Computer Security and Industrial Cryptography


  • button-survey1Information Security Breaches survey 2015 Belgium
    15 December 2014 – We invite you to take part in the Information Security Breaches Survey 2015 developed by B-CCentre together with PwC and InfoSecurity Belgium. Deadline is 31 December 2014.
  • dreamstime_xs_42590289KULeuven Cosic advises how to keep data secure in a cyber world
    21 November 2014 – Cyber security experts from KULeuven Cosic and the University of Bristol have advised the European Union Agency for Network and Information Security (ENISA) on how to protect the personal data of millions of citizens.
  • 62-IMG_0182Cosic Paper wins the JETTA Best Paper Award 2013
    23 October 2014 – The JETTA Best Paper Award for the year 2013 has been awarded to the paper entitled “Secure JTAG Implementation Using Schnorr Protocol”, written by Cosic authors Ingrid Verbauwhede, Stefaan Seys, Santosh Ghosh and Amitabh Das.
  • medicalMedical device hacking
    6 October 2014 – The Standaard interviews Dave Singelee and Eduard Marin Fabregas (both Cosic) on medical device hacking.
  • topJeroen Delvaux wins ChinaCrypt Best Paper Award
    September 2014 – Jeroen Delvaux wins ChinaCrypt Best Paper Award with the paper “Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?”


Key Publications