Cryptography

Security and cryptography

The basis of any solution must be a protocol that provides (usually without a third party) several functions:

  1. Consumer privacy
  2. Authentication from the provider's point of view
  3. A relatively simple and highly secure cryptographic algorithm, working with a variable key length, implementable on various HW platforms and compatible with various types of meters and providing cryptographic homomorphism with respect to aggregation
  4. A certain degree of universality, in case of change

Cryptography projects

Research in cyber security, symmetric and asymmetric cryptography with limitations

Privacy protection research

Latest News