Design and analysis of algorithms used in cryptographic protocols or security assessments.

We carried out a sanity check of public key material on the web. Some of the findings were discussed here.

Three of our record calculations are linked to under slashdot. The latest is a 73-digit factor found using the elliptic curve method.

Chosen-prefix Collisions for MD5 and Applications describes the construction of a certificate for a rogue Certification Authority. This paper supports migration away from 1024-bit RSA and this describes our number crunching on clusters at EPFL.