Research Interest

 




  • Cryptography

    • White-box Cryptography

    • Policy-based Cryptography

    • Association-based Cryptography

    • Identity & Pairing-based Cryptography



  • Software Security

    • Reverse Engineering 

    • Ethical Hacking

    • Obfuscated Technology



  • Information Security and Privacy

    • Database Security

    • Big Data Security

    • Cloud Computing Security

    • Privacy Enhancing Technology

    • Multimedia Security



  • Network Security

    • Anonymous Communication

    • Computer and Network Security

    • Mobile Ad Hoc  Network Security

    • Sensor Network Security




In the present disclosure, implementations of Diffie-Hellman key agreement are provided that, when embodied in software, resist extraction of cryptographically sensitive parameters during...