The Research group on Cryptology and Information Security (GiCSI) of
the Spanish National Research Council is seeking highly motivated
professionals in conducting research in the area of cryptographic
privacy-enhancing technologies, blockchain-based protocols and
security protocols.
¿Eres alumno de Máster o de último año de Grado?¿Tienes interés por iniciarte en la investigación en ciberseguridad? Desde el Grupo de Criptología y Seguridad de la Información del CSIC, ofertamos 3 planes de formación dentro de la convocatoria JAE-INTRO y orientados al desarrollo de competencias en blockchain y ciberseguridad (https://lnkd.in/gUPxcX3):
The Research group on Cryptology and Information Security (GiCSI) of the Spanish National Research Council is seeking highly motivated professionals in conducting research in the area of blockchain-based protocols, security protocols and cryptographic privacy-enhancing technologies.
Complexity is inherent in end-to-end e-commerce mechanisms that are
currently deployed in the real world. These mechanisms have to deal
with various important and diversified aspects of sales and payment
processes. While some aspects of e-commerce have been dealt with from
a privacy point of view, other aspects have not been addressed, and
therefore the complexity of the complete global e-commerce cycle has
been ignored. In this talk, we look at the entire transaction flow
and support procedures for e-commerce and payments, including all
parties and processes within the e-commerce ecosystem. This analysis
is intented to designing a comprehensive system by means of
privacy-preserving cryptographic tools. Simultaneously, our efforts
are on promoting a high flexible methodology by leveraging
functionality of existing processes.
The relationship between the dynamical systems theory and the
principles of cryptography was underlined by Shannon in his seminal
work about perfect secrecy. Indeed, it is possible to interpret the
main requirements of encryption systems by means of general concepts
of dynamical systems theory, as the sensitivity to initial
conditions/control parameters and the ergodicity property. However,
this relationship could imply security flaws when an attacker can link
partial information extracted from the encryption process to a subset
of the secret keys of the related cryptosystem. In this work we
highlight the outcomes of the applied theory of symbolic dynamics as a
tool to detect such a vulnerability.