Chris Brzuska

  • Phone+358 50 4450136
  • Aalto SCI Computer Science Konemiehentie 2

20092025

Research activity per year

Personal profile

Artistic and research interests

I am a researcher specializing in cryptography and its connections to IT security, verification and complexity theory. Specifically, I am fascinated by foundational questions such as building one-way functions from NP-hardness and understanding the conceptual implications of indistinguishability obfuscation. I aim to build foundations for analyzing and building cryptography that is used in the wild such as TLS, EMV, IEEE 802.11 and secure messaging protocols and white-box cryptography. White-box cryptography implements cryptography in insecure environments and is a mechanism required by Master and Visa to secure payment apps. TLS is the main protocol for secure communication on the internet (the s in https indicates that TLS is used), EMV is a secure communication protocol used for payment with MasterCard, VISA and Maestro, IEEE 802.11 is used, e.g., for secure communication in Eduroam, and secure messaging is nowadays deployed by most popular messaging apps. For protocol analysis, we use verification techniques and modularity to be able to tackle the complexity of the protocols. More generally, I am interested in modeling the security of a cryptographic object, i.e., ask the question "What does it mean to be secure?" and to answer that question by a mathematical model (while always being aware that gaps between models and reality necessarily have to exist) that is simple enough to understand the security guarantees conceptually.

Education/Academic qualification

Doctoral degree, Natural Sciences, Technische Universität Darmstadt

Award Date: 1 Oct 2012

Keywords

  • Cryptography
  • IT security
  • Verification
  • Theory of computation
  • Discrete mathematics

Fingerprint

Dive into the research topics where Chris Brzuska is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Evasive LWE Assumptions: Definitions, Classes, and Counterexamples

    Brzuska, C., Ünal, A. & Woo, I. K. Y., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer, Vol. 4. p. 418-449 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15487 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • Falsifiability, Composability, and Comparability of Game-Based Security Models for Key Exchange Protocols

    Brzuska, C., Cremers, C., Jacobsen, H., Stebila, D. & Warinschi, B., 2025, Information Security in a Connected World: Celebrating the Life and Work of Ed Dawson. Boyd, C., Safavi-Naini, R. & Simpson, L. (eds.). Springer, p. 214-255 42 p. (Lecture Notes in Computer Science; vol. 15600 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    Open Access
  • On Bounded Storage Key Agreement and One-Way Functions

    Brzuska, C., Couteau, G., Egger, C. & Quach, W., 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer, p. 287-318 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15364 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness

    Brzuska, C. & Couteau, G., Jan 2025, In: Journal of Cryptology. 38, 1, 8.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    1 Downloads (Pure)
  • Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication

    Bock, E. A., Banegas, G., Brzuska, C., Chmielewski, Ł., Puniamurthy, K. & Šorf, M., 1 Mar 2024, Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings. Pöpper, C. & Batina, L. (eds.). Springer, p. 101-130 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14584 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    3 Citations (Scopus)