We work broadly in all areas in Cryptography: applied as well as foundational.
This includes topics such as zero-knowledge proofs, secure multi-party computation, blockchains and cryptocurrencies, game theory, verifiable computation, program obfuscation, computing on encrypted data, differential privacy, non-malleable cryptography, leakage-resilient cryptography, and anonymous communication. Please check the individual webpages for publications and projects
CountCrypt: Quantum Cryptography between QCMA and PP
"Noisy" versus "Bounded" Leakage
Optimal Traitor Tracing from Pairings