COSIC (Computer Security and Industrial Cryptography group) provides a broad expertise in digital security and strives for innovative security solutions. COSIC is headed by Bart Preneel.
Add yourself to our contact list and stay updated on all upcoming events.
Information for (future) students
Learn more about the master programmes & courses, and the COSIC seminars.
Information for researchers
Find out more about our research (publications, seminars, projects) and vacancies at COSIC.
Information for industry
COSIC offers several security evaluations for industry. More information about our research lab, collaborations & projects can also be found here.
News
Tests of Galileo OSNMA underway
“Galileo has started testing Open Service Navigation Message Authentication (OSNMA) in the signal-in-space, allowing the first-ever OSNMA-protected position fix to be successfully computed.” OSNMA was developed in 2017 by dr. Ignacio Fernandez-Hernandez (EC) and dr. Tomer Ashur and Prof. Vincent Rijmen (COSIC). Their authentication method involves electronic signatures, similar to methods used for online banking. More information Tests of ...Coronalert wins the Agoria eGov & Smart Cities Award for ‘best e-Gov Project’
The app Coronalert won the Award for ‘best e-Gov Project’ in the 17th edition of the Agoria eGov Awards. The app received recognition for being an important addition to manual contact tracing, especially in situations where people don’t know each other, such as public transportation. Coronalert received nominations in four categories: return, innovation, collaboration and best ...Belgian security researchers from COSIC and imec steal a Tesla model X in minutes
COSIC researchers Lennert Wouters, Benedikt Gierlichs and Bart Preneel have managed to hack into the keyless entry system of the Tesla Model X. Earlier they already successfully hacked into the Tesla Model S. The battery powered Tesla Model X (priced at over $100.000) can be stolen in a few minutes by rewriting the firmware of a key fob ...
Key Publications
- T. Ashur, T. Beyne, and V. Rijmen, “Revisiting the Wrong-Key-Randomization Hypothesis,” Journal of Cryptology 33(2), pp. 567-594, 2020.
- A. Aly, A. Aly, T. Ashur, E. Ben-Sasson, and S. Dhooghe, “Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols,” IACR Transactions on Symmetric Cryptology 2020(3), pp. 1-45, 2020.
- T. Beyne, A. Canteaut, I. Dinur, M. Eichlseder, G. Leander, G. Leurent, M. Naya-Plasencia, L. Perrin, Y. Sasaki, Y. Todo, and F. Wiemer, “Out of Oddity — New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems,” In Advances in Cryptology – CRYPTO 2020, Lecture Notes in Computer Science, D. Micciancio, and T. Ristenpart (eds.), Springer-Verlag, 30 pages, 2020.
- W. Castryck, J. Sotáková, and F. Vercauteren, “Breaking the decisional Diffie-Hellman problem for class group actions using genus theory,” In Advances in Cryptology – CRYPTO 2020, Lecture Notes in Computer Science, D. Micciancio, and T. Ristenpart (eds.), Springer-Verlag, 30 pages, 2020.
- H. Chen, I. Chillotti, Y. Dong, O. Poburinnaya, I. Razenshteyn, and M. Sadegh Riazi, “SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search,” In 2020th USENIX Security Symposium 2020, Usenix, 18 pages, 2020.
- I. Chillotti, N. Gama, M. Georgieva , and M. Izabachene, “TFHE: Fast Fully Homomorphic Encryption Over the Torus,” Journal of Cryptology 33(1), pp. 34-91, 2020.
- F. Turan, and I. Verbauwhede, “Trust in FPGA-accelerated Cloud Computing,” ACM Computing Surveys 53(6), 28 pages, 2020.
- L. Wouters, V. Arribas, B. Gierlichs, and B. Preneel, “Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks,” Transactions on Cryptographic Hardware and Embedded Systems 2020(3), 22 pages, 2020.
- G. Dessouky, P. Jauernig, N. Mentens, A. Sadeghi, and E. Stapf, “INVITED: AI Utopia or Dystopia – On Securing AI Platforms,” In 58th Design Automation Conference (DAC 2020), IEEE, 6 pages, 2020.
- S. Siby, M. Juarez, C. Diaz, C. Troncoso, and N. Vallina-Rodriguez, “Encrypted DNS –> Privacy? A Traffic Analysis Perspective,” In Network and Distributed System Security Symposium (NDSS 2020), Internet Society, 18 pages, 2020.
- G. Acar, S. Englehardt, and A. Narayanan, “No boundaries: data exfiltration by third parties embedded on web pages,” Proceedings on Privacy Enhancing Technologies 2020(4), 19 pages, 2020.
- A. Abidin, R. Callaerts, G. Deconinck, S. Van der Graaf, A. Madhusudan, M. Montakhabi, M. A. Mustafa, S. Nikova, D. Orlando, J. Schroers, S. Vanhove, and F. Zobiri, “Poster: SNIPPET – Secure and Privacy-Friendly Peer-to-Peer Electricity Trading,” In Network and Distributed System Security Symposium (NDSS 2020), Internet Society, 2 pages, 2020.