Computer Security and Industrial Cryptography


  • terzakevincentUS Centcom Twitter account hacked by pro IS group
    14 January 2015 – Terzake interviews Vincent Rijmen on the differences between cybervandalism and cybercriminality.
  • de morgenNot only NSA is watching you
    3 January 2015- Bart Preneel in de Morgen: Industry as well as government should invest more in cyber security. The hacker ‘Rex Mundi’ steals personal data from companies and organizations to demand ransom. Later he puts the data online.
  • button-survey1Information Security Breaches survey 2015 Belgium
    15 December 2014 – We invite you to take part in the Information Security Breaches Survey 2015 developed by B-CCentre together with PwC and InfoSecurity Belgium. Deadline is 31 December 2014.
  • dreamstime_xs_42590289KULeuven Cosic advises how to keep data secure in a cyber world
    21 November 2014 – Cyber security experts from KULeuven Cosic and the University of Bristol have advised the European Union Agency for Network and Information Security (ENISA) on how to protect the personal data of millions of citizens.
  • 62-IMG_0182Cosic Paper wins the JETTA Best Paper Award 2013
    23 October 2014 – The JETTA Best Paper Award for the year 2013 has been awarded to the paper entitled “Secure JTAG Implementation Using Schnorr Protocol”, written by Cosic authors Ingrid Verbauwhede, Stefaan Seys, Santosh Ghosh and Amitabh Das.


Key Publications