Research Faculty

» Stas Jarecki

Analyzing the inner workings of cryptographic tools, the security properties they are designed to achieve, how to reason about their security, and how to properly use them. Researchers investigate topics such as encryption (secret-key and public-key), message authentication, user authentication, digital signatures, key management, cryptographic hashing, network security protocols (SSL, IPsec), public-key infrastructure, zero-knowledge proofs, and secure computation.

Judy and Gary Olson