• Postal addressShow on map

    Richard Petersens Plads, Building 324

    DK-2800 Kgs. Lyngby

    Denmark

Organisation profile

Organisation profile

Cybersecurity engineering focuses on the methods, processes and tools for the design, development and analysis of secure computing systems that are accessible through a network, typically the Internet, which is often known as cyberspace.

The Section for Cybersecurity Engineering aims at advancing and combining foundational and applied knowledge in cybersecurity and cryptography to address current and future scientific and societal challenges. We do that by means of cutting-edge research and research-based teaching. In particular:

  • We conduct foundational and applied research in a broad range of topics central for the design, development and testing of next-generation secure computing systems.
  • We educate new generations of engineers, scientists and IT professionals in the foundations, principles and state-of-the-art methods and technologies to address the secure development, deployment and operation of (networked) computing systems.

UN Sustainable Development Goals

In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. Our work contributes towards the following SDG(s):

  • SDG 3 - Good Health and Well-being
  • SDG 7 - Affordable and Clean Energy
  • SDG 8 - Decent Work and Economic Growth
  • SDG 9 - Industry, Innovation, and Infrastructure
  • SDG 11 - Sustainable Cities and Communities
  • SDG 12 - Responsible Consumption and Production
  • SDG 13 - Climate Action
  • SDG 16 - Peace, Justice and Strong Institutions

Fingerprint

Dive into the research topics where Cybersecurity Engineering is active. These topic labels come from the works of this organisation's members. Together they form a unique fingerprint.

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Pitfalls of Data Masking Techniques: Re-identification Attacks

    Hodžić, S., Kidmose, A. B., Kidmose, B. E., Knudsen, L. R. & Meng, W., 2026, Proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024 . Springer, Vol. 629. p. 406-428 (Security and Privacy in Communication Networks).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Round and Computational Efficiency of Multi-party Protocols

    Ciampi, M. & Siniscalchi, L., 2026, 295 p. (Information Security and Cryptography).

    Research output: Book/ReportBookResearchpeer-review

  • (Un)breakable Curses - Re-encryption in the Fujisaki-Okamoto Transform

    Hövelmanns, K., Hülsing, A., Majenz, C. & Sisinni, F., 2025, Proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2025. Springer, Vol. 15602. p. 245-274

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review