31 Websites:Organisations:Summaries:Related categories:Related keywords:Related locations:
danba.nlPQShieldOussama Danba specializes in cryptography, particularly focusing on post-quantum algorithms and secure implementations.Mathematics → Applied Mathematics 19 Computer Science → Cryptography 27 embedded systems 47
bordekock.nlTNOBor de Kock’s primary research interest is focused on the study and development of cryptographic algorithms and techniques, specifically exploring Post-Quantum Cryptography.Computer Science → Cryptography 27 Research & Academia → Academic Disciplines 93 tno 10 conference 763 South-Holland → The Hague 19898
jelle-vos.nlJelle VosJelle Vos’s research focuses on various aspects of cryptography, including homomorphic encryption and post-quantum cryptography, with a specific interest in lattice-based cryptography.Computer Science → Cryptography 27 Higher Learning → Higher Education 3584 phd 104 research 8967 Delft → Ruiven 33
thomwiggers.nlPQShieldThom Wiggers is a researcher specializing in cryptography, particularly focusing on post-quantum cryptographic techniques.Research → Scientific Research 243 Computer Science → Cryptography 27 talks 37 thesis 228 protocol 237 Gelderland → Nijmegen 9384
pqc-spring-school.nlQSIPost-quantum cryptography focuses on designing algorithms resistant to attacks from future quantum computers.Computer Science → Cryptography 27 Events → Conferences & Meetings 5381 algorithms 186 school 7856 network 11123
post-quantum.nlSymposium Post-Quantum CryptographyCryptography is fundamental to internet security, but current methods are vulnerable to quantum attacks, necessitating a shift to post-quantum alternatives.Technical → Security 408 Computer Science → Cryptography 27 quantum computing 10 symposia 22 standards 394 security 6655
marc-stevens.nlCentrum Wiskunde & InformaticaDr. Stevens’ research primarily centers on cryptography, specifically investigating and developing techniques to enhance security in the face of evolving threats.Information Technology → Cybersecurity 1009 Computer Science → Cryptography 27 attack 31 vulnerability 149 handbook 194 symposium 339 South-Holland → The Hague 19898
joostrenes.nlNXP SemiconductorsJoost Renes’s work centers around the development and implementation of cryptographic techniques, particularly focusing on post-quantum cryptography to address future security challenges.Mathematics → Applied Mathematics 19 Computer Science → Cryptography 27 algorithms 186 university 593 security 6655 North-Brabant → Eindhoven 11845
zerosumsecurity.nlZerosum SecurityCryptography is a central element of the offering, and the website focuses on maximizing the value and minimizing the risks associated with its use.Technical → Security 408 Computer Science → Cryptography 27 framework 283 resources 310 challenge 1697 security 6655 training 28133
benoit.viguier.nlABN AMROBenoit Viguier specializes in cryptography, developing and researching techniques for secure communication and data protection.Computer Science → Cryptography 27 Higher Learning → Higher Education 3584 verification 40 phd 104 thesis 228 presentation 1785 software 8291 Gelderland → Nijmegen 9384
cryptophobia.nlcryptophobia.nlThe author has been working in cryptography since 1999 and declares themselves cured of cryptophobia, illustrating the author’s expertise in the field.Information Technology → Cybersecurity 1009 Legal → Privacy 596 encryption 50 privacy 1286 article 6000 blog 13392
jorritkleinbramel.nlJorrit Klein BramelThe website contains detailed explanations of RSA cryptography and related concepts.Software Development & Engineering → Programming Languages 735 Technology → Data Science & Analytics 3748 data science 193 programming 575 technology 6816
montelbaan.nlMontelbaanCryptography is a discipline focused on securing information through encryption and decryption.Consulting → Technical Consulting 382 Information Technology → Cybersecurity 1009 biometrics 11 data science 193 risk analysis 217 architecture 3223 technology 6816
ko.stoffelen.nlRadboud UniversityKo Stoffelen’s research centers around the design and implementation of cryptographic algorithms and protocols.Computer Science → Cryptography 27 Computer Science → Software Engineering 404 code 509 implementation 1029 publication 2018 Gelderland → Nijmegen 9384
mtcvenema.nlUniversity of WuppertalMarloes Venema's research primarily focuses on the design and analysis of various cryptographic primitives, including attribute-based encryption schemes.Computer Science → Cryptography 27 research 8967 Gelderland → Nijmegen 9384
xavamedia.nlXavaMedia BVXavaMedia BV’s experience includes implementing robust cryptography solutions, demonstrating a deep understanding of secure coding practices.Computer Science → Software Engineering 404 Software Development & Engineering → Programming Languages 735 rust 72 consultancy 2596
0pi.nlmndellThe individual's interests include the study and application of cryptography for secure communication and data protection.Technical → Security 408 Legal → Privacy 596 osint 12 privacy 1286 tool 3907 data 5872 security 6655
scriptjr.nlSCRIPTjr.nlSCRIPTjr.nl investigates and presents materials related to cryptography and coded communication.Software & Computing → Cryptography 13 Culture → Literature 3578 resources 310 script 532 interview 1371 text 2467
joostrijneveld.nlRadboud UniversityJoost Rijneveld’s PhD research focused on implementing post-quantum cryptography algorithms, contributing to the PQCRYPTO project.Information Technology → Cybersecurity 1009 Computer Science → Cryptography 27 reverse engineering 34 challenge 1697 Gelderland → Nijmegen 9384
jobdoesburg.nlRadboud University NijmegenHe specifically investigates PEP cryptography, a framework designed to balance data utility with robust privacy protection.Data Science & Analytics → Artificial Intelligence 1831 Technology & IT → Educational Technology 380 data processing 36 identity 1028 graphic design 2042 security 6655 research 8967 Gelderland → Nijmegen 9384
javadb.nlStuff I DoThe proposed solution for financial crime detection relies on public-key cryptography for data protection.Computer Science → Software Engineering 404 Software Development & Engineering → Programming Languages 735 mobile app 126 web application 609
wouterlueks.nlCISPA Helmholtz Center for Information SecurityWouter Lueks’s research utilizes applied cryptography to develop secure systems.Technical → Security 408 Computer Science → Cryptography 27 phd 104 research 8967 collaboration 16036
ed25519.nlVerisign LabsCryptography underpins the Ed25519 algorithm, offering a secure method for verifying data integrity and authenticity.Technical → Security 408 Computer Science → Cryptography 27 signature 60 dns 74 algorithm 141
thirion.nlThirion Information EngineeringA key component of the website is cryptography, the art of encrypting information to keep it confidential.Technical → Security 408 Government & Administration → Digital Government 86 information security 217 knowledge 3528
rb9.nlKhaledHe explores the field of cryptography as part of his broader cybersecurity interests.Information Technology → Cybersecurity 1009 Science → Computer Science 2413 vulnerability 149 programming 575 cybersecurity 688
mrtijn.nlMartijnThe website highlights Martijn’s expertise in cryptography, a field concerned with secure communication and data encryption.Computer Science → Networking 809 Computer Science → Software Engineering 404 github 108 information security 217 software 8291 blog 13392
sbd-research.nlSecurity By Design (SBD)Cryptography is a central component of their work, focusing on efficient and effective methods for data protection.Technical → Security 408 Information Technology → Cybersecurity 1009 verification 40 hardware 941 security 6655 course 14728 North-Holland → Amsterdam 41253
eccentric-authentication.nlNot AvailableThe system employs cryptography to ensure security, while simplifying complex details for the user.Web Design & Development → Web Technologies 34 Computer Science → Cryptography 27 anonymity 26 authentication 48 protocol 237 identity 1028
fresta.nlFRESTA ICTFRESTA ICT offers services in the field of cryptography, likely for data security.Computer Science → Software Engineering 404 Software Development & Engineering → DevOps 429 architecture 3223 software 8291
spipm.graa.nlSpipThe author explores the complexities of cryptographic control and its regulatory challenges.Information Technology → Cybersecurity 1009 Programming → Software Development 45 ctf 10 plugins 123 report 4551
techblog.hamal.nltechblog.hamal.nlThe blog delves into cryptographic concepts, specifically ECC, used in Bitcoin transaction signing.Operating Systems → Linux 255 Software Development & Engineering → DevOps 429 password 213 bitcoin 359 container 1709