| danba.nl | PQShield | Oussama Danba specializes in cryptography, particularly focusing on post-quantum algorithms and secure implementations. | Mathematics → Applied Mathematics 19 Computer Science → Cryptography 27 | embedded systems 47 | |
| bordekock.nl | TNO | Bor de Kock’s primary research interest is focused on the study and development of cryptographic algorithms and techniques, specifically exploring Post-Quantum Cryptography. | Computer Science → Cryptography 27 Research & Academia → Academic Disciplines 93 | tno 10 conference 763 | South-Holland → The Hague 19898 |
| jelle-vos.nl | Jelle Vos | Jelle Vos’s research focuses on various aspects of cryptography, including homomorphic encryption and post-quantum cryptography, with a specific interest in lattice-based cryptography. | Computer Science → Cryptography 27 Higher Learning → Higher Education 3584 | phd 104 research 8967 | Delft → Ruiven 33 |
| thomwiggers.nl | PQShield | Thom Wiggers is a researcher specializing in cryptography, particularly focusing on post-quantum cryptographic techniques. | Research → Scientific Research 243 Computer Science → Cryptography 27 | talks 37 thesis 228 protocol 237 | Gelderland → Nijmegen 9384 |
| pqc-spring-school.nl | QSI | Post-quantum cryptography focuses on designing algorithms resistant to attacks from future quantum computers. | Computer Science → Cryptography 27 Events → Conferences & Meetings 5381 | algorithms 186 school 7856 network 11123 | |
| post-quantum.nl | Symposium Post-Quantum Cryptography | Cryptography is fundamental to internet security, but current methods are vulnerable to quantum attacks, necessitating a shift to post-quantum alternatives. | Technical → Security 408 Computer Science → Cryptography 27 | quantum computing 10 symposia 22 standards 394 security 6655 | |
| marc-stevens.nl | Centrum Wiskunde & Informatica | Dr. Stevens’ research primarily centers on cryptography, specifically investigating and developing techniques to enhance security in the face of evolving threats. | Information Technology → Cybersecurity 1009 Computer Science → Cryptography 27 | attack 31 vulnerability 149 handbook 194 symposium 339 | South-Holland → The Hague 19898 |
| joostrenes.nl | NXP Semiconductors | Joost Renes’s work centers around the development and implementation of cryptographic techniques, particularly focusing on post-quantum cryptography to address future security challenges. | Mathematics → Applied Mathematics 19 Computer Science → Cryptography 27 | algorithms 186 university 593 security 6655 | North-Brabant → Eindhoven 11845 |
| zerosumsecurity.nl | Zerosum Security | Cryptography is a central element of the offering, and the website focuses on maximizing the value and minimizing the risks associated with its use. | Technical → Security 408 Computer Science → Cryptography 27 | framework 283 resources 310 challenge 1697 security 6655 training 28133 | |
| benoit.viguier.nl | ABN AMRO | Benoit Viguier specializes in cryptography, developing and researching techniques for secure communication and data protection. | Computer Science → Cryptography 27 Higher Learning → Higher Education 3584 | verification 40 phd 104 thesis 228 presentation 1785 software 8291 | Gelderland → Nijmegen 9384 |
| cryptophobia.nl | cryptophobia.nl | The author has been working in cryptography since 1999 and declares themselves cured of cryptophobia, illustrating the author’s expertise in the field. | Information Technology → Cybersecurity 1009 Legal → Privacy 596 | encryption 50 privacy 1286 article 6000 blog 13392 | |
| jorritkleinbramel.nl | Jorrit Klein Bramel | The website contains detailed explanations of RSA cryptography and related concepts. | Software Development & Engineering → Programming Languages 735 Technology → Data Science & Analytics 3748 | data science 193 programming 575 technology 6816 | |
| montelbaan.nl | Montelbaan | Cryptography is a discipline focused on securing information through encryption and decryption. | Consulting → Technical Consulting 382 Information Technology → Cybersecurity 1009 | biometrics 11 data science 193 risk analysis 217 architecture 3223 technology 6816 | |
| ko.stoffelen.nl | Radboud University | Ko Stoffelen’s research centers around the design and implementation of cryptographic algorithms and protocols. | Computer Science → Cryptography 27 Computer Science → Software Engineering 404 | code 509 implementation 1029 publication 2018 | Gelderland → Nijmegen 9384 |
| mtcvenema.nl | University of Wuppertal | Marloes Venema's research primarily focuses on the design and analysis of various cryptographic primitives, including attribute-based encryption schemes. | Computer Science → Cryptography 27 | research 8967 | Gelderland → Nijmegen 9384 |
| xavamedia.nl | XavaMedia BV | XavaMedia BV’s experience includes implementing robust cryptography solutions, demonstrating a deep understanding of secure coding practices. | Computer Science → Software Engineering 404 Software Development & Engineering → Programming Languages 735 | rust 72 consultancy 2596 | |
| 0pi.nl | mndell | The individual's interests include the study and application of cryptography for secure communication and data protection. | Technical → Security 408 Legal → Privacy 596 | osint 12 privacy 1286 tool 3907 data 5872 security 6655 | |
| scriptjr.nl | SCRIPTjr.nl | SCRIPTjr.nl investigates and presents materials related to cryptography and coded communication. | Software & Computing → Cryptography 13 Culture → Literature 3578 | resources 310 script 532 interview 1371 text 2467 | |
| joostrijneveld.nl | Radboud University | Joost Rijneveld’s PhD research focused on implementing post-quantum cryptography algorithms, contributing to the PQCRYPTO project. | Information Technology → Cybersecurity 1009 Computer Science → Cryptography 27 | reverse engineering 34 challenge 1697 | Gelderland → Nijmegen 9384 |
| jobdoesburg.nl | Radboud University Nijmegen | He specifically investigates PEP cryptography, a framework designed to balance data utility with robust privacy protection. | Data Science & Analytics → Artificial Intelligence 1831 Technology & IT → Educational Technology 380 | data processing 36 identity 1028 graphic design 2042 security 6655 research 8967 | Gelderland → Nijmegen 9384 |
| javadb.nl | Stuff I Do | The proposed solution for financial crime detection relies on public-key cryptography for data protection. | Computer Science → Software Engineering 404 Software Development & Engineering → Programming Languages 735 | mobile app 126 web application 609 | |
| wouterlueks.nl | CISPA Helmholtz Center for Information Security | Wouter Lueks’s research utilizes applied cryptography to develop secure systems. | Technical → Security 408 Computer Science → Cryptography 27 | phd 104 research 8967 collaboration 16036 | |
| ed25519.nl | Verisign Labs | Cryptography underpins the Ed25519 algorithm, offering a secure method for verifying data integrity and authenticity. | Technical → Security 408 Computer Science → Cryptography 27 | signature 60 dns 74 algorithm 141 | |
| thirion.nl | Thirion Information Engineering | A key component of the website is cryptography, the art of encrypting information to keep it confidential. | Technical → Security 408 Government & Administration → Digital Government 86 | information security 217 knowledge 3528 | |
| rb9.nl | Khaled | He explores the field of cryptography as part of his broader cybersecurity interests. | Information Technology → Cybersecurity 1009 Science → Computer Science 2413 | vulnerability 149 programming 575 cybersecurity 688 | |
| mrtijn.nl | Martijn | The website highlights Martijn’s expertise in cryptography, a field concerned with secure communication and data encryption. | Computer Science → Networking 809 Computer Science → Software Engineering 404 | github 108 information security 217 software 8291 blog 13392 | |
| sbd-research.nl | Security By Design (SBD) | Cryptography is a central component of their work, focusing on efficient and effective methods for data protection. | Technical → Security 408 Information Technology → Cybersecurity 1009 | verification 40 hardware 941 security 6655 course 14728 | North-Holland → Amsterdam 41253 |
| eccentric-authentication.nl | Not Available | The system employs cryptography to ensure security, while simplifying complex details for the user. | Web Design & Development → Web Technologies 34 Computer Science → Cryptography 27 | anonymity 26 authentication 48 protocol 237 identity 1028 | |
| fresta.nl | FRESTA ICT | FRESTA ICT offers services in the field of cryptography, likely for data security. | Computer Science → Software Engineering 404 Software Development & Engineering → DevOps 429 | architecture 3223 software 8291 | |
| spipm.graa.nl | Spip | The author explores the complexities of cryptographic control and its regulatory challenges. | Information Technology → Cybersecurity 1009 Programming → Software Development 45 | ctf 10 plugins 123 report 4551 | |
| techblog.hamal.nl | techblog.hamal.nl | The blog delves into cryptographic concepts, specifically ECC, used in Bitcoin transaction signing. | Operating Systems → Linux 255 Software Development & Engineering → DevOps 429 | password 213 bitcoin 359 container 1709 | |