Explores Bluetooth security, focusing on pairing protocols, key recovery, and active attacks in Bluetooth 2.0 and the enhanced Bluetooth 2.1 with Secure Simple Pairing (SSP).
Explores zero-knowledge construction, setup models, and the power of interaction in cryptographic protocols, including Sigma Protocol and NP Zero-Knowledge Proofs.