Projects
T-EX: Technology-based exercise protocols for knee osteoarthritis: A computational modeling framework combined with wearable technology, to support patient-specific exercise protocols in knee OA patients. KU Leuven
Osteoarthritis (OA) is the most common chronic joint disease, for which no cure exists to reverse or stop progression. Joint loading plays an important role in cartilage homeostasis and therefore atypical joint loading is known to accelerate OA progression. Patientspecific exercise protocols, aiming to restore typical joint loading during daily life activities, therefore, holds the potential to slow down OA progression. We will leverage the ...
On Practical Threshold Protocols and Verifiable Secret Sharing KU Leuven
In today’s IT world, data holds immense importance, but it also brings significant security and privacy challenges. There are few challenges to achieve the confidentiality of data. To protect data, encryption is used to keep it safe, but it can complicate data processing. To address this issue, privacy enhancing technologies, such as multi-party computation (MPC), emerge as pivotal solutions. MPC empowers parties to perform secure data ...
Optimization of cleaning and disinfection protocols in animal farming Research Institute for Agriculture, Fisheries and Food
The main purpose of this project is to set up and test optimized and alternative protocols for cleaning and disinfection (C&D) in hen houses, pig barns and dairy barns. Furthermore, an optimized measurement tool is designed to evaluate the effectiveness of these protocols. Cleaning and disinfection (C&D) of the stables is associated with a good hygiene management on the farm. The ultimate ...
Universally composable privacy-preserving cryptographic protocols. KU Leuven
We also show that currently deployed e-commerce protocols reveal to service providers user personal data such as ...
Analyzing and Improving Proof-of-Work Consensus Protocols KU Leuven
The last decade witnessed the rise of permissionless blockchains. Requiring no prior knowledge of the participants' identities, these decentralized systems are advocated as a promising solution to many real-world problems. Unfortunately, the security of deployed permissionless blockchains is inferior to their permissioned peers, where the participants' identities are public and verified. Neither is their performance comparable with ...
Design and implementation of secure distance bounding protocols KU Leuven
Distance Bounding protocols enable a verifier to establish an upper-bound on the distance to an untrusted prover. Distance bounding protocols offer an effective countermeasure against relay attacks in wireless authentication protocols. One of the most difficult research challenges is how to realize a distance bounding protocol in practice. This requires carefully combining cryptographic protocols with physical layer techniques. The goal of ...
Securing network protocols and their implementations KU Leuven
Securing interconnected devices has become a vital but error-prone task. Unfortunately, vulnerabilities can be present in both the design and implementation of the network protocol that devices use to communicate. This project explores three areas to better secure network protocols. First, research will be done on techniques to discover logical implementation flaws in network protocols implementations. This will be done by relying on software ...
Securing network protocols and their implementations KU Leuven
Distributed Protocols from Isogenies KU Leuven
Public-key cryptography, which allows parties to communicate securely without the need of establishing a secret beforehand, has proven to be invaluable in the age of the internet and has become central in the daily lives of billions of users, protecting not only their privacy, but also mitigating the risks from fraud, theft or misuse. The security of public-key cryptography fundamentally relies on mathematical problems that are considered to ...