Ensuring privacy and security in the digital world.
Our solutions are based on mathematically provable cryptography. Our founders, employees, and consultants have hundreds of peer-reviewed publications in leading journals, conferences, and books in cryptography, privacy, security, networking, algorithms, and theoretical computer science. We have made fundamental contributions to the areas of Secure Multiparty Computation, Zero Knowledge, Key Exchange, Distributed Consensus, Authentication, and Encryption. Members of our team pioneered the areas of Private Information Retrieval, Oblivious RAM, Searchable Encryption, Oblivious Transfer Extension, Oblivious Pseudorandom Functions, Provable Program Obfuscation, Function Secret Sharing, and zk-SNARKs.
We aim to enrich individuals and society with our privacy-preserving technologies that enable new ways of analyzing private data.
“We have been researching cryptography for decades, and have pioneered several theoretical tools that aim to resolve the tension between privacy and utility. Addressing such issues requires a joint effort from several domains, including engineering and legislature, and it is refreshing to see legislation like the Know Before You Go Act take a well-informed approach to accomplish such a lofty goal.”Rafail Ostrovsky, Ph.D., Professor at UCLA, and Co-Founder, Board Member of Stealth Software Technologies, Inc., as quoted in the “Student Right to Know Before You Go Act” press release