Prof. Dr. Peter Y. A. Ryan
![]() |
|
||||||
Faculté ou Centre | Faculté des Sciences, des Technologies et de Médecine | ||||||
Department | Département Informatique | ||||||
Adresse postale |
Université du Luxembourg Maison du Nombre 6, Avenue de la Fonte L-4364 Esch-sur-Alzette |
||||||
Bureau sur le campus | MNO, E02 0235-060 | ||||||
![]() |
|||||||
Téléphone | (+352) 46 66 44 5667 | ||||||
Video |
![]() Prof. Peter Ryan (SnT)
|
||||||
In February of 2009, Peter Ryan took up a position as full Professor of Applied Security at the University of Luxembourg. He has over 20 years of experience in cryptography, information assurance and formal verification. He pioneered the application of process algebras to modelling and analysis of secure systems, presenting the first process algebra (CSP) formulation of non-interference at the Computer Security Foundations Workshop in 1989. In 1993, while at DRA, he initiated and led the "Modelling and Analysis of Security Protocols" research project that developed the process algebraic and model-checking approach to the analysis of security protocols. This project broke away from the trend of employing bespoke analysis frameworks such as the epistemic BAN-logic and used mainstream formal methods notations and tools. Notable achievements of this project were the discovery by Gavin Lowe of the now famous flaw in the Needham-Schroeder Public Key protocol that had lain undiscovered for around 17 years.
Ryan has published extensively on cryptography, cryptographic protocols, mathematical models of computer security and, most recently, high assurance voting systems. He is the creator of Prêt à Voter, Pretty Good Democracy (with Vanessa Teague) and OpenVote (with Feng Hoa) and Selene (with P Roenne and V Iovino) verifiable voting schemes. With Feng Hao he proposed the Password Authenticated Key Establishment Protocol J-PAKE.
Prior to joining the University of Luxembourg he was a Professor of Computing Science at Newcastle University. He has worked at GCHQ, the Defence Research Agency, the Stanford Research Institute, Cambridge and the Software Engineering Institute, CMU Pittsburgh.
He holds a PhD in mathematical physics from the University of London.
Peter Ryan has been on program committees of numerous prestigious security conferences, notably: IEEE Security and Privacy, IEEE Computer Security Foundations Workshop, the European Symposium On Research In Computer Security (ESORICS), WITS (Workshop on Issues in Security). He was Chair of WITS’04 (Workshop on Issues in the Theory of Security) and Co-chair of ESORICS in 2004 and 2015, co-chair of Frontiers of Electronic Elections FEE 2005, Chair WOTE 2007 (Workshop On Trustworthy Elections). From 1999 to 2007 he was the Chair of the ESORICS Steering Committee. He founded and co-chaired the new workshop series Voting’16 and Voting’17 in association with Financial Crypto.
He is a Visiting Professor at the University of Surrey and the ENS Paris.
Research topics: Information assurance, cryptography, cryptographic protocols, design and analysis of secure systems and properties, analysis of information flow, fully verifiable voting schemes, quantum cryptography and the socio-technical aspects of security.
- The book "Modelling and Analysis of Security Protocols" is now available online
- “The New Codebreakers”, Festschrift in honour of David Kahn, Springer
- to appear: “Real-World Electronic Voting”, CRC Press
Last updated on: jeudi 07 novembre 2019

2022

; ; ;
in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) (2022, February), 2022(2), 41-68
2021

; ; ; ;
in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) (2021, August), 2021(4), 618-649

; ; ;
in 2021 Design, Automation and Test in Europe Conference and Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021, Proceedings (2021, February)

; ; ; ;
in Bulletin of The Polish Academy of Sciences: Technical Science (2021), 69(4), 137724

; ; ; ;
in Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (2021)

; ; ; ; ;
in ACM Transactions on Computer-Human Interaction (2021), 28(5), 1-36

; ; ;
in Obaidat, Mohammad S.; Ben-Othman, Jalel (Eds.) E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers. (2021, October)

; ; ;
in Electronic Voting, Sixth International Joint Conference, E-Vote-ID 2021, Bregenz, Austria, October 5-8 (2021, October)
2020

; ; ;
in Liardet, Pierre-Yvan; Mentens, Nele (Eds.) Smart Card Research and Advanced Applications, 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers (2020, November)

; ; ; ;
in Dunkelman, Orr; Jacobson Jr., Michael J.; O'Flynn, Colin (Eds.) Selected Areas in Cryptography, 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (2020, October)

; ; ; ; ;
in Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings (2020)

; ; ; ; ;
E-print/Working paper (2020)

; ; ;
in 2020 IEEE 33rd Computer Security Foundations Symposium (2020)

; ; ;
in Proceedings of the Fifth International Joint Conference on Electronic Voting E-VOTE-ID 2020 (2020)

; ; ; ;
E-print/Working paper (2020)

; ; ;
in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (2020)

; ;
in International Conference on Financial Crypto Workshop on Advances in Secure Electronic Voting (2020, February)
2019

; ; ; ; ;
in Innovative Security Solutions for Information Technology and Communications (2019, November 14)

; ; ; ;
in Laurent, Maryline; Giannetsos, Thanassis (Eds.) Information Security Theory and Practice, 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (2019, December)

; ; ;
E-print/Working paper (2019)

; ; ; ; ;
in Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019) (2019, April)

; ;
in Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (2019)

; ; ;
in Information Systems Security and Privacy (2019, July)

; ; ;
in An offline dictionary attack against zkPAKE protocol (2019)

; ; ; ;
in Lecture Notes in Computer Science (2019, February)

; ; ;
in International Joint Conference on Artificial Intelligence (IJCAI 2019), Macao 10-16 August 2019 (2019)

; ; ; ; ;
in Electronic Voting (2019, October)
2018

; ; ; ; ; ;
E-print/Working paper (2018)

; ; ;
E-print/Working paper (2018)

; ; ;
in Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (2018, November 02)

; ;
in Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (2018)

; ;
in Advances in Cybersecurity 2018 (2018)

; ; ;
in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

; ;
E-print/Working paper (2018)

; ; ; ; ;
in Advanced Materials (2018)

; ; ;
Poster (2018, October)
2017

; ;
in Advances in Cybersecurity 2017 (2017)

; ; ;
in Workshop on Advances in Secure Electronic Voting (VOTING'17) (2017, April 07)

; ; ; ; ; ;
in Proc. of the 9th IEEE Workshop on Information Forensics and Security (2017, October 02)
2016

; ; ; ; ;
Book published by Springer (2016)

; ; ;
E-print/Working paper (2016)

;
Book published by Auerbach Publications (2016)

in The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (2016)

; ;
Book published by Springer (2016)

; ;
in Abstract book of 1st Workshop on Advances in Secure Electronic Voting (2016), 2015

; ;
in The International Workshop on AI for Privacy and Security (PrAISe), 2016. (2016)
2015

; ;
in Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (2015, November 25)

; ; ;
in ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 (2015)

; ; ; ; ;
in Communications in Computer and Information Science (2015), 554

; ;
in Abstract book of 1st Workshop on Advances in Secure Electronic Voting (2016), 2015

; ;
in IEEE Security and Privacy (2015), 13(3), 59-62
2014

; ;
in Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014 (2014)

; ; ; ; ;
in SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 (2014)

; ;
in Security Protocols XXII - Lecture Notes in Computer Science (2014)

; ; ; ; ;
in IACR Cryptology ePrint Archive (2014)
2013

; ; ; ; ;
in Journal of Election Technology and Systems (2013), 2(1),

; ;
in USENIX Journal of Election Technology and Systems (2013), 1(1), 62-81

; ; ;
in Computer And Information Security Handbook (2013)

; ;
in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013)

;
in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013)

; ; ;
in 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2013)

; ;
in International Journal of Approximate Reasoning (2013), 54(1), 228-251

; ; ; ; ;
in 53 USENIX Journal of Election Technology and Systems (JETS) (2013), 1(1), 53-61

; ; ; ; ;
in USENIX Journal of Election Technology and Systems (JETS) (2013), 2(1),
2012

; ; ; ; ; ; ; ; ;
in EVOTE 2012 (2012)

;
in Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on (2012)

; ; ; ; ; ; ; ; ;
in Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (2012)
2011

; ; ;
Book published by IEEE (2011)

;
in 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE) (2011)
2010

; ; ; ; ; ;
in Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (2010)