Research

Post Quantum Cryptography
Recent times have seen significant advances in the design and construction of quantum computers – computers which harness quantum mechanical phenomena to solve mathematical problems that are difficult for conventional classical computers. If a cyber-attacker has access to a quantum computer, are known cryptosystems safe? Most current day cryptography succumbs to quantum attacks, rendering all digital information insecure. Post-quantum cryptography aims to redesign cryptography so that it is resilient to quantum attacks. Our research focuses on one of the most promising approaches for post quantum cryptography, namely, lattice based cryptography. Lattice based cryptography relies on the hardness of solving certain mathematical problems in high dimensional lattices, and these problems are not known to offer any speedups by quantum computers. Besides, lattice based cryptography offers a flexibility and expressiveness that enables multiple promising new cryptographic constructions.
Blockchains and Fault Tolerance


Evaluating Secure Critical Embedded Systems
Provable Security of Symmetric and Asymmetric Key Cryptography


Computing on Encrypted Data
Secure Systems Engineering


Distributed Computing
DLT and Hedera: A New Era of Trustless Transactions

