Secure Network Protocols
We have contributed to the security analysis of ubiquitous secure protocols such as IPsec, SSH, EMV, and Tor. Our work here has varied from finding practical attacks against these protocols, as well as providing formal security proofs for some of their configurations. A secondary goal of this line of work is to strengthen the symbiosis between theory and practice in cryptography, that is, practice that is backed by sound theoretical analysis and theory that is informed by practice.
Another focus of ours is the study of cryptographic primitives for use in higher level protocols. Namely, we are interested in new designs, that improve on the state of the art in terms of efficiency and security, and on improving our understanding of cryptographic primitives that are already deployed in the wild. Our approach is based on the well-established and scientifically-sound provable security methodology, through which, various facets of security can be formalised and quantified.
Privacy Enhancing Technologies
In this day and age our privacy has never been more at risk. While the progress towards securing commercial applications has been remarkable, this is less so when it comes to protecting people's privacy. Privacy requires security that transcends confidentiality and integrity, and additionally hides metadata and protects against traffic analysis. Moreover, it requires cryptosystems that also protect their users from the service provider, are resilient to sabotage, and are free of backdoors. In this line of work we seek to identify and study solutions for these advanced threats in a rigorous manner.