Blog

Authentication under PSD2: man with a credit card and a computer paying online

How does authentication work under the PSD2?

11/Nov/2019

Extended version in Ku Leuven website

Author: Danaja Fabčič Povše (KU Leuven)

header image post cryptography

Cracking down on encryption: opening the front door

12/Sep/2019

Collaborative post with Ku Leuven

Author: WIM VANDEVELDE (KU Leuven)

header image post cryptography

Obscure meaning, cryptic messages: cryptography and the law

Author: Danaja FABČIČ POVŠE (KU Leuven)

Cryptography may look like the art of transforming text into unintelligible gibberish, but in a digital society it is absolutely necessary. In very simple terms, cryptography, through the technique called encryption, prevents unauthorised third parties from seeing the original text or information. Instead, they can only access a seemingly random sequence of numbers and letters.

Functional Encription Library

Functional Encryption Library

FENTEC project provided the first fully-fledged functional encryption library. By fully-fledged we mean a library where the user can choose via an easy-to-use API between different schemes and each scheme can be instantiated from different cryptographic primitives.

FENTEC library actually comes in two flavors: GoFE is written in Go, while CiFEr is written in C.

Functional Encryption

Functional Encryption: an alternative to blockchain?

Currently there is a growing concern for privacy. Media constantly warns of the dangers of publicly exposing details of our lives. For instance, some details leak when we make digital payments and this information remains in the net. When we buy with a bank card, make payments with mobile phones or with other digital means of payment such as Paypal, a great amount of data is exchanged. This information is not only of personal nature, but it also reveals our habits and customs.