Password Hashing and Memory Hard Functions

Coding Theory and Cryptography

Usable and Secure Human Authentication

Privacy Preserving Data Analysis

  • How to Make Your Approximation Algorithm Private: A Black-Box Differentially-Private Transformation for Tunable Approximation Algorithms of Functions with Low Sensitivity. with Elena Grigorescu, Tamalika Mukherjee and Samson Zhou. RANDOM 2023 [Full Version]
  • Game Theory and Security

    Cryptography/Miscelaneous