• Post-Quantum Cryptography: Current state and quantum mitigation

    This study provides an overview of the current state of affairs on the standardization process of Post-Quantum Cryptography (PQC). It presents the 5 main families of PQ algorithms; viz. code-based, isogeny-based, hash-based, lattice-based and...

    Published on May 03, 2021
  • Crypto Assets: Introduction to Digital Currencies and Distributed Ledger Technologies

    This report aims to increase the understanding of blockchain technologies. It aims to explain the underlying technical concepts and how they relate to each other. The goal is to explain the components, and illustrate their use by pointing to...

    Published on February 09, 2021
  • Study on cryptographic protocols

    Cryptographic algorithms, when used in networks, are used within a cryptographic protocol. Even if the cryptographic primitives and schemes (discussed in the “Algorithms, key size and parameters” report of 2014, see link below) are deemed secure...

    Published on November 21, 2014
  • Algorithms, key size and parameters report 2014

    The “Algorithms, key size and parameters” report of 2014 is a reference document providing a set of guidelines to decision makers, in particular specialists designing and implementing cryptographic solutions for personal data protection within...

    Published on November 21, 2014
  • Securing personal data in the context of data retention

    Data retention legislation has been adopted to address concerns related to national security and serious criminal activity. The legislation provides access to communication data for law enforcement purposes. However, according to the Data Retention...

    Published on December 10, 2013
  • Security certification practice in the EU - Information Security Management Systems - A case study

    This report aims at providing input for the adoption of a framework on privacy certifications, as well as for eGovernment certification in Europe. There are numerous IT security certification schemes across the European Member States that can serve...

    Published on November 21, 2013
  • Recommended cryptographic measures - Securing personal data

    This document addresses the protection measures applied to safeguard sensitive and/or personal data, which has been acquired legitimately by a data controller. In this respect it discusses how information technology users, who have a basic knowledge...

    Published on November 04, 2013
  • Algorithms, Key Sizes and Parameters Report - 2013

    This document collates a series of recommendations for algorithms, keysizes, and parameter recommendations. It addresses the need for a minimum level of requirements for cryptography across European Union (EU) Member States (MSs) in their effort to...

    Published on October 29, 2013
  • The Use of Cryptographic Techniques in Europe

    With the increased use of e-Government services, the amount of citizens’ sensitive data being transmitted over public networks (e.g. the Internet) and stored within applications that are accessible from anywhere on the Internet has grown...

    Published on December 20, 2011

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information