MATHEMATICS AND COMPUTER SCIENCE
Cryptography, the science of information security, is often relegated to the realm of spies and secret agents. However, we all rely on cryptography on a daily basis, for example when using internet banking or a wireless car key.
The cryptography group at IST Austria works on theoretical and practical aspects of cryptography, including:
Crypto for light-weight devices. The team works towards provably secure cryptographic schemes for light-weight devices such as RFID tags, which are too constrained to run existing cryptographic schemes.
Leakage-resilient cryptography. This project aims to construct schemes that are provably secure against “side-channel attacks”. These are attacks in which an attacker exploits information leaked during computation from a cryptographic device like a smart card.
Sustainable Cryptocurrencies. Bitcoin is the first successful digital currency. Its popularity comes from the fact that it is decentralized, so no central authority controls it. To achieve security despite decentralization, a huge amount of computing power is constantly wasted towards generating “proofs of work”. This is economically and ecologically problematic. The Pietrzak group works towards more sustainable cryptocurrencies.
On this site:
Leakage-resilient cryptography | Cryptosystems for light-weight devices | Computational entropy | Memory-hard functions | Cryptocurrencies
Walter M. 2019. Sampling the integers with low relative error. Progress in Cryptology – AFRICACRYPT 2019. International Conference on Cryptology in AfricaLNCS vol. 11627. 157–180. View
Choudhuri AR, Hubáček P, Kamath Hosdurg C, Pietrzak KZ, Rosen A, Rothblum GN. 2019. Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing – STOC 2019. STOC: Symposium on Theory of Computing 1103–1114. View
Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. 2019. Adaptively secure proxy re-encryption. PKC: Public-Key Cryptograhy, LNCS, vol. 11443. 317–346. View
Pietrzak KZ. 2019. Simple verifiable delay functions. 10th Innovations in Theoretical Computer Science Conference. ITCS 2019: Innovations in Theoretical Computer Science, LIPIcs, vol. 124. 60. View
Demay G, Gazi P, Maurer U, Tackmann B. 2019. Per-session security: Password-based cryptography revisited. Journal of Computer Security. 27(1), 75–111. View
since 2016 Professor, IST Austria
2011 – 2016 Assistant Professor, IST Austria
2005 – 2011 Scientific Staff Member, Centrum Wiskunde & Informatica, Amsterdam, The Netherlands
2006 Postdoc, École Normale Supérieure, Paris, France
2005 PhD, ETH Zurich, Switzerland
2015 ERC Consolidator Grant
2010 ERC Starting Grant