Veilige ICT

  • Dooms, Ann (Administrative Promotor)
  • De Bosschere, Koenraad (Co-Promotor)
  • Storme, Leo (Co-Promotor)
  • Piessens, Frank (Co-Promotor)
  • Rijmen, Vincent (Coördinator)

Project Details


Our world is becoming ever more dependent on information technologies for all aspects of society; at the same time we are witnessing an increasing number of threats and incidents related to information security and privacy. This context creates a growing need for fundamental research on the security of information and ICT systems. Belgium has a very strong research tradition and a worldwide recognition as a center of expertise in cryptology, watermarking and information security. One example is the selection of the Rijndael algorithm as the US Government standard AES; one decade after its adoption AES has become the worldwide de facto standard encryption algorithm. In the BCRYPT Project P6/26 ('07- '11), a strong collaboration among key academic partners in Belgium has been created; in the next phase of the IAP, we want to build on these strengths and expand the network with promising emerging research groups that are active on the same or related topics.
Information security depends on a broad range of technologies, and for this reason the project brings together researchers from multiple disciplines. The project main focus is on two core technologies, namely cryptology and watermarking. Research on cryptology and digital watermarking relies on the study of discrete mathematics including algebraic number theory, coding theory and geometry. The objective of the research in this area will be to analyze cryptographically relevant nonlinear functions, the study of interactions between coding theory and cryptology and the study of hard computational problems. Cryptology is the scientific discipline that uses mathematical techniques to secure digital information. In the area of cryptology, research will be performed on symmetric cryptographic algorithms (better security analysis and models for hash functions, block ciphers and stream ciphers and design and analysis of lightweight algorithms), public key algorithms that are resistant even if quantum computers can be built, and provably secure and privacy-friendly cryptographic protocols. Watermarking uses advanced signal processing techniques to protect analog signals (such as video and audio) and digital data by inserting digital marks. The specific research objectives will be to study the security of forensic watermarks against collusion attacks, the creation of marks and perceptual hash values for 3-D surfaces of objects, and the development of an information theoretic framework of multimodal watermarks linking coherent groups of signals (images, sound, text, and software). There are also major scientific challenges to be overcome when the solutions developed are implemented. For embedded implementations, a key challenge is the modeling and analysis of physical attacks on embedded cryptographic implementations, as well as the development of effective countermeasures; a second objective is the exploration of design tradeoffs, with in particular the goal of lightweight implementations (gate count/power/energy) and high end implementations for large infrastructures; a third objective is how to exploit the interaction of unique physical properties of hardware for security applications (e.g. Physical Unclonable Functions or PUFS). For software implementations, the research objectives will be the automatic hardening of software implementations (in particular for cryptographic tools), the improvement of the security of web applications and services and the study of techniques to support security throughout the software life cycle.
As the research areas are different, each theme will use the research methodology appropriate for this domain. However, we expect a strong benefit from the collaborations; note also that most research groups will be involved in at least two themes. There will be extensive project level activities such as seminars, PhD days, 1-week training programs, workshops, and brainstorm sessions. Exchange visits between the partners will be strongly encouraged, as well as co- supervision of Phd thesis. The network will also centralize offers for employment and internships and will create a connection with the many alumni via a social network. In order to strengthen and focus the collaboration and stimulate new lines of research, each year an emerging application areas will be chosen (e-voting, smart energy, e-health) for a special workshop. An international advisory board will be established to advise the network on strategic research issues.
Effective start/end date1/01/1231/12/16


  • Low Power Cmos
  • Numerical Linear Algebra
  • Digital Image Processing
  • Image Reconstruction
  • Embedded System Design
  • Displays
  • Audio Processing
  • Light Detectors
  • Micro-Electronics Technology
  • Sige Bicmos Design
  • Satellite Image Analysis
  • Medical Image Analysis
  • Inverse Problems
  • Telemedicine
  • JPEGx
  • Video Compression
  • Neural Networks
  • Mine Detection
  • Vision
  • Digital Signal Processing
  • Electronic System Design
  • Machine Vision
  • Micro Electronics
  • Chip Interconnects (Inter / Intra)
  • Cmos Design
  • Humanitarian Demining
  • Speech Processing
  • Mpegx
  • Light Emitters
  • Pattern Recognition
  • Mm-Wave Technology
  • Robot Vision
  • Impedance Tomography
  • Image Compression
  • Light Modulators
  • Medical Image Visualization
  • Opto-Electronics
  • Motion Estimation And Tracking
  • Computer Aided Electronic Design
  • Multispectral Image Analysis
  • Electronics
  • Computer Vision
  • Image Processing
  • Industrial Visual Inspection
  • Image Analysis

Flemish discipline codes in use since 2023

  • Biological system engineering
  • Applied mathematics in specific fields
  • Nanotechnology
  • Multimedia processing
  • Electronics
  • Materials science and engineering