We produce scientific research for projects where theoretical results are applied in practice.

Our scientists work closely with engineers and thanks to such cooperation, several technologies that originally appeared the stuff of science-fiction, are now an irreplaceable part of our daily lives such as trusted digital signatures, timestamping, internet voting and secure multi-party computation.

Past projects:

DATABIO

DataBio demonstrates that enabling data-driven decisionmaking in agriculture, forestry and fishing increases productivity and has a measurable impact to both the economy and the environment.

ELIKO

Development a radio surveillance platform and an adaptive radio network.

NAPLES

NAPLES demonstrates how to seamlessly add security analysis and optimization capabilities on top of Business Process Management tools.

IUT27-1

IUT27-1 is centered on systems’ security with a focus on Secure Multiparty Computation, Structured Risk Assessment of information and related systems, and Internet voting.

OCEAN2020

The support of maritime surveillance and interdiction missions.

PRACTICE

PRACTICE will mitigate insider threats and stop data leakage for computations in the cloud while maintaining economies of scale.

PRIST

Privacy-preserving statistical studies on linked databases.

SafeCloud

SafeCloud aimed to re-architect cloud infrastructures with a focus on partitioning and entanglement.

SUNFISH

The SUNFISH project will develop and integrate software enabling secure cloud federation as required by European Public Sector bodies.

TREsPASS

The goal of TREsPASS was to create a mart ‘attack navigator’, which will trace potential weak points within an organization or a given infrastructure.

UaESMC

The UaESMC project focused on methods for making secure computation more practical in the real world.

MANTICUS APOLLO

MANTICUS APOLLO focused on creating the theoretical foundation for a transnational and comprehensive situational awareness capability for coordinating national defense.

SYSFLEX

SysFlex will identify issues and solutions associated with integrating large-scale renewable energy and create a plan to assist system operators across Europe.

INTERFACE

INTERFACE aims to achieve greater coordination between TSOs and DSOs to ensure a cost-effective and secure supply of electricity.

M-VOTING

Analysing the changes in e-voting risk analysis in a situation where voting from a smart device is possible.

BELIEVE

Analyzing the impact of biometric facial recognition measures on the e-voting system in ensuring freedom of choice and its applicability in the Estonian e-voting system

EIS

The Estonian information security standard aims to develop and promote the level of information security of the Estonian public authorities as well as private businesses.

KYPSIS

Study of applicability of cryptographic algorithms in information systems, their spread and assessment of the strength of already implemented cryptographic algorithms.

LESCA

Creation of a tool to convert a Datalog-like program to a SecreC program (privacy-preserving computation based on Sharemind MPC platform).

WEBEXTENSIONS

Analysis of the Open-eID architecture design offer including the formulation of system security requirements, review and verification of the protocol set in terms of fixed requirements.

SEVILLA

Creation of programmable secure multi-party computation and applications.

CDOC 2.0

Analysis for Estonia's new file encryption standard CDOC2.0 and general architecture design.