Information security, computer and network security, wireless security, cryptography, algorithms, and applied mathematics.
- Public-key Cryptography
- Wireless Security
- RFID Security
- Secret Sharing & Threshold Cryptography
- Secure e-voting
- Efficient Cryptographic Implementations/Algorithms