Recent & Upcoming Talks

How implementing hash functions incautiously can lead to attacks

On transitioning securely between models with one and many random oracles.

Publications

It is convenient and common for schemes in the random oracle model to assume access to multiple random oracles (ROs), leaving to …

We give new proofs that justify the SIGMA and TLS 1.3 key exchange protocols not just in principle, but in practice. By this we mean …

We extend Feynman’s analysis of an infinite ladder circuit to fractal circuits, providing examples in which fractal circuits …