Radboud University,
The Netherlands

Radboud University Nijmegen (RUN) is a private university with approximately 24000 students and is ranked as one of the top broad universities in the Netherlands. The Faculty of Science (FNWI), part of RUN, engages in groundbreaking research and excellent education, with more than 1,300 colleagues contributing to research and education, some as researchers and lecturers, others as technical and administrative support officers. The faculty has a strong international character with staff from more than 70 countries.
The Digital Security (DiS) group of FNWI is one of the leading academic research groups in computer security in the Netherlands, which carries out research in a wide range of topics in the (overlapping) fields of cybersecurity, cryptography, and privacy. The group’s research focuses on the following topics: the design and secure implementation of symmetric cryptography and post-quantum cryptography, side-channel analysis, software security, mobile network security, online tracking, privacy design patterns, legal aspects of privacy, and user- and privacy-friendly solutions for identity management and data management.
Tackling the societal challenges of security and privacy goes beyond just the technical field of computer science. Therefore, some of our research is carried out as part of the Radboud iHUB, our university’s interdisciplinary research hub on digitalisation and society. In symmetric cryptography, DiS concentrates on the design, analysis, and secure implementation of low-energy solutions. The work of the group has a high real-world impact by the adoption of their own permutation-based approach in international standards such as NIST SHA-3 and ISO/IEC lightweight hashing. DiS members have participated in the design of 3 of the 4 winners of the NIST post-quantum cryptography competition: CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+. DiS also contributes to the ongoing standardization effort by the cryptanalysis of all flavours (code-based, multivariate, lattices, isogenies, and hash-based) of post-quantum cryptography.