Skip to main content
MIT CSAIL Theory of Computation MIT CSAIL
  • Accessibility
  • login
  • home
    • About
    • TOC Calendar
    • Contact
  • People
    • Faculty
    • Research Scientists
    • lecturers
    • Postdocs
    • Students
    • Visitors
    • Support Staff
    • Alumni
  • Research Groups
    • Algorithms
    • Complexity Theory
      • Complexity Theory Courses
    • Computation & Biology
    • Computation and Economics
    • Computational Connectomics
    • Cryptography and Information Security
    • Learning-Augmented Algorithms
    • Multicore Algorithmics
    • Parallel Computing
      • Applied Computing
      • Supertech Research
    • Quantum Information Science
    • Sublinear Algorithms
    • Theory of Distributed Systems
    • Theory of Machine Learning
  • Seminars
    • Theory of Computation Colloquium
    • Algorithms and Complexity Seminars
    • Theory of Distributed Systems (TDS)
    • CRYPTOGRAPHY AND INFORMATION SECURITY (CIS) SEMINARS
    • Bioinformatics Seminars
    • Theory Reading Group
  • Courses
    • Course Calendar
    • Course Descriptions
    • Who Is Teaching What (Spring 2025)
  • Miscellaneous
    • New Student Blog: Not so Great Ideas in Theoretical Computer Science
    • TOC People in the News: 2009-2012
    • Awards
    • Algorithms Office Hours
  • TOC in Pictures
    • People
    • Celebrations
    • Retreats
    • Corn Fest
  • CRYPTOGRAPHY AND INFORMATION SECURITY
  • CIS SEMINARS
  • CIS COURSES
  • MEMBERS
  • PATENTS
  • RESEARCH PROJECTS
    • CIRCULAR SECURITY
    • COMPUTING ON ENCRYPTED DATA
    • DELEGATION PARADIGM
    • ELECTRONIC VOTING
    • FOUNDATIONS OF SYMMETRIC CRYPTOGRAPHY
    • LATTICE-BASED CRYPTOGRAPHY
    • LEAKAGE RESILIENT CRYPTOGRAPHY
    • MODELING, AMPLIFICATION
    • MULTI-PARTY COMPUTATION
    • OBFUSCATION
  • SOFTWARE
  • THESES

CIS RESEARCH PROJECTS

ON-GOING CIS RESEARCH PROJECTS

  • Amplification
  • Circular Security
  • Computing on Encrypted Data
  • Delegation Paradigm
  • Electronic Voting
  • Foundations of Symmetric Cryptography
  • Lattice-Based Cryptography
  • Leakage Resilient Cryptography
  • Modeling
  • Multi-Party Computation
  • Obfuscation

 

PREVIOUS CIS RESEARCH PROJECTS

  • Anonymity in Cryptographic Protocols
  • Basic Cryptographic Primitives
  • Cryptography and Other Fields
  • Digital Signatures
  • Exposure-Resilient Cryptography
  • Incremental Cryptography
  • Lower Bounds and Impossibility Results
  • Micropayments
  • Private Information Retrieval    
  • Pseudo Randomness
  • SDSI (a Secure Distributed Security Infrastructure)
  • Secure Multicast
  • Self-Delegation with Controlled Propagation
  • The Random Oracle Model
  • Threshold Cryptography
  • Zero-Knowledge Proofs