CryptoExperts' Research Lab
CryptoExperts is a research group of well-recognized experts in cryptography and is connected to a network of over 60 technology partners from accross the globe. Research areas include provable security for security infrastructures and applications; the design and security evaluation of cryptographic functions, schemes and protocols; secure implementations and the physical security of embedded systems. Totaling more than 200 scientific publications and 100 invention patents, our research team, exclusively composed of industrial experts holding a PhD in cryptography, is proud to maintain a word-class expertise that simultaneously covers theoretical and practical aspects of cryptographic systems. Ranging from hardware cryptoprocessing to user-privacy, from lightweight encryption to white-box cryptography, here is a selection of our current project projects.
Ongoing Research Projects
We are already late, using cryptographic implementations in our daily life that are vulnerable to side-channel attacks. Provably secure cryptographic implementations are not practically secure and evaluations on concrete devices are not sufficient to achieve a reasonable security level. The...
Read more
Despite the emergence of post-quantum schemes, the RSA cryptosystem and the Diffie-Hellman key exchange protocol in finite fields are still widely deployed. The main cryptanalytic tool for assessing the hardness of their underlying mathematical problems (e.g., integer factorization) is the...
Read more
With experts in discrete mathematics, cryptanalysis and implementations, the SWAP project aims to explore the design of S-boxes for various contexts. While current constructions mostly derive from the results of classical symmetric cryptanalysis, the emergence of new contexts, applications and...
Read moreSecure Software using Whitebox Technology
Software applications are increasingly deployed in environments which cannot be fully trusted. In this context, the SWITECH project aims at investigating and developing innovative security solutions based on White-Box Cryptography. The first benefit of the project is the development of...
Read moreFormer Research Projects
A crypto-calculus platform for the Cloud.
The principle of cloud computing is to allow users to outsource computation resources to the cloud by allowing a remote service to execute, in their name, some procedures on their private data. While many commercial services are growing fast, to...
Read moreUsing Fully Homomorphic Encryption in Practice.
The HEAT project will develop advanced cryptographic technologies using Fully Homomorphic Encryption to process sensitive information in ecrypted form, without needing to compromise on the privacy and security of the citizens and organizations that provide the input data.
Read moreThe Smart Cloud approach: database-supporting smartcards securely operated through the Cloud.
The KISS research initiative introduces the concept of Smart Cloud, whereby end users carry secure tokens managing their personal data instead of relying on cloud storage. Through a variety of innovative cryptographic technologies, a Smart Cloud also supports data federation...
Read moreBoosting Elliptic Curves in the Embedded World.
Many business cases and user experiences could be improved or made more profitable if specific ECC-supporting hardware existed that would speedup security protocols by an order of magnitude at minimal cost. The main purpose of Eclipses is to accelerate progress...
Read moreECRYPT-CSA & ECRYPT-NET
CryptoExperts is a partner of the coordination & support action ECRYPT-CSA, and of the research network ECRYPT-NET, sponsored by the European Union's H2020 programme.
Read moreThe best of cryptographic science for the embedded security marketplace.
Lightweight block ciphers are cost-effective solutions for symmetric encryption on embedded systems such as RFIDs and smartcards. They are specifically designed to fit in low-cost devices with very efficient hardware modules in terms number of gates, area, memory and speed....
Read moreElectronic identity of SMBs.
In a context of increasing dematerialization of procedures and services, IDECYS+ aims to provide small and medium-sized businesses with a digital identity that is easy to obtain and use, taking into account delegation issues. Reliable identification is essential for establishment...
Read moreProtecting user privacy on NFC-enabled mobile phones.
A personal data breach may, if left unaddressed in an adequate and timely manner, result in a substantial economy loss and social harm. A breach should be considered as adversely affecting the data or privacy of a subscriber or service...
Read moreFormally proving that your crypto libs are side-channel resistant.
The PRINCE research project addresses the challenge of building leakage-resilient primitives and leakage-resilient implementations for standard algorithms. Through an appropriate security modelling, the embedded security industry has never been closer to fill in the gap between empirically secure cryptographic implementations...
Read moreA french regroupment for post-quantum cryptography.
The RISQ project brings together the french digital security community (academics and industry) in order to prepare the post-quantum revolution. Combining the strong skills of its actors, the RISQ project aims to take part in the development of standards and...
Read moreHow (in)secure are mobile phones?
The main goal of the Tisphanie project is to propose a systematic and structured methodology, together with the related tools and evaluation process enabling the concerned users (MNOs, application developers, police laboratories, civil security operators) to efficiently assess the security...
Read moreVerifying side-channel countermeasures with automatic tools.
The VERISICC project aims to build automatic tools to verify and generate proven masked cryptographic implementations. These tools will allow industrial people to develop secure and efficient implementations and to certification bodies to quickly and accurately verify the implementations submitted...
Read more