Overview. My research area is cryptography, with a practice-oriented theme. The cryptography community has, because of historical reasons, evolved to two largely disconnected groups. The the-ory side targets provable security, offering aesthetically pleasing, rigorously secure results with good asymptotic efficiency. But those products usually have no customers, because their concrete running time is slow, their implementations difficult, and most importantly, the problems they solve often not of genuine interest to practitioners. In practice, developers are willing to use heuristics to achieve good performance and reduce engineering effort. My research thus aims to bridge the gap between the theory and practice of cryptography: I’m interes...
Recent history is littered with examples of software vendors betraying user trust, exposing the publ...
Contains fulltext : 218980.pdf (publisher's version ) (Open Access)The modern, alw...
We take a model-theoretic viewpoint on security goals and how to es-tablish them. The models are (po...
My research area is cryptography, with a practice-oriented theme. The cryptography community has, be...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
The need for secure systems and improved authentication methods is growing as online transactions an...
In 2015 more than 150 million records and $400 billion were lost due to publicly-reported criminal a...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
The complexity of cryptography does not allow many people to actually understand the motivations and...
Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large...
Cryptography algorithms are a fundamental part of a cryptographic system that is designed and implem...
The tremendous growth of online communication had also created a great need to secure it. The scienc...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
Evaluating the resistance of cryptosystems to side-channel attacks is an important research challeng...
Recent history is littered with examples of software vendors betraying user trust, exposing the publ...
Contains fulltext : 218980.pdf (publisher's version ) (Open Access)The modern, alw...
We take a model-theoretic viewpoint on security goals and how to es-tablish them. The models are (po...
My research area is cryptography, with a practice-oriented theme. The cryptography community has, be...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
The need for secure systems and improved authentication methods is growing as online transactions an...
In 2015 more than 150 million records and $400 billion were lost due to publicly-reported criminal a...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
The complexity of cryptography does not allow many people to actually understand the motivations and...
Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large...
Cryptography algorithms are a fundamental part of a cryptographic system that is designed and implem...
The tremendous growth of online communication had also created a great need to secure it. The scienc...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
Evaluating the resistance of cryptosystems to side-channel attacks is an important research challeng...
Recent history is littered with examples of software vendors betraying user trust, exposing the publ...
Contains fulltext : 218980.pdf (publisher's version ) (Open Access)The modern, alw...
We take a model-theoretic viewpoint on security goals and how to es-tablish them. The models are (po...