Chris Brzuska

  • Phone+358 50 4450136
  • Aalto SCI Computer Science Konemiehentie 2

20102024

Research activity per year

Personal profile

Artistic and research interests

I am a researcher specializing in cryptography and its connections to IT security, verification and complexity theory. Specifically, I am fascinated by foundational questions such as building one-way functions from NP-hardness and understanding the conceptual implications of indistinguishability obfuscation. I aim to build foundations for analyzing and building cryptography that is used in the wild such as TLS, EMV, IEEE 802.11 and secure messaging protocols and white-box cryptography. White-box cryptography implements cryptography in insecure environments and is a mechanism required by Master and Visa to secure payment apps. TLS is the main protocol for secure communication on the internet (the s in https indicates that TLS is used), EMV is a secure communication protocol used for payment with MasterCard, VISA and Maestro, IEEE 802.11 is used, e.g., for secure communication in Eduroam, and secure messaging is nowadays deployed by most popular messaging apps. For protocol analysis, we use verification techniques and modularity to be able to tackle the complexity of the protocols. More generally, I am interested in modeling the security of a cryptographic object, i.e., ask the question "What does it mean to be secure?" and to answer that question by a mathematical model (while always being aware that gaps between models and reality necessarily have to exist) that is simple enough to understand the security guarantees conceptually.

Education/Academic qualification

Doctoral degree, Natural Sciences, Technische Universität Darmstadt

Award Date: 1 Oct 2012

Keywords

  • Cryptography
  • IT security
  • Verification
  • Theory of computation
  • Discrete mathematics

Fingerprint

Dive into the research topics where Chris Brzuska is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication

    Bock, E. A., Banegas, G., Brzuska, C., Chmielewski, Ł., Puniamurthy, K. & Šorf, M., 1 Mar 2024, Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings. Pöpper, C. & Batina, L. (eds.). Springer, p. 101-130 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14584 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • CryptoZoo : A Viewer for Reduction Proofs

    Brzuska, C., Egger, C. & Puniamurthy, K., 1 Mar 2024, Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings. Pöpper, C. & Batina, L. (eds.). Springer, p. 3-25 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14583 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Adaptive Distributional Security for Garbling Schemes with O(| x| ) Online Complexity

    Bock, E. A., Brzuska, C., Karanko, P., Oechsner, S. & Puniamurthy, K., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (eds.). Springer, p. 139-171 33 p. (Lecture Notes in Computer Science; vol. 14438 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • A State-Separating Proof for Yao's Garbling Scheme

    Brzuska, C. & Oechsner, S., 2023, Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE, p. 137-152 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2023-July).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    2 Citations (Scopus)
  • On Provable White-Box Security in the Strong Incompressibility Model

    Bock, E. A., Brzuska, C. & Lai, R. W. F., 31 Aug 2023, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2023, 4, p. 167-187 21 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    41 Downloads (Pure)