Skip to main content
Accessibility
login
home
About
TOC Calendar
Contact
People
Faculty
Research Scientists
lecturers
Postdocs
Students
Visitors
Support Staff
Alumni
Research Groups
Algorithms
Complexity Theory
Complexity Theory Courses
Computation and Economics
Cryptography and Information Security
Theory of Distributed Systems
Parallel Computing
Applied Computing
Supertech Research
Quantum Information Science
Computation & Biology
Computational Connectomics
Learning-Augmented Algorithms
Multicore Algorithmics
Sublinear Algorithms
Theory of Machine Learning
Seminars
Theory of Computation Colloquium
Algorithms and Complexity Seminars
Theory of Distributed Systems (TDS)
CRYPTOGRAPHY AND INFORMATION SECURITY (CIS) SEMINARS
Bioinformatics Seminars
TCS+
Theory Reading Group
Courses
Course Calendar
Course Descriptions
Who Is Teaching What (Fall 2024)
Miscellaneous
New Student Blog: Not so Great Ideas in Theoretical Computer Science
TOC People in the News: 2009-2012
Awards
Algorithms Office Hours
TOC in Pictures
People
Celebrations
Retreats
Corn Fest
CRYPTOGRAPHY AND INFORMATION SECURITY
CIS SEMINARS
CIS COURSES
MEMBERS
PATENTS
RESEARCH PROJECTS
CIRCULAR SECURITY
COMPUTING ON ENCRYPTED DATA
DELEGATION PARADIGM
ELECTRONIC VOTING
FOUNDATIONS OF SYMMETRIC CRYPTOGRAPHY
LATTICE-BASED CRYPTOGRAPHY
LEAKAGE RESILIENT CRYPTOGRAPHY
MODELING, AMPLIFICATION
MULTI-PARTY COMPUTATION
OBFUSCATION
SOFTWARE
THESES
CIS RESEARCH PROJECTS
ON-GOING CIS RESEARCH PROJECTS
Amplification
Circular Security
Computing on Encrypted Data
Delegation Paradigm
Electronic V
oting
Foundations of Symmetric Cryptography
Lattice-Based Cryptography
Leakage Resilient Cryptography
Modeling
Multi-Party Computation
Obfuscation
PREVIOUS CIS RESEARCH PROJECTS
Anonymity in Cryptographic Protocols
Basic Cryptographic Primitives
Cryptography and Other Fields
Digital Signatures
Exposure-Resilient Cryptography
Incremental Cryptography
Lower Bounds and Impossibility Result
s
Micropayments
Private Information Retrieval
Pseudo Randomnes
s
SDSI (a Secure Distributed Security Infrastructure)
Secure Multicast
Self-Delegation with Controlled Propagation
The Random Oracle Model
Threshold Cryptography
Zero-Knowledge Proofs