Homomorphic public-key cryptosystems, and other primitives.
Network systems and protocol security (TLS, SSH, WPA) including configuration and parameterization.
Secure Multi-party Computation
Protocol designs and analysis for applications in trustworthy electronic voting, secure health informatics, geospacial analysis, and more.
Privacy and Anonymity
Passwords, fingerprinting, data storage and more.