• Phone+358 50 4450136
  • Aalto SCI Computer Science Konemiehentie 2

20112021

Research activity per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Artistic and research interests

I am a researcher specializing in cryptography and its connections to IT security, verification and complexity theory. Specifically, I am fascinated by foundational questions such as building one-way functions from NP-hardness and understanding the conceptual implications of indistinguishability obfuscation. I aim to build foundations for analyzing and building cryptography that is used in the wild such as TLS, EMV, IEEE 802.11 and secure messaging protocols and white-box cryptography. White-box cryptography implements cryptography in insecure environments and is a mechanism required by Master and Visa to secure payment apps. TLS is the main protocol for secure communication on the internet (the s in https indicates that TLS is used), EMV is a secure communication protocol used for payment with MasterCard, VISA and Maestro, IEEE 802.11 is used, e.g., for secure communication in Eduroam, and secure messaging is nowadays deployed by most popular messaging apps. For protocol analysis, we use verification techniques and modularity to be able to tackle the complexity of the protocols. More generally, I am interested in modeling the security of a cryptographic object, i.e., ask the question "What does it mean to be secure?" and to answer that question by a mathematical model (while always being aware that gaps between models and reality necessarily have to exist) that is simple enough to understand the security guarantees conceptually.

Education/Academic qualification

Doctoral degree, Natural Sciences, Technische Universität Darmstadt

Award Date: 1 Oct 2012

Keywords

  • Cryptography
  • IT security
  • Verification
  • Theory of computation
  • Discrete mathematics

Fingerprint

Dive into the research topics where Chris Brzuska is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Network

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • On Derandomizing Yao’s Weak-to-Strong OWF Construction

    Brzuska, C., Couteau, G., Karanko, P. & Rohrbach, F., 4 Nov 2021, Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part II. Nissim, K., Waters, B. & Waters, B. (eds.). p. 429-456 28 p. (Lecture Notes in Computer Science; vol. 13043).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • On the Security Goals of White-Box Cryptography

    Alpirez Bock, E., Amadori, A., Brzuska, C. & Michiels, W., 2 Mar 2020, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2020, 2, p. 327-357 31 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • Security Reductions for White-Box Key-Storage in Mobile Payments

    Alpirez Bock, E., Brzuska, C., Fischlin, M., Janson, C. & Michiels, W., 2020, International Conference on the Theory and Application of Cryptology and Information Security: ASIACRYPT 2020: Advances in Cryptology – ASIACRYPT 2020 . Moriai, S. & Wang, H. (eds.). p. 221-252 32 p. (Lecture Notes in Computer Science ; vol. 12491).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • Doubly Half-Injective PRGs for Incompressible White-Box Cryptography

    Alpirez Bock, E., Amadori, A., Bos, J. W., Brzuska, C. & Michiels, W., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). p. 189-209 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    4 Citations (Scopus)
  • White-Box Cryptography: Don’t Forget About Grey-Box Attacks

    Alpirez Bock, E., Bos, J. W., Brzuska, C., Hubain, C., Michiels, W., Mune, C., Sanfelix Gonzalez, E., Teuwen, P. & Treff, A., 1 Oct 2019, In: Journal of Cryptology. 32, 4, p. 1095-1143 49 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    12 Citations (Scopus)