotiation) while taking into account specific demands to make the techniques implementable on mobile devices (light-weightness, usability).

Back to the top of this page.