My research area is cryptography, with a practice-oriented theme. The cryptography community has, because of historical reasons, evolved to two largely disconnected groups. The theory side targets prov-able security, offering aesthetically pleasing, rigorously secure results with good asymptotic efficiency. But those products usually have no customers, because their concrete running time is slow, their im-plementations difficult, and most importantly, the problems they solve often not of genuine interest to practitioners. In practice, developers are willing to use heuristics to achieve good performance and reduce engineering effort. My research thus aims to bridge the gap between the theory and practice of cryptography: I’m interested in de...
Every security design involves choosing adequate parameters. When dealing with cryptography, one of ...
Abstract: Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digi...
The mission of theoretical cryptography is to define and construct provably secure cryptographic pro...
Overview. My research area is cryptography, with a practice-oriented theme. The cryptography communi...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
The need for secure systems and improved authentication methods is growing as online transactions an...
Cryptography algorithms are a fundamental part of a cryptographic system that is designed and implem...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government comm...
The complexity of cryptography does not allow many people to actually understand the motivations and...
Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large...
In 2015 more than 150 million records and $400 billion were lost due to publicly-reported criminal a...
When I started my master in Information Security, my main motivation for this choice was the fact th...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Most of themainstream cryptographic protocols that are used today rely on the assumption that the ad...
Every security design involves choosing adequate parameters. When dealing with cryptography, one of ...
Abstract: Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digi...
The mission of theoretical cryptography is to define and construct provably secure cryptographic pro...
Overview. My research area is cryptography, with a practice-oriented theme. The cryptography communi...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
The need for secure systems and improved authentication methods is growing as online transactions an...
Cryptography algorithms are a fundamental part of a cryptographic system that is designed and implem...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government comm...
The complexity of cryptography does not allow many people to actually understand the motivations and...
Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large...
In 2015 more than 150 million records and $400 billion were lost due to publicly-reported criminal a...
When I started my master in Information Security, my main motivation for this choice was the fact th...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Most of themainstream cryptographic protocols that are used today rely on the assumption that the ad...
Every security design involves choosing adequate parameters. When dealing with cryptography, one of ...
Abstract: Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digi...
The mission of theoretical cryptography is to define and construct provably secure cryptographic pro...