Nigel Smart (cryptographer)
   HOME
*





Nigel Smart (cryptographer)
Nigel Smart is a professor at COSIC at the Katholieke Universiteit Leuven. He is a cryptographer with expertise in the theory of cryptography and its application in practice. Education Smart received a BSc degree in mathematics from the University of Reading in 1989. He then obtained his PhD degree from the University of Kent at Canterbury in 1992; his thesis was titled ''The Computer Solutions of Diophantine Equations''. Career Smart proceeded to work as a research fellow at the University of Kent, the Erasmus University Rotterdam, and Cardiff University until 1995. From 1995 to 1997, he was a lecturer in mathematics at the University of Kent, and then spent three years in industry at Hewlett-Packard from 1997 to 2000. From 2000 to 2017 he was at the University of Bristol, where he founded the cryptology research group. From 2018 he has been based in the COSIC group at the Katholieke Universiteit Leuven. Smart held a Royal Society Wolfson Merit Award (2008–2013), and two ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


COSIC
The Computer Security and Industrial Cryptography research group, commonly called COSIC, is a research group at the Department of Electrical Engineering of KU Leuven, which is headed by Bart Preneel. Research Research and expertise in digital security: * Security architectures for information and communication systems * Cryptographic algorithms and protocols ** Symmetric key ** Public key ** Post-quantum * Security for embedded systems * Privacy-preserving systems Applications: * Cloud * Automotive * Privacy * Data Protection * Trusted Systems * E-payments * E-documents * ... AES One of the well-known successes is the selection of Rijndael as the Advanced Encryption Standard (AES). Currently AES is used by millions of users in more than thousand products, such as the protection of US government information. Research projects COSIC has participated in over 50 European research projects. IMEC COSIC is part of the Smart Applications and Innovation Services of imec Int ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United Kingdom
The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Europe, off the north-western coast of the continental mainland. It comprises England, Scotland, Wales and Northern Ireland. The United Kingdom includes the island of Great Britain, the north-eastern part of the island of Ireland, and many smaller islands within the British Isles. Northern Ireland shares a land border with the Republic of Ireland; otherwise, the United Kingdom is surrounded by the Atlantic Ocean, the North Sea, the English Channel, the Celtic Sea and the Irish Sea. The total area of the United Kingdom is , with an estimated 2020 population of more than 67 million people. The United Kingdom has evolved from a series of annexations, unions and separations of constituent countries over several hundred years. The Treaty of Union between the Kingdom of England (which included Wales, annexed in 1542) and the Kingdom of Scotland in 170 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cardiff University
, latin_name = , image_name = Shield of the University of Cardiff.svg , image_size = 150px , caption = Coat of arms of Cardiff University , motto = cy, Gwirionedd, Undod a Chytgord , mottoeng = Truth, Unity and Concord , established = 1883 (/)2005 (independent university status) , type = Public , endowment = £45.5 million (2021) , budget = £603.4 million (2020–21) , total_staff = 6,900 (2019/20) , academic_staff = 3,350 (2019/20) , chancellor = Jenny Randerson , vice_chancellor = Colin Riordan , students = () , undergrad = () , postgrad = () , other = , city = Cardiff , country = Wales, United Kingdom , coor = , campus = Urban , colours = , mascot = , affiliations = Russell Group EUAUniversities UK GW4 , website cardiff.ac.uk, logo = Cardiff University ( cy, Prifysgol Caerdydd) is a public research university in Cardiff, Wales, United Kingdom. It was established in 1883 as the University College of South Wales and Monmouthshire ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Kenny Paterson
Kenneth G. "Kenny" Paterson (born 2 March 1969) is a professor in the Institute of Information Security at ETH Zurich, where he leads the Applied Cryptography Group. Before joining ETH Zurich in April 2019, he was a professor in the Information Security Group at Royal Holloway, University of London and an EPSRC Leadership Fellow. He is a cryptographer with a focus on bridging the gap between theory and practice and recently became the Editor in Chief for the IACR's Journal of Cryptology and a 2017 fellow of the IACR. Education Paterson obtained a BSc in 1990 from the University of Glasgow and a PhD from the University of London in 1993, both in Mathematics. Career Paterson was a Royal Society Fellow at Institute for Signal and Information Processing at ETH Zurich from 1993 to 1994. In 1996, he joined Hewlett-Packard Laboratories Bristol. He then joined the Information Security Group at Royal Holloway in 2001, becoming a Reader in 2002 and Professor in 2004. From March 2010 t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Yehuda Lindell
Yehuda Lindell (born 24 February 1971) is a professor in the Department of Computer Science at Bar-Ilan University where he conducts research on cryptography with a focus on the theory of secure computation and its application in practice. Lindell currently leads the cryptography team at Coinbase. Education and academic positions Lindell received a BSc and Msc degree in computer science from Bar-Ilan University. He then obtained a PhD in computer science from the Weizmann Institute of Science in 2002. Lindell received a Raviv Fellowship and spent two years at IBM's cryptography research group at the T.J. Watson Research Center. In 2004, he returned to Israel to take up an academic position at Bar-Ilan University. Lindell's work on secure computation was recognized by the award of an ERC starting grant in 2009 and an ERC consolidators grant in 2014. Lindell was appointed as an IACR Fellow in 2021. Industry experience Lindell worked from 2004 to 2014 as a permanent cryptographic ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Trend Micro
is an American-Japanese multinational cyber security software company with global headquarters in Tokyo, Japan and Irving, Texas, United State.Other regional headquarters and R&D centers are located around East Asia, Southeast Asia, Europe, and North America. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform. Eva Chen, who is the founder, currently serves as Trend Micro's chief executive officer, a position she has held since 2005. She succeeded founding CEO Steve Chang, who now serves as chairman. History 1988–1999 The company was founded in 1988 in Los Angeles by Steve Chang, his wife, Jenny Chang, and her sister, Eva Chen (陳怡樺). The company was established with proceeds from Steve Chang's previous sale of a copy protection dongle to ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

HP Laboratories
HP Labs is the exploratory and advanced research group for HP Inc. HP Labs' headquarters is in Palo Alto, California and the group has research and development facilities in Bristol, UK. The development of programmable desktop calculators, inkjet printing, and 3D graphics are credited to HP Labs researchers. HP Labs was established on March 3, 1966, by founders Bill Hewlett and David Packard, seeking to create an organization not bound by day-to-day business concerns. The labs have downsized dramatically; in August 2007, HP executives drastically diminished the number of projects, down from 150 to 30. As of 2018, HP Labs has just over 200 researchers, compared to earlier staffing levels of 500 researchers. With the Hewlett Packard Enterprise being spun off from Hewlett-Packard on November 1, 2015, and renamed to and HP Inc., the research lab also spun off Hewlett Packard Labs to Hewlett Packard Enterprise and HP Labs was kept for HP Inc. History As the Semiconductor Lab's f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Pairing-based Cryptography
Pairing-based cryptography is the use of a pairing between elements of two cryptographic groups to a third group with a mapping e :G_1 \times G_2 \to G_T to construct or analyze cryptographic systems. Definition The following definition is commonly used in most academic papers. Let F_q be a Finite field over prime q, G_1, G_2 two additive cyclic groups of prime order q and G_T another cyclic group of order q written multiplicatively. A pairing is a map: e: G_1 \times G_2 \rightarrow G_T , which satisfies the following properties: ; Bilinearity: \forall a,b \in F_q^*, P\in G_1, Q\in G_2:\ e\left(aP, bQ\right) = e\left(P, Q\right)^ ; Non-degeneracy: e \neq 1 ; Computability: There exists an efficient algorithm to compute e. Classification If the same group is used for the first two groups (i.e. G_1 = G_2), the pairing is called ''symmetric'' and is a mapping from two elements of one group to an element from a second group. Some researchers classify pairing instantiations int ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Elliptic Curve Cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide equivalent security.Commercial National Security Algorithm Suite and Quantum Computing FAQ
U.S. National Security Agency, January 2016.
Elliptic curves are applicable for , s,
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]