|
|
|
|
|
|
|
|
|
|
|
|
|
Analysis, design and evaluation of cryptographic algorithms |
|
|
Symmetric cryptography and cryptanalysis of block ciphers |
|
|
Security of cryptographic algorithms implementations |
|
|
Design of new hash functions (NIST SHA-3 Competition) |
|
|
Development and implementation of cryptographic systems |
|
|
Evaluation of cryptographic mechanisms and devices |
|
|
Policies and strategies in the field of cryptography and information security |
|
|
Security protocols and cloud security |
|