Towards a programmable TPM
BotGraph: Large Scale Spamming Botnet Detection
Building a Safer Web
Web content has shifted from simple documents to active programs, but web browsers and protocols have not evolved adequately to support them. As a result, safety problems in web browsers and web sites now regularly…
CHI ’09: Computing with a Human Touch
By Rob Knies, Managing Editor, Microsoft Research Historically, Microsoft Research has had a big footprint during CHI, the annual conference on Human Factors in Computing Systems sponsored by the Association for Computing Machinery’s Special Interest…
Abelian surfaces with a given number of points
This is a report on joint work with Everett Howe and Kristin Lauter. I will discuss the genus 2 analogue of the problem of efficiently constructing an elliptic curve over a finite field with a…
Genus-2 curves with a given number of points
This is a report on joint work with Kristin Lauter and Peter Stevenhagen. Broker and Stevenhagen have shown that in practice it is not hard to produce an elliptic curve (over some finite field) with…
Lattice-Based Cryptography
Most modern cryptography, and “public-key” crypto in particular, is based on mathematical problems that are conjectured to be infeasible (e.g., factoring large integers). Unfortunately, standard public-key techniques are often too inefficient to be employed in…