- Cryptography and Data Security
- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Physical Unclonable Functions (PUFs) and Hardware Security
- Complexity and Algorithms in Graphs
- Quantum Computing Algorithms and Architecture
- Coding theory and cryptography
- Distributed systems and fault tolerance
- Advanced Data Storage Technologies
- Internet Traffic Analysis and Secure E-voting
- Radiation Effects in Electronics
- Electrostatic Discharge in Electronics
- Quantum and electron transport phenomena
- Privacy-Preserving Technologies in Data
- Advanced Queuing Theory Analysis
- Advanced Malware Detection Techniques
- Security and Verification in Computing
- graph theory and CDMA systems
- Neural Networks and Applications
- Real-Time Systems Scheduling
- Parallel Computing and Optimization Techniques
- Quantum Information and Cryptography
- Quantum Mechanics and Applications
- Quantum many-body systems
- Speech Recognition and Synthesis
National Institute of Standards and Technology
2019-2025
National Institute of Standards
2023-2025
State Key Laboratory of Cryptology
2018
University of Lisbon
2011-2016
Carnegie Mellon University
2011-2015
Undesired coupling to the surrounding environment destroys long-range correlations in quantum processors and hinders coherent evolution nominally available computational space. This noise is an outstanding challenge when leveraging computation power of near-term
Abstract Available online public/governmental services requiring authentication by citizens have considerably expanded in recent years. This has hindered the usability and security associated with credential management users service providers. To address problem, some countries proposed nation-scale identification/authentication systems that intend to greatly reduce burden of management, while seemingly offering desirable privacy benefits. In this paper we analyze two such systems: Federal...
Abstract This paper considers the estimation of reliability and availability intrusion-tolerant systems subject to non-detectable intrusions caused by stealth attacks. We observe that typical intrusion tolerance techniques may in certain circumstances worsen dependability properties they were meant improve. model as a probabilistic effect adversarial efforts analyze different strategies attack rejuvenation. compare several configurations replication proactive rejuvenation, varying mission...
NIST) promotes the U.S. economy and public welfare by
The security of encrypted data depends not only on the theoretical properties cryptographic primitives but also robustness their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations.
This paper considers the estimation of reliability and availability intrusion-tolerant systems subject to non-detectable intrusions. Our motivation comes from observation that typical techniques intrusion tolerance may in certain circumstances worsen non-functional properties they were meant improve (e.g., dependability). We start by modeling attacks as adversarial efforts capable affecting rate probability components system. Then, we analyze several configurations replication pro-active...
The unpredictability of random numbers is fundamental to both digital security and applications that fairly distribute resources. However, existing number generators have limitations-the generation processes cannot be fully traced, audited, certified unpredictable. algorithmic steps used in pseudorandom are auditable, but they guarantee their outputs were a priori unpredictable given knowledge the initial seed. Device-independent quantum can ensure source randomness was unknown beforehand,...
The Computer Security Division at the National Institute of Standards and Technology (NIST) is taking steps towards standardization threshold schemes for cryptographic primitives. These schemes, applicable to single-device multi-party implementations, are designed with multiple components in a way enable essential security properties even when up certain number compromised. This offers path mitigate attacks on implementations operations primitives, therefore enhance their security....
Abstract Software-controlled measuring instruments used in commercial transactions, such as fuel dispensers and smart meters, are sometimes subject to ‘memory replacement’ attacks. Cybercriminals replace the approved software by a malicious one that then tampers with measurement results, inflicting financial loss customers companies. To mitigate attacks, legal metrology systems often require regular device attestation, where an auditor checks possesses (‘knows’) software. However, current...
The National Cybersecurity Center of Excellence (NCCoE) (in the United States) has published on October 19, 2015, a white paper "privacy-enhanced identity brokers." We present here reply to their request for public comments. enumerate concerns whose consideration we find paramount design privacy-enhancing brokering solution, identification and authentication citizens into myriad online services, recommend how incorporate them revised paper. Our observations, focused privacy, security,...