Security and Cryptography

Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego. Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography, systems security, and network security. In line with our broad security-related research interests, we are affiliated and actively collaborate with both the Theory Group and the Systems and Networking Group here at UCSD.

People  |   News  |   Publications  |   Sponsors
Mihir Bellare
Russell Impagliazzo
Daniele Micciancio
Stefan Savage
Hovav Shacham
Geoffrey M. Voelker
Affiliated Faculty
kc claffy
Ranjit Jhala
Ryan Kastner
Sorin Lerner
Alex C. Snoeren
Steven Swanson
Keith Marzullo
Yuanyuan Zhou
Scientists, Postdocs and Research Staff
Brian Kantor
Kirill Levchenko
Cindy Moore
Björn Tackmann
PhD Students
Karyn Benson
Neha Chachra
Joe DeBlasio
Matt Der
Brown Farinholt
Tristan Halvorson
Danny Huang
Joseph Jaeger
David Kohlbrenner
Vector Lee
Wilson Lian
He Liu (Lonnie)
Keaton Mowery
Jason Oberg
Igors Stepanovs
Edward Sullivan
Bhanu Vattikonda
Qiushi Wang
Michael Walter
Zhaomo Yang
MS Students
Danny Anderson
Erik Buchanan
Stephan Chenette
Louis DeKoven
Grant Jordan
Jake Maskiewicz
Undergraduate Students
Jacob Maskiewicz
Recent Alumni
Léo Ducas (postdoc 2013–2014) CWI Amsterdam
Viet Tung Hoang (postdoc 2013–2014) UMD/Georgetown (postdoc)

Sriram Keelveedhi (Ph.D. 2014)Google
Do-kyum Kim (Ph.D. 2014)Google
Feng Lu (Ph.D. 2014)Google
Sarah Meiklejohn (Ph.D. 2014)UCL
David Wang (Ph.D. 2014)Google
Qing Zhang (Ph.D. 2014)Google

Vacha Dave (Postdoc 2013)Microsoft
Nicholas Weaver (Researcher 2012–2013)ICSI

Vinh The Lam (Ph.D. 2013)Google
Petros Mol (Ph.D. 2013)Google
Andreas Pitsillidis (Ph.D. 2013)Google
Gjergji Zyba (Ph.D. 2013)Meraki

Nadia Heninger (postdoc 2011–2012) Microsoft Research New EnglandPenn
Stefano Tessaro (postdoc 2010–2012) MIT (postdoc)UC Santa Barbara

Stephen Checkoway (Ph.D. 2012) Johns Hopkins
Chris Kanich (Ph.D. 2012)
University of Illinois at Chicago
John McCullough (Ph.D. 2012) Google

Ian Foster (M.S. 2015) Salesforce

Chris Gardner (M.S. 2014) Arris
Devin Lundberg (M.S. 2014) Pinterest

Michael Goldberg (M.S. 2013) Google

Soumyarupa De (M.S. 2012) Microsoft India
Rafael Dowsley (M.S. 2012) Karlsruhe Institute of Technology
Deepika Gopal (M.S. 2012) Cisco
Aishwarya Venkataraman (M.S. 2012) StackIQ

[All Alumni]
Recent News
[All News]
Recent Publications

Automobile Driver Fingerprinting, Miro Enev, Alex Takakuwa, Karl Koscher, and Tadayoshi Kohno, Privacy Enhancing Technologies Symposium, Darmstadt, Germany, July 2016.

Security by Any Other Name: On the Effectiveness of Provider Based Email Security, Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko, Proceedings of the ACM Conference on Computer and Communications Security, Denver, Colorado, October 2015.

Affiliate Crookies: Characterizing Affiliate Marketing Abuse, Neha Chachra, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference, Tokyo, Japan, October 2015.

Fast and Vulnerable: A Story of Telematic Failures, Ian Foster, Andrew Prudhomme, Karl Koscher, and Stefan Savage, Proceedings of the USENIX Workshop On Offensive Technologies (WOOT), Washington D.C., August 2015.

SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems, Karl Koscher, Tadayoshi Kohno, and David Molnar, Proceedings of the USENIX Workshop On Offensive Technologies (WOOT), Washington D.C., August 2015.

Framing Dependencies Introduced by Underground Commoditization, Kurt Thomas, Danny Yuxing Huang, David Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, and Giovanni Vigna, Proceedings of the Workshop on the Economics of Information Security (WEIS), Delft, The Netherlands, June 2015.

On Subnormal Floating Point and Abnormal Timing, Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, and Hovav Shacham, Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, May 2015.

Lattice Point Enumeration on Block Reduced Bases, Michael Walter, Proceedings of the 8th International Conference on Information-Theoretic Security (ICITS), Lugano, Switzerland, May 2015.

FHEW: Bootstrapping in less than a Second, Léo Ducas and Daniele Micciancio, Proceedings of Eurocrypt 2015, Sofia, Bulgaria, April 2015.

Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model, Mihir Bellare and Viet Tung Hoang, Proceedings of Eurocrypt 2015, Sofia, Bulgaria, April 2015.

How Secure is Deterministic Encryption?, Mihir Bellare, Rafael Dowsley, and Sriram Keelveedhi, Proceedings of PKC 2015, Gaithersburg, Maryland, March 2015.

Adaptive Witness Encryption and Asymmetric Password-Based Cryptography, Mihir Bellare and Viet Tung Hoang, Proceedings of PKC 2015, Gaithersburg, Maryland, March 2015.

Interactive Message-Locked Encryption and Secure Deduplication, Mihir Bellare and Sriram Keelveedhi, Proceedings of PKC 2015, Gaithersburg, Maryland, March 2015.

From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes, Sandro Coretti, Ueli Maurer, Björn Tackmann, and Daniele Venturi, Proceedings of TCC 2015, Warsaw, Poland, March 2015.

[All Publications]
Center for Networked Systems (CNS)         Cooperative Association for Internet Data Analysis (CAIDA)       San Diego Super Computer Center (SDSC)        California Institute for Telecommunications and Information Technology (Cal-IT2) CalIT(2)