Cryptology: more precisely, designing and analyzing symmetric schemes. Currently, my research group is primarily focused on the security analysis of lightweight ciphers, including block ciphers, hash functions, and authenticated encryption schemes.
Cryptographic protocols for constrained environments: I am also interested in the security analysis of lightweight and ultra-lightweight protocols proposed to provide desired security for devices with limited security resources, such as RFID tags and IoT edge devices.
Hardware Security: Any good crypto scheme can be compromised dramatically if it is not implemented appropriately. Hence, we consider the security of symmetric schemes against side channel attacks such as fault injection and power analysis.