Cryptography

Security and cryptography

The basis of any solution must be a protocol that provides (usually without a third party) several functions:

  1. Consumer privacy
  2. Authentication from the provider's point of view
  3. A relatively simple and highly secure cryptographic algorithm, working with a variable key length, implementable on various HW platforms and compatible with various types of meters and providing cryptographic homomorphism with respect to aggregation
  4. A certain degree of universality, in case of change

Cryptography projects

Research in cyber security, symmetric and asymmetric cryptography with limitations

Project: International Centre of Excellence for Research of Intelligent and Secure InformationCommunication Technologies and Systems

Topic: Research in cyber security, symmetric and asymmetric cryptography with limitations

Published: 2/2017

Implementer: 

Documents:

Privacy protection research

Project: International Centre of Excellence for Research of Intelligent and Secure InformationCommunication Technologies and Systems

Topic: Privacy protection research

Published: 2/2017

Implementer:

Documents:

Latest News