Matemática Aplicada a la Criptografía (MAK)

Investigation areas

Data processing

Identity management

Others

Privacy

Lines of investigation

Anonymity systems

Authentication protocols

Cryptographic authentication

Cryptographic protocols for e-voting

Cryptographic protocols: authentication, signing, secret sharing, e-votation, etc.

Data protection (confidentiality)

Lattice-based cryptography

Secret sharing schemes

Secure multipart computing

Secure processing of encrypted data and signals

Verifiable computing