english deutsch
Cambridge Univ's Computer Security Group
Research Interests: Security Protocols, Formal Methods, Reliability of Security Systems, Medical Information Security, Cryptographic Algorithms, Steganography & Information Hiding, Digital Watermarking, Hardware Security, Electronic Commerce
COmputer Security and Industrial Cryptography
Kuleuven Univ, Belgium. Interests: Design, evaluation, and implementation of crypto algorithms and protocols, and on the development of security architectures for computer systems and telecom networks. Also theoretical work in crypto algorithms related to discrete mathematics.
Cryptography at Microsoft
Researching new cryptographic methods and applications. Working with standards bodies to develop security protocols. Providing internal security to Microsoft products.
ECRYPT
European Network of Excellence for Cryptology: Areas Cryptology and Watermarking. About 31 institutes are collaborated in this joint research project.
Florida State University
Interests: Wireless Security, Privacy, Forensics, Security Protocols.
Horst Görtz Institute for IT-Security
Ruhr-University of Bochum, Germany : Cryptographic and security protocols, Security architectures, Digital Rights Management systems, Cryptographic embedded applications, Network security etc.
IBM Research: Cryptography Group
Lists group members, current research, recent publications, and speakers and other activities at the T.J. Watson Research Center.
Indian Statistical Institute, Kolkata (Calcutta),
Interests: Boolean functions, Stream ciphers, Block Ciphers, Hash functions, Database security, Digital Watermarking, Elliptic/HyperElliptic Curve Crypto, Visual Crypto, Digital Signature Schemes
Information Security and Cryptography: ETH, Zurich
Interests: Information-theoretic cryptography, Secure distributed computation, Public-key cryptography and digital signatures, Number-theoretic and algebraic cryptography, Zero-knowledge protocols, Complexity theory
Macquarie University, Australia
Interests: Security techniques for wired and wireless networks, fixed and mobile distributed applications, practical quantum cryptography, Cryptography and Information Security, Computational Number Theory, Algebraic and Combinatorial Algorithms.
MIT's Cryptography and Information Security G
Threshold Cryptography, Zero-Knowledge Proofs, Pseudo-Randomness, Random Oracle Model, and Anonymity in cryptography, Digital Signatures.
NIST Computer Security Division and Computer Secur
Develops cryptographic methods and standards, conducts research and testing on security systems and emerging technologies, and provides education and outreach.
Royal Holloway's Security research Group
Interests: Security Analysis of AES, PKI, Quantum Cryptography, mobile privacy, ECC, Digital signatures, Authentication protocols
Saarland University, Germany
Interests: Cryptographic Copyright Protection, Secure End-User Devices, Network & Telecom Security, Trusted Computing Platforms, Malicious- and Accidental-Fault Tolerance
Stanford University's Security Lab
Interests: Security of cryptographic primitives and protocols, Identity Based Encryption Email system, Intrusion tolerance via threshold cryptography, Electronic wallets, RSA keys bits generation
UCSD's Security and Cryptography Group
Development and analysis of crypto protocols and algos, Interests: Security of systems and networks, e-commerce, computational complexity theory, Formal methods for computer security, digital signatures, incremental cryptography
University of California, Berkeley
Internet Security, Applications, Authentication, and Cryptography