The CrySP Lab

Securing our data and safeguarding our privacy.

The Cryptography, Security, and Privacy (CrySP) research group carries out research in a wide variety of topics, from designing cryptographic protocols to the evaluation of their effectiveness and usability in deployed systems. Some examples are:

  • (Distributed) cryptographic protocols. Designing interactive protocols to enable secure communication, such as key agreement protocols, key distribution schemes, secret sharing schemes, identification schemes, broadcast encryption and oblivious transfer.
  • Efficient cryptographic algorithms and their implementation.
  • Designing and analyzing cryptographic primitives such as block and stream ciphers, public-key encryption schemes, signature schemes, message authentication codes, key establishment protocols, and pairing-based cryptography.
  • Cryptographic hash functions. Analyzing the security of iterated design techniques and the random oracle model and constructing families of universal hash functions.
  • Privacy-preserving communications networks. Creating privacy-preserving communications networks with better security, privacy, efficiency, and scalability properties than existing ones.
  • Off-the-record messaging. Improving the user interface, robustness, and group communication abilities of Off-the-Record Messaging, or OTR.
  • See the CrySP website for more.
abstract image of computers and lock icons indicating cybersecurity