CryptoExperts' Research Lab
CryptoExperts is a research group of well-recognized experts in cryptography and is connected to a network of over 60 technology partners from accross the globe. Research areas include provable security for security infrastructures and applications; the design and security evaluation of cryptographic functions, schemes and protocols; secure implementations and the physical security of embedded systems. Totaling more than 200 scientific publications and 100 invention patents, our research team, exclusively composed of industrial experts holding a PhD in cryptography, is proud to maintain a word-class expertise that simultaneously covers theoretical and practical aspects of cryptographic systems. Ranging from hardware cryptoprocessing to user-privacy, from lightweight encryption to white-box cryptography, here is a selection of our current project projects.
Ongoing Research Projects
Electronic identity of SMBs.
In a context of increasing dematerialization of procedures and services, IDECYS+ aims to provide small and medium-sized businesses with a digital identity that is easy to obtain and use, taking into account delegation issues. Reliable identification is essential for establishment...Read more
A french regroupment for post-quantum cryptography.
The RISQ project brings together the french digital security community (academics and industry) in order to prepare the post-quantum revolution. Combining the strong skills of its actors, the RISQ project aims to take part in the development of standards and...Read more
Verifying side-channel countermeasures with automatic tools.
The VERISICC project aims to build automatic tools to verify and generate proven masked cryptographic implementations. These tools will allow industrial people to develop secure and efficient implementations and to certification bodies to quickly and accurately verify the implementations submitted...Read more
Former Research Projects
A crypto-calculus platform for the Cloud.
The principle of cloud computing is to allow users to outsource computation resources to the cloud by allowing a remote service to execute, in their name, some procedures on their private data. While many commercial services are growing fast, to...Read more
Using Fully Homomorphic Encryption in Practice.
The HEAT project will develop advanced cryptographic technologies using Fully Homomorphic Encryption to process sensitive information in ecrypted form, without needing to compromise on the privacy and security of the citizens and organizations that provide the input data.Read more
The Smart Cloud approach: database-supporting smartcards securely operated through the Cloud.
The KISS research initiative introduces the concept of Smart Cloud, whereby end users carry secure tokens managing their personal data instead of relying on cloud storage. Through a variety of innovative cryptographic technologies, a Smart Cloud also supports data federation...Read more
Boosting Elliptic Curves in the Embedded World.
Many business cases and user experiences could be improved or made more profitable if specific ECC-supporting hardware existed that would speedup security protocols by an order of magnitude at minimal cost. The main purpose of Eclipses is to accelerate progress...Read more
The best of cryptographic science for the embedded security marketplace.
Lightweight block ciphers are cost-effective solutions for symmetric encryption on embedded systems such as RFIDs and smartcards. They are specifically designed to fit in low-cost devices with very efficient hardware modules in terms number of gates, area, memory and speed....Read more
Protecting user privacy on NFC-enabled mobile phones.
A personal data breach may, if left unaddressed in an adequate and timely manner, result in a substantial economy loss and social harm. A breach should be considered as adversely affecting the data or privacy of a subscriber or service...Read more
Formally proving that your crypto libs are side-channel resistant.
The PRINCE research project addresses the challenge of building leakage-resilient primitives and leakage-resilient implementations for standard algorithms. Through an appropriate security modelling, the embedded security industry has never been closer to fill in the gap between empirically secure cryptographic implementations...Read more
How (in)secure are mobile phones?
The main goal of the Tisphanie project is to propose a systematic and structured methodology, together with the related tools and evaluation process enabling the concerned users (MNOs, application developers, police laboratories, civil security operators) to efficiently assess the security...Read more