Cryptography Research





Microsoft Research blog


Cryptography is the ancient science of encoding messages so that only the sender and receiver can understand them. Cryptography is now available to everyone thanks to the development of modern computers, which can perform more mathematical operations in a second than a human being could do in a lifetime. An ordinary PC can produce codes of such complexity that the most powerful supercomputer using the best available attack algorithms would not break them in a million years. Cryptography is used to secure telephone, Internet, and email communication and to protect software and other digital property.

The Cryptography group within Microsoft Research serves multiple roles:

  • Researching new cryptographic methods and applications.
  • Working with standards bodies to develop security protocols.
  • Providing internal security consulting on Microsoft products.

Crypto Colloquium

The Crypto Colloquium is a venue for sharing our work with other local and visiting researchers.

Long-Term Visitors

Short-Term Visitors


Spring 2016

  • Shashank Agrawal, U. of Illinois at Urbana Champaign
  • Peter Rindal, Oregon State University

Summer/Fall 2015

  • Hao Chen, U. of Washington
  • Chaya Ganesh, Courant Institute
  • Kim Laine, UC Berkeley
  • Tarik Moataz, Colorado State U.

Spring 2015

  • Miran Kim, Seoul National University

Summer/Fall 2014

  • Shashank Agrawal, U. of Illinois at Urbana Champaign
  • Alina Dudeanu, EPFL
  • Tony Feng, Harvard
  • Xianrui Meng, Boston University
  • Muhammad Naveed, U. of Illinois at Urbana Champaign
  • Thomas Pöppelmann
  • Saeed Sadeghian, U. of Calgary
  • David Wu, Stanford

Summer/Fall 2013

  •  Foteini Baldimtsi, Brown
  • Alyson Deines-Schartz, U. of Washington
  • Kim Laine, UC Berkeley
  • Tancrede Lepoint, Ecole Normale Superieure
  • Sarah Meiklejohn, UCSD
  • Andrea Miele, EPFL
  • Joop Van de Pol, University of Bristol

Summer 2012

  • Craig Costello, Queensland U.
  • Feng-Hao Liu, Brown
  • Anurag Khandelwal, IIT Kharagpur
  • Jake Loftus, University of Bristol
  • Olya Ohrimenko, Brown
  • Vanishree Rao, UCLA

Summer/Fall 2011

  • Shweta Agrawal, UT Austin
  • Gaetan Bisson, LORIA/TU Eindhoven
  • Joppe Bos, EPFL
  • Craig Costello, Queensland U.
  • Simon Knellwolf, ETH Zurich
  • Sarah Meiklejohn, UC San Diego
  • Ben Riva, Tel Aviv U.
  • Lei Wei, UNC Chappel Hill

Summer 2010

  • Nishanth Chandran, UCLA
  • Beth Malmskog, Colorado State U.
  • Charalampos Papamanthou, Brown
  • Mariana Raykova, Columbia
  • Damien Robert, LORIA
  • Alexandra Savelieva, HSE
  • Emily Shen, MIT
  • Panagiotis Voulgaris, UC San Diego

Summer 2009

  • Michael Naehrig, TU Eindhoven
  • Adam O’Neill, Georgia Tech
  • Mariana Raykova, Columbia
  • Emily Shen, MIT
  • Bianca Viray, UC Berkeley
  • Marco Streng, Universiteit Leiden

Summer 2008

  • Sherman Chow, NYU
  • Ari Feldman, Princeton
  • Vipul Goyal, UCLA
  • David Gruenewald, U. of Sydney
  • Dan Shumow, U. of Washington

Interns with Kristin Lauter (2001-2007)

  • Kirsten Eisentraeger, UC Berkeley
  • Denis Charles, U Wisconsin
  • Anton Mityagin, UCSD
  • Dimitar Jetchev, UC Berkeley
  • David Mandell Freeman, UC Berkeley
  • Ning Shang, Purdue
  • Kate Stange, Brown

In The News

The Future of Cryptography | Queen Elizabeth Prize for Engineering | August 2018
First woman ever wins math’s ‘Nobel Prize’ | UPI | August 14, 2014
Lauter Named Next AWM President | Inside Microsoft Research | January 16, 2014
How to Hide Your Genome | Science | February 2014
A Cipher for Your Genome | Genewatch | January – April 2014
Cryptography Could Add Privacy Protections to NSA Phone Surveillance | MIT Tech. Review | April 9, 2014
Alice and Bob in Cipherspace | American Scientist | May 2012
The Trash Attack | The Register | November 1, 2011
Cryptanalysis of the Full AES!
A Cloud that Can’t Leak | MIT Tech. Review | August 9, 2011
Considerations for the Cryptographic Cloud | HPC in the Cloud
Security in the Cloud | Comm. of the ACM | November 2010
Factorization of RSA-768!Cryptology ePrint Archive | January 2010
Security in the Ether | MIT Tech. Review | December 21, 2009
Video: searchable encryption | MIT Tech. Review
Searching an encrypted cloud | MIT Tech. Review | November 12, 2009