To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Data processing
Reliable and upgradeable systems
Attack and defense against threats
Other
Critical infrastructures
Identity management
Lines of investigation
Vulnerability analysis of physical cryptographic devices using side channels
Biometric authentication
Cryptographic authentication
Linear complexity of pseudorandom binary sequences
Cryptanalysis of continuous and discrete chaotic cryptosystems
Cryptography and cryptanalysis of symmetric and asymmetric cipher systems
Regulatory security compliance
Development of tool protection
Information filtering
Pseudo-random bit generators
Information systems risk management
Cryptographic mechanisms for attribution, legitimacy and transparency in systems
Methods and development of protection tools
Secure processing of encrypted data and signals
Secure data processing
Cryptographic protocols: authentication, signing, secret sharing, e-votation, etc.
Authentication protocols
Security in communications and web applications
Information network security
Experimental systems for encryption and key exchange by quantum methods
Complexity theory