-
Symmetric cryptographic algorithms
-
Asymmetric cryptographic algorithms and digital signatures
-
Hash functions
-
Information-theoretic security
-
Advanced topics in cryptography (functional cryptography, homomorphic cryptography, ...)
Implementation of cryptographic algorithms and related attacks
-
Software and hardware implementation of cryptographic algorithms
-
Side channel attacks and countermeasures
-
Embedded cryptographic systems
-
Hardware tampering and countermeasures
-
Cryptographic hardware accelerators
-
Cryptographic implementation analysis
Security protocols
-
Authentication and identification protocols
-
Zero-knowledge protocols and proofs
-
Secure multiparty computation
-
Designing new security protocols
-
Cryptanalysis of security protocols
-
Attacks against security protocols
-
Formal verification of security protocols
Security methods and models
-
Access control and authorization
-
Anonymity, privacy, and trust management
-
Security and privacy policies and metrics
-
Threat modeling and analysis
-
Formal methods and models
Network security
-
Mobile and wireless network security
-
Network infrastructure security
-
Network intrusion detection and prevention
-
Denial-of-service attacks and countermeasures
-
Security analysis of network protocols
Security of computation
-
Hardware security
-
Operating system security
-
Database security
-
Web security
-
Mobile application security
-
Fuzzing and vulnerability discovery
-
Malware Analysis
Security and privacy management
-
Information security management system
-
Security architectures
-
Risk management
-
E-business and e-banking security
-
E-health security
-
E-learning security
-
Privacy-enhancing technologies
Information hiding
Digital forensics
Recent topics in cryptography and cybersecurity
-
Quantum and post-quantum cryptography
-
Blockchain technology and cryptocurrencies
-
Internet of Things (IoT), big data and cloud security
-
Cyber-physical systems security
-
Artificial Intelligence (AI) security and privacy
-
Adversarial machine learning
-
Security of social networks, metaverse, and augmented reality-based systems