Security and Cryptography

Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego. Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography, systems security, and network security. In line with our broad security-related research interests, we are affiliated and actively collaborate with both the Theory Group and the Systems and Networking Group here at UCSD.

People  |   News  |   Publications  |   Sponsors
Faculty
Mihir Bellare
Russell Impagliazzo
Daniele Micciancio
Stefan Savage
Hovav Shacham
Geoffrey M. Voelker
Affiliated Faculty
kc claffy
Ranjit Jhala
Ryan Kastner
Sorin Lerner
Alex C. Snoeren
Steven Swanson
Keith Marzullo
Yuanyuan Zhou
Scientists, Postdocs and Research Staff
Brian Kantor
Kirill Levchenko
Cindy Moore
Björn Tackmann
PhD Students
Karyn Benson
Neha Chachra
Joe DeBlasio
Matt Der
Brown Farinholt
Tristan Halvorson
Danny Huang
Joseph Jaeger
David Kohlbrenner
Vector Lee
Wilson Lian
He Liu (Lonnie)
Keaton Mowery
Jason Oberg
Igors Stepanovs
Edward Sullivan
Bhanu Vattikonda
Qiushi Wang
Michael Walter
Zhaomo Yang
MS Students
Danny Anderson
Erik Buchanan
Stephan Chenette
Louis DeKoven
Grant Jordan
Jake Maskiewicz
Undergraduate Students
Jacob Maskiewicz
Recent Alumni
Léo Ducas (postdoc 2013–2014) CWI Amsterdam
Viet Tung Hoang (postdoc 2013–2014) UMD/Georgetown (postdoc)

Sriram Keelveedhi (Ph.D. 2014)Google
Do-kyum Kim (Ph.D. 2014)Google
Feng Lu (Ph.D. 2014)Google
Sarah Meiklejohn (Ph.D. 2014)UCL
David Wang (Ph.D. 2014)Google
Qing Zhang (Ph.D. 2014)Google

Vacha Dave (Postdoc 2013)Microsoft
Nicholas Weaver (Researcher 2012–2013)ICSI

Vinh The Lam (Ph.D. 2013)Google
Petros Mol (Ph.D. 2013)Google
Andreas Pitsillidis (Ph.D. 2013)Google
Gjergji Zyba (Ph.D. 2013)Meraki

Nadia Heninger (postdoc 2011–2012) Microsoft Research New EnglandPenn
Stefano Tessaro (postdoc 2010–2012) MIT (postdoc)UC Santa Barbara

Stephen Checkoway (Ph.D. 2012) Johns Hopkins
Chris Kanich (Ph.D. 2012)
University of Illinois at Chicago
John McCullough (Ph.D. 2012) Google

Ian Foster (M.S. 2015) Salesforce

Chris Gardner (M.S. 2014) Arris
Devin Lundberg (M.S. 2014) Pinterest

Michael Goldberg (M.S. 2013) Google

Soumyarupa De (M.S. 2012) Microsoft India
Rafael Dowsley (M.S. 2012) Karlsruhe Institute of Technology
Deepika Gopal (M.S. 2012) Cisco
Aishwarya Venkataraman (M.S. 2012) StackIQ

[All Alumni]
Recent News
[All News]
Recent Publications

Framing Dependencies Introduced by Underground Commoditization, Kurt Thomas, Danny Yuxing Huang, David Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, and Giovanni Vigna, Proceedings of the Workshop on the Economics of Information Security (WEIS), Delft, The Netherlands, June 2015.

On Subnormal Floating Point and Abnormal Timing, Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, and Hovav Shacham, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2015.

Lattice Point Enumeration on Block Reduced Bases, Michael Walter, Proceedings of the 8th International Conference on Information-Theoretic Security (ICITS), Lugano, Switzerland, May 2015.

FHEW: Bootstrapping in less than a Second, Léo Ducas and Daniele Micciancio, Proceedings of Eurocrypt 2015, Sofia, Bulgaria, April 2015.

Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model, Mihir Bellare and Viet Tung Hoang, Proceedings of Eurocrypt 2015, Sofia, Bulgaria, April 2015.

How Secure is Deterministic Encryption?, Mihir Bellare, Rafael Dowsley, and Sriram Keelveedhi, Proceedings of PKC 2015, Gaithersburg, Maryland, March 2015.

Adaptive Witness Encryption and Asymmetric Password-Based Cryptography, Mihir Bellare and Viet Tung Hoang, Proceedings of PKC 2015, Gaithersburg, Maryland, March 2015.

Interactive Message-Locked Encryption and Secure Deduplication, Mihir Bellare and Sriram Keelveedhi, Proceedings of PKC 2015, Gaithersburg, Maryland, March 2015.

From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes, Sandro Coretti, Ueli Maurer, Björn Tackmann, and Daniele Venturi, Proceedings of TCC 2015, Warsaw, Poland, March 2015.

Too LeJIT to Quit: Extending JIT Spraying to ARM, Wilson Lian, Hovav Shacham, and Stefan Savage, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2015.

Fast Lattice Point Enumeration with Minimal Overhead, Daniele Micciancio and Michael Walter, ACM-SIAM Symposium on Discrete Algorithms, San Diego, January 2015.

Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?, Mihir Bellare, Dennis Hofheinz, and Eike Kiltz, Journal of Cryptology 28(1):29-48, January 2015.

[All Publications]
Affiliations
Center for Networked Systems (CNS)         Cooperative Association for Internet Data Analysis (CAIDA)       San Diego Super Computer Center (SDSC)        California Institute for Telecommunications and Information Technology (Cal-IT2) CalIT(2)
Sponsors