Reusable Non-Interactive Secure Computation
Reproducible Codes and Cryptographic Applications
In this talk I will present a work in progress on structured linear block codes. The investigation starts from well-known examples and generalizes them to a wide class of codes that we call reproducible codes.…
Supersingular isogeny based cryptography gets practical
Talk on post-quantum supersingular isogeny-based cryptography at the Real World Crypto Workshop 2018 in Zurich, Switzerland.
Towards Secure and Interpretable AI: Scalable Methods, Interactive Visualizations, and Practical Tools
The explosion of available idea repositories — scientific papers, patents, product descriptions — represents an unprecedented opportunity to accelerate innovation and lead to a wealth of discoveries. Given the scale of the problem and its…
Post-Quantum TLS
The Transport Layer Security (TLS) protocol The Transport Layer Security (TLS) protocol is one of the most widely-used security protocols in use today, protecting the information exchanged between web clients and servers all around the…
Post-Quantum SSH
The Secure Shell (SSH) protocol The Secure Shell (SSH) protocol is one of the most widely-used security protocols in use today; it protects the information exchanged between clients and servers. SSH is secure against today’s…