|
||||
Analysis, design and evaluation of cryptographic algorithms | ||||
Symmetric cryptography and cryptanalysis of block ciphers | ||||
Security of cryptographic algorithms implementations | ||||
Design of new hash functions (NIST SHA-3 Competition) | ||||
Development and implementation of cryptographic systems | ||||
Evaluation of cryptographic mechanisms and devices | ||||
Policies and strategies in the field of cryptography and information security | ||||
Security protocols and cloud security |