27 Websites:Organisations:Summaries:Related categories:Related keywords:Related locations:
zemmel.nlzemmel.nlThe website consists primarily of repeated patterns of letters, with the letters 'C', 'R', 'T', 'A', and 'S' being prominently featured. There are multiple rows of these letters and symbols, often in a chaotic and irregular layout. It is unclear what the purpose of this presentation is, or whether it is a form of art, code, or another form of communication.Painting → Abstract Painting 594 symbol 149 letter 834 pattern 2012
mtcvenema.nlUniversity of WuppertalMarloes Venema is currently a postdoctoral researcher in the IT Security and Cryptography Group at the University of Wuppertal, working under the supervision of prof. dr. Tibor Jager. Prior to this, she completed a PhD at the Radboud University Nijmegen, supervised by dr. Greg Alpár, focusing on attribute-based encryption and related cryptographic primitives. Her research interests encompass theoretical design and analysis of cryptographic schemes, with a specialization in predicate encryption and ABE, and she has co-authored several upcoming publications for conferences like CHES 2025 and CCS 2024.cryptography 31 research 8967 Gelderland → Nijmegen 9384
bordekock.nlTNOBor de Kock is a scientist specializing in Post-Quantum Cryptography, particularly focusing on Key Exchange mechanisms. He previously held positions as an assistant and associate professor at NTNU in Trondheim, where he was involved in teaching and supervising students in cryptography. Currently, Bor de Kock serves on the editorial board of The IACR Communications in Cryptography and will be a Co-General Chair for the PKC 2025 conference, scheduled to take place in Røros, Norway. His research has resulted in several published papers, including works on isogeny-based key exchange, symmetric key exchange, KEM-based authenticated key exchange, and a lattice-based non-interactive key exchange, often presented at conferences like SAC2020, Asiacrypt, ACISP, and USENIX Security.Research & Academia → Academic Disciplines 93 tno 10 cryptography 31 conference 763 South-Holland → The Hague 19898
marc-stevens.nlCentrum Wiskunde & InformaticaDr. Stevens' work includes co-authoring the revised PQC Migration Handbook with AIVD, CWI, and TNO, which details the migration to post-quantum cryptography, and was presented to the State Secretary for Kingdom Relations and Digitalization. Recent research has focused on exploiting the Blast-RADIUS vulnerability, developing a significantly faster collision attack on MD5 that enabled a demonstrated Man-in-the-Middle attack against RADIUS servers. The website highlights involvement in events like the Parlement & Wetenschap Minisymposium, discussing the implications of quantum technology on information security and outlining preparedness measures.Information Technology → Cybersecurity 1009 cryptography 31 attack 31 vulnerability 149 handbook 194 symposium 339 South-Holland → The Hague 19898
jelle-vos.nlJelle VosJelle Vos is a PhD student at Delft University of Technology specializing in secure computation protocols using homomorphic encryption, particularly focusing on lattice-based cryptography and post-quantum cryptography. His research includes the development of a secure computation compiler (oraqle) and his work has been recognized through awards such as 2nd prize in the U.S. PETS Prize Challenge and acceptance of a SoK paper at IEEE S&P 2024. Currently, Jelle also works as a remote contractor for Apple, contributing to post-quantum cryptography research, and he is seeking postdoctoral opportunities or research/engineering roles.Higher Learning → Higher Education 3584 cryptography 31 phd 104 research 8967 Delft → Ruiven 33
fournier.nlfournier.nlThe first post details a method for extracting a certificate from a Windows executable using tools like 7zip and openssl, avoiding the use of Wine or Mono. The second post explains various methods for obtaining IPv6 addresses, including native assignment, tunnel brokers (specifically 6to4 and 6rd), and using DHCP options. The post provides specific configuration steps for enabling 6rd through the dhclient.conf file for testing with isc-dhcp.Computer Science → Networking 809 ipv6 15 tunnel 88 certificate 1036
vanwijheweb.nlvanWijhe.WebThe website provides custom web design solutions tailored to the specific needs and target audience of each client. The company guarantees functional web code based on the latest technologies and without unnecessary frills. Furthermore, vanWijhe.Web offers services for optimizing existing websites, providing training on web technologies, and creating responsive websites.Online Marketing → Website Optimization 265 code 509 optimization 611 target audience 1108 training 28133 Overijssel → Enschede 5554
thomwiggers.nlPQShieldThom Wiggers is currently a PhD candidate at Radboud University, specializing in post-quantum cryptography. His research focuses on the interactions of post-quantum cryptography with protocols and information security, as evidenced by his thesis and recent posts on topics like post-quantum TLS and hash-based signatures. The website also includes a record of his talks and publications, showcasing his expertise in areas such as key exchange and authentication protocols.Research → Scientific Research 243 cryptography 31 talks 37 thesis 228 protocol 237 Gelderland → Nijmegen 9384
joostrijneveld.nlRadboud UniversityJoost Rijneveld was a PhD candidate at Radboud University, Nijmegen, focusing on software implementations of post-quantum cryptography from 2015 to 2019. Since 2020, his work has shifted towards technical threat intelligence, digital forensics, and reverse engineering. The website contains write-ups from various Capture The Flag (CTF) competitions, puzzle hunts, and technical tutorials, including a dishwasher repair guide.Information Technology → Cybersecurity 1009 cryptography 31 reverse engineering 34 challenge 1697 Gelderland → Nijmegen 9384
danba.nlPQShieldOussama Danba currently works at PQShield as a Senior Cryptography Software Engineer, primarily focused on Post-Quantum Cryptography for embedded systems and hardware. He holds a Master's degree from Radboud University, with his studies heavily centered around cryptography and supplemented by software science electives. His thesis involved implementing NTRU using AVX2. Danba’s past work includes developing embedded implementations of cryptographic algorithms like Kyber, Dilithium, Saber, and NTRU within PQShield, alongside work on the PQSoC Post-Quantum Secure Element and exploring side-channel attacks and countermeasures.Mathematics → Applied Mathematics 19 cryptography 31 embedded systems 47
joostrenes.nlNXP SemiconductorsJoost Renes currently works at NXP Semiconductors in Eindhoven, Netherlands, focusing on implementing post-quantum cryptography (PQC) for embedded applications. Prior to NXP, he was a postdoctoral researcher at Radboud University in the Netherlands, where he earned his PhD on curve-based cryptography. Throughout his academic career, he has also held internships at Microsoft Research in Redmond and completed his undergraduate degree at Utrecht University.Mathematics → Applied Mathematics 19 cryptography 31 algorithms 186 university 593 security 6655 North-Brabant → Eindhoven 11845
nn8.nlMaarten EvertsThe website features recent publications on topics such as knowledge distillation, privacy, security compilers, and anomaly detection. It also showcases ongoing projects, including tools like irmatool for the IRMA ecosystem and gabi, a Go implementation. Maarten Everts' opinions expressed on the website are solely his own and do not represent those of his employer or company.Technical → Security 408 code 509 publication 2018 security 6655
pqc-spring-school.nlQSIThe school addresses the growing importance of preparing cryptography for the advent of fault-tolerant quantum computers, fueled by increasing investment in quantum computing research. Attendees will learn about various aspects of post-quantum cryptography through lectures from international experts, covering foundational concepts and advanced topics. The school offers introductory lectures suitable for individuals with a bachelor's degree in relevant fields, and includes an academic skills training for QSI fellows.Events → Conferences & Meetings 5381 cryptography 31 algorithms 186 school 7856 network 11123
nielsduif.nlNiels DuifThe website offers full texts and abstracts of publications, including the AMC 2009 issue and a master's and bachelor's project on digital signatures and security mechanisms. Various reports and presentations are available on topics such as security in e-voting (with the RIES system) and research on gypsum analysis. The website also contains a contact email address and the last update date.Research & Academia → Academic 215 signature 60 publication 2018 report 4551
wouterlueks.nlCISPA Helmholtz Center for Information SecurityWouter Lueks is currently a faculty member at the CISPA Helmholtz Center for Information Security located in Saarbrucken, Germany, and is seeking PhD students and PostDocs to join his lab. His research focuses on building secure and practical systems through applied cryptography, anonymous communication, and system's engineering, building upon previous experiences as a postdoctoral researcher at EPFL in Switzerland and a PhD student at Radboud University in the Netherlands. During his doctoral studies, he had the opportunity to collaborate with Ian Goldberg at the University of Waterloo in Canada, indicating a global network of research collaboration.Technical → Security 408 cryptography 31 phd 104 research 8967 collaboration 16036
post-quantum.nlSymposium Post-Quantum CryptographyThe website explains the urgency of replacing current cryptographic standards due to the potential threat of quantum computers to existing security methods. It details a series of symposia, beginning in April 2021, aimed at informing higher management and security professionals about the post-quantum cryptography transition. Past symposia episodes have covered topics such as quantum-safe PKI, the relationship between PQC and QKD, PQC standards, and insights from early movers in the field.Technical → Security 408 quantum computing 10 symposia 22 cryptography 31 standards 394 security 6655
ed25519.nlVerisign LabsEd25519 is a public-key signature system standardized for internet protocols, specifically detailed in RFC 8032 and 8080 for DNSSEC. It offers high security with smaller signature sizes compared to RSA, mitigating DNS amplification attacks, as demonstrated by its 64-byte signature versus RSA 2048’s 256 bytes. The website lists DNS software like BIND, dnsmasq, Knot DNS, Unbound, and PowerDNS that support or are planned to support Ed25519 for signing and validation.Technical → Security 408 cryptography 31 signature 60 dns 74 algorithm 141
erwinjanssen.nlPelicanThe website presents the Chinese remainder theorem, explaining how it solves systems of congruences and its relation to modular arithmetic. It discusses Euler's theorem and Euler's totient function, describing their applications in computing modular inverses and counting coprime integers. The site also elaborates on modular exponentiation and RSA cryptography, detailing the process of key generation, encryption, and decryption, highlighting the asymmetric nature of the RSA system based on prime number factorization.Mathematics → Number Theory 11
cryptotermen.nlCryptotermen.nlThe website provides explanations of cryptographic terms and their meanings. Users can find terms based on their starting letter or topic, or via a search function. Cryptocurrency terms are organized by category, such as Altcoins, Security, Bitcoin, Cryptocurrencies, DeFi, Economy, Emotion, Ethereum, Financing, Metaverse, Trading, Value, and Legislation.Investing → Cryptocurrency 776 abbreviation 22 blockchain 250 term 251 crypto 384 category 2316
eccentric-authentication.nlNot AvailableEccentric Authentication is a protocol designed to simplify the authentication process for users, eliminating the need for traditional passwords and complex cryptographic knowledge. The protocol ensures user anonymity by utilizing unique identifiers and employing a user agent to manage cryptographic details, preventing tracking across websites. Unlike conventional systems that require users to reveal their identity, Eccentric Authentication enables anonymous account creation without compromising security or usability.Web Design & Development → Web Technologies 34 anonymity 26 cryptography 31 authentication 48 protocol 237 identity 1028
epass.nlRockey and ePassRockey and ePass offer solutions for software copyright protection, licensing management, and authentication using FIDO and PKI technologies. Their product range includes ROCKEY Software Protection, which prevents unauthorized software use through cost-effective license dongles and developer-friendly integration, and FIDO authentication Tokens. The website emphasizes the security, ease of use, and affordability of ROCKEY technology, offering support resources and a comprehensive toolkit for software security development.Information Technology → IT Security 980 authentication 48
signsofbeauty.nlSigns of BeautyThe salon has a high rating, with over 1.5 million and 277,000 reviews. Customers can contact the salon via WhatsApp/SMS/email or by phone (with limited availability). The salon is affiliated with the recognized organization ProVoet and offers treatments such as Hyaluronpen, fillers without a needle, and tissue massage, with clear terms and conditions.Intellectual Property → Copyright 67 protocol 237 term 251 beauty 684 pedicure 2196 salon 5541 treatment 21203 South-Holland → Dordrecht 4531
anoniemblijven.nlAnoniemblijven.nlThe website covers topics such as VPNs, anonymous browsing, the use of incognito mode, and secure password generation. It explains how users can minimize their digital footprint by using techniques such as VPNs and anonymous email addresses. The website describes various VPN providers and anonymous email services like ProtonMail and Tutanota, and chat apps with end-to-end encryption like Signal and Telegram.Technical → Security 408 Legal → Privacy 596 ip address 39 browser 139 vpn 167 email 1012 privacy 1286 technique 2157
tendoc.nlTenDocTenDoc boasts extensive experience in document security and didactics globally, specializing in delivering customized solutions. The website highlights its role as an expert in providing support for Integrated Border Management (IBM) document security projects, as recognized by the International Centre for Migration Policy Development (ICMPD). TenDoc's primary focus is on document security and didactics, with an emphasis on reliability, accuracy, and experience.Insurance & Risk → Risk Management 1060 didactics 56
zerosumsecurity.nlZerosum SecurityThe website provides training on cryptography, ranging from design to code review and implementation advice. Presentations on cryptography and security are offered, along with links to valuable resources including capture-the-flag challenges. The website is an initiative of Gido Schmitz, an expert with over 15 years of experience in cryptography and security, and collaborates with various security professionals and frameworks.Technical → Security 408 cryptography 31 framework 283 resources 310 challenge 1697 security 6655 training 28133
benoit.viguier.nlABN AMROBenoit Viguier holds a PhD in Cryptography & Formal Methods and currently works as a Cryptographer at ABN AMRO in Amsterdam, The Netherlands. Prior to his current role, he was a PhD student at Radboud University in Nijmegen, where he focused on formally verifying cryptographic software, supervised by prominent researchers such as Peter Schwabe and Freek Wiedijk. The website features links to his thesis, curriculum vitae, GitHub repository, and several presentations he gave on cryptography topics, including real-world applications and formal verification techniques.Higher Learning → Higher Education 3584 cryptography 31 verification 40 phd 104 thesis 228 presentation 1785 software 8291 Gelderland → Nijmegen 9384
ko.stoffelen.nlRadboud UniversityKo Stoffelen’s PhD was conducted under the supervision of Peter Schwabe at the Digital Security group of the Institute of Computing and Information Sciences at Radboud University in Nijmegen. His research explores areas such as symmetric cryptography, optimized cryptographic implementations, and defense against side-channel attacks. The website includes links to several publications, including PhD thesis, conference papers, and code repositories related to his work.Computer Science → Software Engineering 404 cryptography 31 code 509 implementation 1029 publication 2018 Gelderland → Nijmegen 9384