Chris Brzuska

  • Phone+358 50 4450136
  • Aalto SCI Computer Science Konemiehentie 2

20112022

Research activity per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Artistic and research interests

I am a researcher specializing in cryptography and its connections to IT security, verification and complexity theory. Specifically, I am fascinated by foundational questions such as building one-way functions from NP-hardness and understanding the conceptual implications of indistinguishability obfuscation. I aim to build foundations for analyzing and building cryptography that is used in the wild such as TLS, EMV, IEEE 802.11 and secure messaging protocols and white-box cryptography. White-box cryptography implements cryptography in insecure environments and is a mechanism required by Master and Visa to secure payment apps. TLS is the main protocol for secure communication on the internet (the s in https indicates that TLS is used), EMV is a secure communication protocol used for payment with MasterCard, VISA and Maestro, IEEE 802.11 is used, e.g., for secure communication in Eduroam, and secure messaging is nowadays deployed by most popular messaging apps. For protocol analysis, we use verification techniques and modularity to be able to tackle the complexity of the protocols. More generally, I am interested in modeling the security of a cryptographic object, i.e., ask the question "What does it mean to be secure?" and to answer that question by a mathematical model (while always being aware that gaps between models and reality necessarily have to exist) that is simple enough to understand the security guarantees conceptually.

Education/Academic qualification

Doctoral degree, Natural Sciences, Technische Universität Darmstadt

Award Date: 1 Oct 2012

Keywords

  • Cryptography
  • IT security
  • Verification
  • Theory of computation
  • Discrete mathematics

Fingerprint

Dive into the research topics where Chris Brzuska is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Key-Schedule Security for the TLS 1.3 Standard

    Brzuska, C., Delignat-Lavaud, A., Egger, C., Fournet, C., Kohbrok, K. & Kohlweiss, M., 2022, Advances in Cryptology – ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, 2022, Proceedings. Agrawal, S. & Lin, D. (eds.). Springer, p. 621-650 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13791 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness

    Brzuska, C. & Couteau, G., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 584-613 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13276 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
  • Security Analysis of the MLS Key Derivation

    Brzuska, C., Cornelissen, E. & Kohbrok, K., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. IEEE, p. 2535-2553 19 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    File
    2 Citations (Scopus)
    32 Downloads (Pure)
  • On Derandomizing Yao’s Weak-to-Strong OWF Construction

    Brzuska, C., Couteau, G., Karanko, P. & Rohrbach, F., 4 Nov 2021, Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part II. Nissim, K., Waters, B. & Waters, B. (eds.). Springer, p. 429-456 28 p. (Lecture Notes in Computer Science; vol. 13043).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • On the Security Goals of White-Box Cryptography

    Alpirez Bock, E., Amadori, A., Brzuska, C. & Michiels, W., 2 Mar 2020, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2020, 2, p. 327-357 31 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    50 Downloads (Pure)