Hey there!
I research cryptography with an eye for practice. My work centers on the design and analysis of real-world cryptographic protocols. When studying existing protocols, I look to develop a formal model that captures their intended security guaranatees, and then provide a mathematical “proof of security”. Unfortunately, such proofs aren't always possible.
I recently completed my PhD, in which I study secure group messaging in the multi-device setting. Think:
If you are interested in the answers to these questions, and can stomache the math, you should take a look at my thesis!
- What happens when I sign into WhatsApp from my laptop?
- How does this interact with, or undermine, the underlying end-to-end encryption?
Check out my other work (or get in touch) using the links below.