Personal Control of Data
People around the world are concerned that more and more of their personal data is on the Internet, where it’s easy to find, copy, and link up with other data. Data about people’s presence and…
Verifiable Functional Encryption
In light of security challenges that have emerged in a world with complex networks and cloud computing, the notion of functional encryption has recently emerged. In this work, we show that in several applications of…
Build It, Break It, Fix It: Contesting Secure Development
Typical security contests focus on breaking or mitigating the impact of buggy systems. I will present the Build-it, Break- it, Fix-it (BIBIFI) contest, which aims to assess the ability to securely build software, not just…
Block-wise Non-Malleable Codes
Elliptic Curve Cryptography (ECC)
In the last 25 years, Elliptic Curve Cryptography (ECC) has become a mainstream primitive for cryptographic protocols and applications. ECC has been standardized for use in key exchange and digital signatures. This project focuses on…
What You Mark is What Apps See
Lattice Cryptography Library
LatticeCrypto was a high-performance and portable software library that implemented lattice-based cryptographic algorithms. The first release of the library provided an implementation of lattice-based key exchange with security based on the Ring Learning With Errors…
SIDH Library
SIKE and SIDH are insecure and should not be used. For more information, please refer to the SIKE team’s statement to NIST. SIDH Library was a fast and portable software library that implements a new suite…