Research Interests

My main research interests are in the area of applied cryptography and computer security [JR.1–3, JR.5–6, IB.4–5, IC.1–3, IC.5–6, IC.8–9, IC.11–13, IC.15, IC.17–22, IC.25–32, PT.1–12, IPT.1, TR.6, TR.8, TR.3–4, TR.1]. I also work in the area of data security \& privacy [IB.1–3, JR.7, IC.10, IC.14, IC.16, IC.23–24, TR.5], specifically: developing privacy-preserving mechanisms that allow users to access databases without revealing which data they're accessing. Other research topics I am interested in, are logic synthesis of combinatorial circuits and computer architecture security [JR.4, IC.6–7].


In particular, the activity carried out in the last years spans over the following research lines:

Access Control and Cryptographic Databases

Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness, flexibility, security and privacy are top requirements for an access control system together with, and usually in conflict with, simplicity and efficiency. Database-as-a-service, cloud storage and social networking scenarios raise interesting research issues and there are many challenges in developing techniques for ensuring a selective information sharing and dissemination process. In particular, I focused on (a) access control and data sharing capabilities in outsourcing scenarios [IB.1, IC.10, IC.16, TR.5]; (b) remote indexing of cryptographic databases with privacy guarantees [JR.7, IB.2-3, IC.23-24].


Applied Cryptography

My research in applied cryptography and practical security has been concentrated in two areas: (a) efficient HW and SW implementation of cryptographic algorithms – symmetric and elliptic curve public-key schemes, and identity-base schemes, (b) side-channel attacks: differential power analysis, electro-magnetic (EM) attacks, fault analysis.


Other Research Interests: Logic Synthesis and Computer Architecture Security

Boolean matching is the problem of determining whether two Boolean functions are functionally equivalent under the permutation and negation of inputs and outputs. The topic finds numerous applications in verification and logic synthesis. The research contribution [JR.4, IC.7], addresses the P-equivalence Boolean matching, outlining a formal framework that unifies some of the spectral and canonical form-based approaches to the problem. As a first major contribution, we show how these approaches are particular cases of a single generic algorithm, parametric with respect to a given linear transformation of the input function. As a second major contribution, we identify a linear transformation that can be used to significantly speed up Boolean matching with respect to the state-of-the-art.