Search for:
Search Button

About
About the Lab
Director’s Note
Our Vision
Founding Donor
Advisory Board
Principal Investigators

People
Associated Faculty
Executive Committee
Students
Program Directorate

TrustNet

Projects

Resources

News

Events
Talks
Trust Summit

Engage
Menu

About
About the Lab
Director’s Note
Our Vision
Founding Donor
Advisory Board
Principal Investigators

People
Associated Faculty
Executive Committee
Students
Program Directorate

TrustNet

Projects

Resources

News

Events
Talks
Trust Summit

Engage
Talks
Geometry of Secure Computation
Hemanta Maji
End-to-End Secure Messaging with Traceability Only for Illegal Content
Guru Vamsi Policharla
Errors and Correction in Cumulative Knowledge
Madhu Sudan
Time-Space Tradeoffs for Collisions in Hash Functions
Akshima
Open and Permissionless Blockchains - A Swiss Perspective
Felix Härer
Composing High-Assurance Software
Natarajan Shankar
End-to-End Security for Evolved Computer Systems
Earlence Fernandes
A Conversation on the Draft Digital Personal Data Protection Bill 2022
Apar Gupta
Software needs Watchdogs
Tom Henzinger
A Systems Security Perspective on Building Secure and Reliable Deep Learning Systems
Sanghyun Hong
SCALES: MPC with Small Clients and Large Ephemeral Servers
Anasuya Acharya
Privacy Preserving Collaborations: DPFs to the rescue
Adithya Vadapalli
A Conversation on the Draft Indian Telecommunication Bill 2022
Debayan Gupta
Biometrics: When Technology Meets the Real-World
Arun Ross