If you made any changes in Pure these will be visible here soon.

Personal profile


Veronika obtained her Diploma degree (equiv. to Master degree) in Mathematics from Karls-Ruprecht University of Heidelberg (Germany) and her PhD degree in applied cryptography form University of Surrey (United Kingdom) under the supervision of Dr. Mark Manulis. The focuse of her PhD thesis was on distributed cryptographic protocols. From December 2015 to March 2018 she was a postdoctoral researcher with the Université libre de Bruxelles (ULB, Belgium). In this time she was a member of the QualSec (quality and security of information systems) group under the supervision of professor Olivier Markowitch and she was working on a project called SeCloud, focusing on security-driven engineering of cloud-based applications. Her research interests lie in the areas of post-quantum cryptography. She designed several lattice-based cryptographic protocols which were pubished and presented at the international conferences. Furthermore, she is intersted in different aspects of code-based cryptography, their relation to lattice-based cryptoschemes and application to the research area of blockchain.

Research area keywords

  • Applied cryptography
  • Cyber Security
  • Cloud Security
  • Security Protocols
  • Lattice-Based Cryptography

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2013 2019

A twofold group key agreement protocol for NoC-based MPSoCs

Sharma, G., Kuchta, V., Anand Sahu, R., Ellinidou, S., Bala, S., Markowitch, O. & Dricot, J-M., Jun 2019, In : Transactions on Emerging Telecommunications Technologies. 30, 6, 18 p., e3633.

Research output: Contribution to journalArticleResearchpeer-review

Incentives for harvesting attack in proof of work mining pools

Zolotavkin, Y. & Kuchta, V., 2019, Computer Security – ESORICS 2019 : 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 703-725 23 p. (Lecture Notes in Computer Science ; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets

Alberto Torres, W., Kuchta, V., Steinfeld, R., Sakzad, A., Liu, J. K. & Cheng, J., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 156-175 20 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Public-key encryption with integrated keyword search

Saraswat, V., Sahu, R. A., Sharma, G., Kuchta, V. & Markowitch, O., Mar 2019, In : Journal of Hardware and Systems Security. 3, 1, p. 12-25 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
2 Citations (Scopus)

Anonymous yet traceable strong designated verifier signature

Kuchta, V., Sahu, R. A., Saraswat, V., Sharma, G., Sharma, N. & Markowitch, O., 2018, Information Security : 21st International Conference, ISC 2018 Guildford, UK, September 9–12, 2018 Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Cham Switzerland: Springer, p. 403-421 19 p. (Lecture Notes in Computer Science ; vol. 11060).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch