Information for (future) students
COSIC and DistriNet organize a 60-ECTS Advanced Master Cybersecurity programme together, aimed at graduates from electrical engineering, computer science, mathematics and physics.
Learn more about the master programmes & courses, and the COSIC seminars.
Information for researchers
Find out more about our research (publications, seminars, projects) and vacancies at COSIC.
Information for industry
COSIC offers several security evaluations for industry. More information about our research lab, collaborations & projects can also be found here.
News
- COSIC Course on Cryptography and Cyber Security (1-4 July 2024)
Co-organized with enCRYPTON school on “Fast and Efficient Implementation of Homomorphic Encryption for Privacy Enhancing Technologies” (3-4 July 2024) We are organizing the 17th edition of the international COSIC course on cybersecurity and cryptography. The course will be held in Leuven from 1-4 July 2024. Background Our society becomes more and more connected. This fundamentally changes our way of interacting as ... - Paper by Professor Kris Myny and colleagues published in Nature
Recent research conducted by KU Leuven and imec demonstrates the feasibility of applying the ‘foundry’ model, typically used in the mass production of conventional silicon chips, to the field of flexible, thin-film electronics. This innovative approach aims to boost innovation in the field of flexible electronics, which utilizes thin-film transistor (TFT) technology as an alternative ... - Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in SecondsUnsaflok – a series of serious security vulnerabilities in Dormakaba’s Saflok electronic RFID locks, commonly used in hotels and multi-family housing environments In a groundbreaking revelation, security researchers Ian Carroll and Lennert Wouters (researcher at COSIC), along with their team, have unveiled a significant security flaw in millions of hotel room locks worldwide. Originating from a ...
Selection of Key Publications
- P. Kumar, D. Gosain, and C. Diaz, “On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies” In Network and Distributed System Security Symposium (NDSS 2023), , Internet Society, pp. 18, 2023.
- W. Castryck, and T. Decru, “An efficient key recovery attack on SIDH” In Advances in Cryptology – EUROCRYPT 2023, Lecture Notes in Computer Science 14006, C. Hazay, and M. Stam (Eds.), Springer-Verlag, pp. 1-15, 2023.
- R. Geelen, I. Iliashenko, J. Kang, and F. Vercauteren, “On Polynomial Functions Modulo p^e and Faster Bootstrapping for Homomorphic Encryption” In Advances in Cryptology – EUROCRYPT 2023, Lecture Notes in Computer Science 14006, C. Hazay, and M. Stam (Eds.), Springer-Verlag, pp. 257-286, 2023.
- T. Yoshizawa, D. Singelée, J. Tobias Muehlberg, S. DELBRUEL, D. HUGHES, B. Preneel, and A. TAHERKORDI, “A Survey of Security and Privacy Issues in V2X Communication Systems”, ACM Computing Surveys 55(9), pp. 1-36, 2023.
- E. . Marquet, J. Moeyersons, E. Pohle, M. Van Kenhove, A. Abidin, and B. Volckaert, “Secure Key Management for Multi-Party Computation in MOZAIK” In Proceedings of IEEE Security and Privacy Workshops (SPW), , IEEE, pp. 133-140, 2023.
- J. D’Anvers, M. Van Beirendonck, and I. Verbauwhede, “Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-Sliced Implementations“, IEEE Transactions on Computers 72(2), pp. 321-332, 2023.
- C. Carlet, E. Piccione, S. Andreoli, L. Budaghyan, S. Dhooghe, S. Petkova-Nikova, G. Petrides, and V. Rijmen, “An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes“, IEEE Transactions on Information Theory 70( 1), pp. 16, 2023.
- R. Geelen, and F. Vercauteren, “Bootstrapping for BGV and BFV Revisited“, Journal of Cryptology 36(2), pp. 32, 2023.
- A. Bhati, E. Pohle, A. Abidin, E. Andreeva, and B. Preneel, “Let’s Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation” In ACM Conference on Computer and Communications Security – CCS 2023, , ACM, pp. 20, 2023.
- W. Castryck, M. Houben, S. Merz, M. Mula, S. van Buuren, and F. Vercauteren, “Weak instances of class group action based cryptography via self-pairings” In Advances in Cryptology – CRYPTO 2023, Lecture Notes in Computer Science, H. Handschuh, and A. Lysyanskaya (Eds.), Springer-Verlag, pp. 36, 2023.
- Y. Chen, W. Choi, and C. Lee, “Improved Multi-User Security Using the Squared-Ratio Method” In Advances in Cryptology – CRYPTO 2023, Lecture Notes in Computer Science, H. Handschuh, and A. Lysyanskaya (Eds.), Springer-Verlag, pp. 30, 2023
- C. Baum, L. Braun, C. Delpech de Saint Guilhem, M. Klooß, E. Orsini, L. Roy, and P. Scholl, “Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head” In Advances in Cryptology – CRYPTO 2023, Lecture Notes in Computer Science, H. Handschuh, and A. Lysyanskaya (Eds.), Springer-Verlag, pp. 581-615, 2023.
- J. De Meulemeester, A. Purnal, L. Wouters, A. Beckers, and I. Verbauwhede, “SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution” In 32 USENIX Security Symposium 2023, , Usenix, pp. 18, 2023.


