Matemática Aplicada a la Criptografía (MAK)
Investigation areas
Data processing
Identity management
Others
Privacy
Lines of investigation
Anonymity systems
Authentication protocols
Cryptographic authentication
Cryptographic protocols for e-voting
Cryptographic protocols: authentication, signing, secret sharing, e-votation, etc.
Data protection (confidentiality)
Lattice-based cryptography
Secret sharing schemes
Secure multipart computing
Secure processing of encrypted data and signals
Verifiable computing