Cryptography

Cryptography forms the foundation of information security.  In the last decade, many services affecting people's life and privacy have been put online and ensuring that sensitive information stays secure is very important.  It is, therefore, necessary to understand why modern cryptography is considered secure, and exactly which security guarantees different encryption methods offer.

At Simula UiB, we study the details of how cryptographic algorithms work.   We estimate how much resources the best attacks need to break the security of particular cyphers.  This research gives assurance that the cryptography we all rely on really is secure, even when we consider new attack methods and the increase in computing power.

New types of cryptographic algorithms, like fully homomorphic encryption, has the potential to solve many of the trust and privacy issues in cloud computing today.  The challenge these novel algorithms currently face is in terms of efficiency. Simula UiB does research in this area also, trying to make new cryptographic techniques more practical and useful in the real world.

More about Simula's research activity on cryptography can be found at www.simula-uib.com

Go to...

Contact Person

Find publication

Export 8314 results:
2023

Journal articles

IEEE Transactions on Information Theory 69, no. 2 (2023): 910-927.
Status: Published
IEEE Transactions on Communications 71, no. 4 (2023): 2013-2027.
Status: Published

Edited books

In 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part II. Vol. 14005. Cham: Springer Nature Switzerland, 2023.
Status: Published
In 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I. Vol. 14004. Cham: Springer Nature Switzerland, 2023.
Status: Published
In 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part III. Vol. 14006. Cham: Springer Nature Switzerland, 2023.
Status: Published
In 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part IV. Vol. 14007. Cham: Springer Nature Switzerland, 2023.
Status: Published
In 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part V. Vol. 14008. Cham: Springer Nature Switzerland, 2023.
Status: Published

Proceedings, refereed

In Asiacrypt 2022. Vol. 13792. Cham: Springer Nature Switzerland, 2023.
Status: Published
In Code-Based Cryptography. CBCrypto 2022. Lecture Notes in Computer Science. Vol. 13839. Cham: Springer Nature Switzerland, 2023.
Status: Published