[vc_row][vc_column width=”1/1″][vc_accordion collapsible=””][vc_accordion_tab title=”Foundational Cryptography”][vc_column_text]I have interests in a large number of foundational questions in cryptography. I have a long interest in understanding the generic assumptions necessary to achieve different types of security requirements for public-key encryption. I have also looked at fundamental questions related to the construction of Pseudo-Random Function Generators (i.e., block ciphers).[/vc_column_text][/vc_accordion_tab][vc_accordion_tab title=”Emergent Security”][/vc_accordion_tab][vc_accordion_tab title=”Applied Cryptography”][vc_column_text]I am interested in a number of applied cryptographic questions. In particular, I am interested in protocols that use ideas in cryptography that have historically been considered to be too inefficient to implement, and working on using variants of the protocols, or strong computing models to implement them, so they can be used in practice. It seems much recent work in this area has shown that there are a number of bottlenecks in implementation that are different from those predicted.[/vc_column_text][/vc_accordion_tab][/vc_accordion][/vc_column][/vc_row]