Dr. Kirill Morozov
University of North Texas
Computer Science and Engineering
(940) 565-2268
Email:

Education

PhD, University of Aarhus, 2005.
Major: Science
Degree Specialization: Computer Science/Cryptography
Dissertation Title: On Cryptographic Primitives Based on Noisy Channels
MSc, Saint-Petersburg State University of Telecommunications, Russia, 1998.
Major: Radiophysics and Electronics
Dissertation Title: Implementation of the RSA Public-Key Cryptosystem (in Russian)

Professional Memberships

International Association for Cryptologic Research. (November 1, 2009 – Present).

The Institute of Electronics, Information and Communication Engineers. (July 1, 2007 – Present).

Teaching

Teaching Experience

University of North Texas
CSCE 3550, Introduction to Computer Security, 10 courses.
CSCE 4050, Applications of Cryptography, 8 courses.
CSCE 4890, Directed Study, 1 course.
CSCE 4930, Topics in Computer Science and Engineering, 1 course.
CSCE 4999, Senior Thesis, 5 courses.
CSCE 5050, Applicatoins of Cryptography, 13 courses.
CSCE 5550, Introduction to Computer Security, 8 courses.
CSCE 5900, Special Problems, 1 course.
CSCE 5933, Topics in Computer Science and Engineering, 1 course.
CSCE 5934, Directed Study, 2 courses.
CSCE 5950, Master's Thesis, 5 courses.
CSCE 6940, Individual Research, 5 courses.
CSCE 6950, Doctoral Dissertation, 6 courses.

Directed Student Learning

Major Professor, Computer Science and Engineering. (January 8, 2021 – Present).

Major Professor, Computer Science and Engineering. (December 18, 2020 – Present).

Major Professor, Computer Science and Engineering. (November 23, 2020 – Present).

Major Professor, Computer Science and Engineering. (November 1, 2020 – Present).

Major Professor, Computer Science and Engineering. (October 1, 2020 – Present).

Major Professor, Computer Science and Engineering. (October 1, 2020 – Present).

Doctoral Advisory Committee Member, Computer Science and Engineering. (July 15, 2020 – Present).

Major Professor, Computer Science and Engineering. (April 20, 2020 – Present).

Major Professor, Computer Science and Engineering. (April 20, 2020 – Present).

Major Professor, Computer Science and Engineering. (March 27, 2020 – Present).

Doctoral Advisory Committee Member, Computer Science and Engineering. (February 1, 2020 – Present).

Major Professor, Computer Science and Engineering. (January 17, 2020 – Present).

Doctoral Advisory Committee Member, Computer Science and Engineering. (July 1, 2019 – Present).

Doctoral Advisory Committee Chair, Computer Science and Engineering. (September 1, 2018 – Present).

Doctoral Advisory Committee Member, Computer Science and Engineering. (August 10, 2018 – Present).

Major Professor, Computer Science and Engineering. (December 15, 2020).

Major Professor, Computer Science and Engineering. (December 15, 2020).

Major Professor, Computer Science and Engineering. (August 20, 2020December 15, 2020).

Major Professor, Computer Science and Engineering. (August 1, 2020December 15, 2020).

Major Professor, Computer Science and Engineering. (August 1, 2020December 15, 2020).

Doctoral Advisory Committee Member, Computer Science and Engineering. (September 1, 2019November 24, 2020).

Master's Thesis Committee Chair,"Encrypted Collaborative Editing Software," Computer Science and Engineering. (January 15, 2020May 31, 2020).

Major Professor, Computer Science and Engineering. (February 6, 2020May 15, 2020).

Major Professor, Computer Science and Engineering. (February 6, 2020May 15, 2020).

Major Professor, Computer Science and Engineering. (January 6, 2020May 15, 2020).

Doctoral Advisory Committee Member, Computer Science and Engineering. (March 1, 2019April 26, 2020).

Dissertation Committee Member,"Privacy Preserving Machine Learning As a Service," Computer Science and Engineering. (September 9, 2019March 16, 2020).

Major Professor, Computer Science and Engineering. (August 30, 2018December 15, 2019).

Internship Advisor,"Implementation of the IND-CCA1 variant of the McEliece cryptosystem," Computer Science and Engineering. (June 3, 2019July 26, 2019).

Research

Published Intellectual Contributions

Book
Morozov, K., Anada, H., Suga, Y. (2018). Cryptographic Technologies for Securing Network Storage. 80, 116. Fukuoka: Kijima Publishing. https://www.imi.kyushu-u.ac.jp/eng/files/imipublishattachment/file/math_5acd77b7a56ce.pdf
Book Chapter
Morozov, K. (2018). Code-Based Zero-Knowledge Protocols and Their Applications. Mathematical Modelling for Next-Generation Cryptography. 43-62. Springer Singapore. http://dx.doi.org/10.1007/978-981-10-5065-7_3
Morozov, K. (2014). Code-Based Public-Key Encryption. Mathematics for Industry. 47-55. Springer Japan. http://dx.doi.org/10.1007/978-4-431-55060-0_4
Conference Proceeding
Zaccagni, Z., Dantu, R., Morozov, K. (2023). Proof of Review: Trust Me, It's Been Reviewed. 11 pages. New York: ACM. UNT Discovery Park 3940 North Elm Street (Department of Computer Science and Engineering)
Zaccagni, Z., Dantu, R., Morozov, K. (2023). Proof of Review: Trust Me, It's Been Reviewed. 23–34. New York NY: ACM. https://dl.acm.org/doi/10.1145/3625078.3625082
Chiapputo, N., Desmedt, Y., Morozov, K. (2023). Using Untrusted and Unreliable Cloud Providers to Obtain Private Email. 171-182. SECRYPT 2023. https://www.scitepress.org/Link.aspx?doi=10.5220/0012090700003555
Zaccagni, Z., Dantu, R., Morozov, K. (2023). Maintaining Review Credibility Using NLP, Reputation, and Blockchain. 58-66. IEEE. https://ieeexplore.ieee.org/document/10063712
Salau, A., Dantu, R., Morozov, K., Upadhyay, K., Badruddoja, S. (2023). Multi-Tier Reputation for Data Cooperatives. 253-273. Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-031-18679-0_14
Salau, A., Dantu, R., Morozov, K., Badruddoja, S., Upadhyay, K. (2022). Making Blockchain Validators Honest. IEEE. https://doi.org/10.1109/BCCA55292.2022.9921952
Salau, A., Dantu, P., Morozov, K., Upadhyay, K., Badruddoja, S. (2022). Towards a Threat Model and Security Analysis for Data Cooperatives. 707-713. SECRYPT 2022.
Salau, A., Dantu, R., Morozov, K., Badruddoja, S., Upadhyay, K. (2022). Towards a Threat Model and Security Analysis for Data Cooperatives. 707-713. Lisbon,: Proceedings of the 19th International Conference on Security and Cryptography,(SECRYPT)}.
Dockendorf, M., Dantu, P., Morozov, K., Bhowmick, S. (2021). Investing Data with Untrusted Parties using HE. 845-853. Richardson: SECRYPT 2021.
Talkington, J., Dantu, R., Morozov, K. (2020). Detecting Devices and Protocols on VPN-Encrypted Networks. Other. 8. IEEE.
Talkington, J., Morozov, K., Dantu, R. (2020). Why Protocols Fail to Transition to Mobile Domains. Other. 12. IEEE. https://ieeexplore.ieee.org/document/9042951
Sen, N., Dantu, R., Morozov, K. (2020). EW256357 : A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security. 291-310. Springer. https://link.springer.com/chapter/10.1007%2F978-3-030-63095-9_19
Bucuti, T. H., Dantu, R., Morozov, K. (2019). CMCAP: Ephemeral Sandboxes for Adaptive Access Control. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19. ACM Press. http://dx.doi.org/10.1145/3322431.3325414
Desmedt, Y., Dutta, S., Morozov, K. (2019). Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing. Cryptology and Network Security. 291-307. Springer International Publishing. http://dx.doi.org/10.1007/978-3-030-31578-8_16
Aguirre Farro, F., Morozov, K. (2019). On IND-CCA1 Security of Randomized McEliece Encryption in the Standard Model. Code-Based Cryptography. 137-148. Springer International Publishing. http://dx.doi.org/10.1007/978-3-030-25922-8_8
Roy, P., Morozov, K., Fukushima, K., Kiyomoto, S., Takagi, T. (2019). Security Analysis and Efficient Implementation of Code-based Signature Schemes. Proceedings of the 5th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications. http://dx.doi.org/10.5220/0007259102130220
Desmedt, Y., Morozov, K. (2019). VSS Made Simpler. Advances in Information and Computer Security. 329-342. Springer International Publishing. http://dx.doi.org/10.1007/978-3-030-26834-3_19
Talkington, J., Dantu, R., Morozov, K. (2019). Verifying OAuth Implementations Through Encrypted Network Analysis. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19. ACM Press. http://dx.doi.org/10.1145/3322431.3326449
Roy, P. S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S., Sakurai, K. (2018). Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings. 578--594. https://doi.org/10.1007/978-3-319-99807-7\_37
Ranganthan, V. P., Dantu, R., Paul, A., Mears, P., Morozov, K. (2018). A Decentralized Marketplace Application on the Ethereum Blockchain. 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). IEEE. http://dx.doi.org/10.1109/cic.2018.00023
Yoshida, Y., Morozov, K., Tanaka, K. (2017). CCA2 Key-Privacy for Code-Based Encryption in the Standard Model. Post-Quantum Cryptography. 35-50. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-59879-6_3
Morozov, K., Roy, P. S., Sakurai, K. (2017). On unconditionally binding code-based commitment schemes. Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication - IMCOM '17. ACM Press. http://dx.doi.org/10.1145/3022227.3022327
Xu, R., Morozov, K., Basu, A., Rahman, M. S., Kiyomoto, S. (2017). Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. Advances in Information and Computer Security. 159-178. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-64200-0_10
Ke, C., Anada, H., Kawamoto, J., Morozov, K., Sakurai, K. (2016). Cross-group Secret Sharing for Secure Cloud Storage Service. Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication - IMCOM '16. ACM Press. http://dx.doi.org/10.1145/2857546.2857610
Adhikari, A., Morozov, K., Obana, S., Roy, P. S., Sakurai, K., Xu, R. (2016). Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters. Lecture Notes in Computer Science. 3-23. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-49175-2_1
Xu, R., Morozov, K., Yang, Y., Zhou, J., Takagi, T. (2016). Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database. Information Security and Privacy. 181-197. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-40253-6_11
Desmedt, Y., Morozov, K. (2015). Parity Check based redistribution of secret shares. 2015 IEEE International Symposium on Information Theory (ISIT). IEEE. http://dx.doi.org/10.1109/isit.2015.7282597
Roy, P. S., Adhikari, A., Xu, R., Morozov, K., Sakurai, K. (2014). An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency. Security, Privacy, and Applied Cryptography Engineering. 47-58. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-12060-7_4
Xu, R., Morozov, K., Takagi, T. (2014). Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication. Advances in Information and Computer Security. 72-87. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-09843-2_6
Xu, R., Morozov, K., Takagi, T. (2013). On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary. Advances in Information and Computer Security. 258-271. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-41383-4_17
Hu, R., Morozov, K., Takagi, T. (2013). Proof of plaintext knowledge for code-based public-key encryption revisited. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13. ACM Press. http://dx.doi.org/10.1145/2484313.2484385
Hu, R., Morozov, K., Takagi, T. (2013). On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding. 2013 Eighth Asia Joint Conference on Information Security. IEEE. http://dx.doi.org/10.1109/asiajcis.2013.10
Morozov, K., Takagi, T. (2012). Zero-Knowledge Protocols for the McEliece Encryption. Information Security and Privacy. 180-193. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-31448-3_14
Nishi, R., Morozov, K., Hori, Y., Sakurai, K. (2011). Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter. 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks. IEEE. http://dx.doi.org/10.1109/msn.2011.40
Morozov, K., Savvides, G. (2011). Efficient computational oblivious transfer using interactive hashing. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11. ACM Press. http://dx.doi.org/10.1145/1966913.1966977
Cui, Y., Morozov, K., Kobara, K., Imai, H. (2009). Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. 159-168. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-02181-7_17
Imai, H., Morozov, K., Nascimento, A. C. (2009). Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation. Lecture Notes in Computer Science. 183-194. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-10230-1_16
Kobara, K., Morozov, K., Overbeck, R. (2008). Coding-Based Oblivious Transfer. Mathematical Methods in Computer Science. 142-156. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-540-89994-5_12
Oggier, F., Morozov, K. (2008). A practical scheme for string commitment based on the Gaussian channel. 2008 IEEE Information Theory Workshop. IEEE. http://dx.doi.org/10.1109/itw.2008.4578679
Imai, H., Morozov, K., A. Nascimento, A., Winter, A. (2006). Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations. 2006 IEEE International Symposium on Information Theory. IEEE. http://dx.doi.org/10.1109/isit.2006.262083
Imai, H., Morozov, K., A. Nascimento, A. (2006). On the Oblivious Transfer Capacity of the Erasure Channel. 2006 IEEE International Symposium on Information Theory. IEEE. http://dx.doi.org/10.1109/isit.2006.262082
Crépeau, C., Morozov, K., Wolf, S. (2005). Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. Security in Communication Networks. 47-59. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-540-30598-9_4
Damgård, I., Fehr, S., Morozov, K., Salvail, L. (2004). Unfair Noisy Channels and Oblivious Transfer. Theory of Cryptography. 355-373. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-540-24638-1_20
Korjik, V., Morozov, K. (2001). Generalized Oblivious Transfer Protocols Based on Noisy Channels. Information Assurance in Computer Networks. 219-229. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/3-540-45116-1_22
Journal Article
Xu, R., Wang, X., Morozov, K., Cheng, C., Ding, J. (2022). Revisiting group oriented secret sharing schemes. Information Sciences. 589, 751-769. Amsterdam: Elsevier. https://www.sciencedirect.com/science/article/abs/pii/S0020025521012743
Xu, R., Wang, X., Morozov, K. (2021). Group authentication for cloud-to-things computing: Review and improvement. 198(108374), 8. Amsterdam: Elsevier. https://www.sciencedirect.com/science/article/abs/pii/S138912862100356X
Morozov, K., Roy, P. S., Steinwandt, R., Xu, R. (2018). On the security of the Courtois-Finiasz-Sendrier signature. Other. 16, 161-167.
Anada, H., Kawamoto, J., Ke, C., Morozov, K., Sakurai, K. (2017). Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions. Journal of Supercomputing. 73(10), 4275-4301.
Xu, R., Morozov, K., Takagi, T. (2017). Secret Sharing with Cheaters Using Multi-Receiver Authentication. Other. E100A(1), 115-125.
Xu, R., Morozov, K., Yang, Y., Zhou, J., Takagi, T. (2017). Efficient outsourcing of secure k -nearest neighbour query over encrypted database. Computers & Security. 69, 65-83. Elsevier BV. http://dx.doi.org/10.1016/j.cose.2016.11.012
Zhang, M., Xia, Y., Yuan, O., Morozov, K. (2016). Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services. Other. 29(12), 1863-1872.
Xu, R., Morozov, K., Takagi, T. (2015). Note on Some Recent Cheater Identifiable Secret Sharing Schemes. Other. E98A(8), 1814-1819.
Hu, R., Morozov, K., Takagi, T. (2015). Zero-Knowledge Protocols for Code-Based Public-Key Encryption. Other. E98A(10), 2139-2151.
Zhang, M., Morozov, K., Takagi, T. (2014). Generic Constructions and Transformations of Decryption Consistent Encryption. Other. 60(3), 218-228.
Zhang, M., Wang, C., Morozov, K. (2014). LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces. Journal of Supercomputing. 70(3), 1405-1432.
Zhang, M., Morozov, K., Takagi, T. (2014). Revisits and Transformations Among Functional Encryption Systems. Other. 31(1), 103-114.
Pinto, Adriana C. B.,, Dowsley, R., Morozov, K., Nascimento, Anderson C. A., (2011). Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model. IEEE Transactions on Information Theory. 57(8), 5566-5571.
Nojima, R., Imai, H., Kobara, K., Morozov, K. (2008). Semantic security for the McEliece cryptosystem without random oracles. Other. 49(1-3), 289-305.
Technical Report
Damgård, I. B., Fehr, S., Morozov, K., Salvail, L. (2003). Unfair Noisy Channels and Oblivious Transfer. Other. 10(36), . Aarhus University Library. http://www.brics.dk/RS/03/36/

Presentations Given

Invited Talk

Morozov, K. (Author & Presenter), Salau, A. (Author), Dantu, R. (Author), Upadhyay, K. (Author), Badruddoja, S. (Author), 16th International Conference on Mathematical Sciences for Advancement of Science and Technology (MSAST 2022), Multi-Tier Reputation for Data Cooperatives, The Institute for Mathematics, Bioinformatics, Information Technology and Computer Science (IMBIC), Kolkata, India, India. (20222022).

Morozov, K. (Author & Presenter), Desmedt, Y. (Author), Dutta, S. (Author), IMI Workshop: Exploring Mathematical and Practical Principles of Secure Computation and Secret Sharing, Evolving Secret Sharing From Evolving Perfect Hash Families, Institute of Mathematics for Industry, Kyushu University, Japan, Fukuoka, Japan, Japan. (20212021).

Morozov, K. (Author & Presenter), 14th International Conference on Mathematical Sciences for Advancement of Science and Technology (MSAST 2020), Recent Results in Secret Sharing: Cheater Identification, Robustness, and More, The Institute for Mathematics, Bioinformatics, Information Technology and Computer Science (IMBIC), Kolkata, India, India. (20202020).

Morozov, K. (Author & Presenter), Maulana Abul Kalam Azad University of Technology (MAKAUT) Webinar Series on Cryptography, Network Security and Cybersecurity (Session VII), Code-Based Cryptography: Introduction and Recent Results, Maulana Abul Kalam Azad University of Technology (MAKAUT), Kolkata, India, India. (20202020).

Morozov, K. (Author & Presenter), IEEE MetroCon 2019, Post-Quantum Cryptography: Recent Results and Trends, IEEE, Hurst, TX, United States of America. (20192019).

Morozov, K. (Author & Presenter), 6th Code-Based Cryptography Workshop (CBC 2018), Code-Based Zero-Knowledge Proofs, Signatures and More, Florida Atlantic University, Davie, FL, United States of America. (20182018).

Oral Presentation

Dantu, R. (Author & Presenter), Morozov, K. (Author), Bhowmick, S. (Author), Computing Research Association Symposium, Locating Super-Spreaders Through Partnership of Anonymization and Encryption., CRA, Virtual, United States of America. (2020 – ).

Morozov, K. (Author & Presenter), Chiapputo, N. (Author), Desmedt, Y. (Author), Texas Crypto Day, Using Untrusted and Unreliable Cloud Providers to Obtain Private Email, University of Texas at Dallas, Richardson, TX, United States of America. (20232023).

Morozov, K. (Author & Presenter), Salau, A. (Author), Dantu, R. (Author), Upadhyay, K. (Author), Badruddoja, S. (Author), Texas Crypto Day, Multi-Tier Reputation for Data Cooperatives, Texas A&M University, College Station, TX, United States of America. (20222022).

Paper

Chiapputo, N. (Author), Desmedt, Y. (Author), Morozov, K. (Author & Presenter), 20th International Conference on Security and Cryptography (SECRYPT 2023), Using Untrusted and Unreliable Cloud Providers to Obtain Private Email, SECRYPT Secretariat, Virtual, Italy. (20232023).

Professional Meeting Contribution

Morozov, K. (Author & Presenter), TxDOT and Transportation Research Alignment and Collaboration (TRAC) Meeting, Research Introduction, Texas A&M Transportation Institute, Bryan TX, United States of America. (20232023).

Symposium

Morozov, K. (Author & Presenter), Get to Know Your Fellow CAE-Rs E meeting, Recent Research Results, NSA, Virtual, United States of America. (20232023).

Contracts, Grants and Sponsored Research

Grant - Research
Do, H. (Principal), Morozov, K. (Co-Principal), Bryce, R. C. (Other), Hochstetler, J. (Other), "GenCyber Teachers Camp: GenCyber Academy," Sponsored by National Security Agency (NSA), Federal, $149900 Funded. (September 2023August 2025).
Dantu, R. (Principal), Morozov, K. (Co-Principal), Dantu, S. (Co-Principal), "PrivacyPreserving Analytics on a Data Cooperative for Comprehensive Threat Prevention," Sponsored by National Security Agency, Federal, $750000 Funded. (September 9, 2021December 31, 2024).
Fu, S. (Principal), Morozov, K. (Co-Principal), "North Texas GenCyber Academy," Sponsored by National Security Agency and National Science Foundation, Federal, $139042 Funded. (June 2022June 2024).
Dantu, R. (Principal), Morozov, K., Bhowmick, S. (Co-Principal), "Locating Super-Spreaders Through Partnership of Anonymization and Encryption," Sponsored by NSA, Federal, $299944 Funded. (2020September 2023).

Service

University Service

Faculty Advisor, UNT Cybersecurity Club (Student organization). (October 2019 – Present).

Member, Retention Committee. (September 2018 – Present).

Member, Chair Search Committee. (October 13, 2021November 30, 2023).

Member, Faculty Search Committee. (November 23, 2021May 12, 2022).

Member, Research Roadmap Committee. (September 5, 2021October 26, 2021).

Member, Faculty Search Committee. (October 2020March 2021).

Member, Faculty Search Committee. (June 2020September 2020).

Member, Faculty Search Committee. (December 2019March 2020).

Member, Faculty Search Committee. (September 2018December 2018).

Professional Service

Workshop Organizer, Organizing committee of Texas Crypto Day Workshop, TX. (December 2, 2022 – Present).

Committee Member, Program Committee of the 16th IEEE/ACM International Conference on Utility and Cloud Computing (UCC2023), Denton, TX. (September 17, 2023October 21, 2023).

Committee Member, Program Committee of the 19th International Conference on Information Security and Cryptology (Inscrypt 2023), Denton, TX. (July 15, 2023October 15, 2023).

Committee Member, Program Committee of the 5th International Conference on Blockchain Computing and Applications (BCCA 2023), Denton, TX. (June 15, 2023July 31, 2023).

Committee Member, Program Committee of the 18th International Workshop on Security (IWSEC 2023), Denton, TX. (April 3, 2023May 30, 2023).

Committee Member, Program Committee of the 17th International Conference on Provable and Practical Security (ProvSec 2023), Denton, TX. (April 2, 2023May 15, 2023).

Committee Member, Program Committee of the 29th Australasian Conference on Information Security and Privacy (ACISP 2023), Denton, TX. (February 13, 2023April 15, 2023).

Committee Member, Program Committee of the 4th International Workshop on Code-Based Cryptography (CBCrypto 2023), Denton, TX. (March 1, 2023April 1, 2023).

Reviewer, Ad Hoc Reviewer, 3rd Annual TAMS Fair, Denton, TX. (January 28, 2023January 28, 2023).

Committee Member, Program Committee of the 15th IEEE/ACM International Conference on Utility and Cloud Computing (UCC2022), Denton, TX. (September 19, 2022October 15, 2022).

Committee Member, Program Committee of the 17th International Workshop on Security (IWSEC 2022), Denton, TX. (April 13, 2022May 29, 2022).

Committee Member, Program Committee of the 28th Australasian Conference on Information Security and Privacy (ACISP 2022), Denton, TX. (February 21, 2022May 10, 2022).

Committee Member, Program Committee of the 3nd International Workshop on Code-Based Cryptography (CBCrypto 2022), Denton, TX. (April 19, 2022April 29, 2022).

Reviewer, Ad Hoc Reviewer, 2nd Annual TAMS Fair, Denton, TX. (January 29, 2022January 29, 2022).

Editor, Guest Editor, Special Issue “Cryptographic Systems Based on Coding Theory” in “Cryptography” journal by MDPI, Denton, TX. (September 6, 2020December 20, 2021).

Committee Member, Program Committee of the 15th International Conference on Provable and Practical Security (ProvSec 2021), Denton, TX. (July 10, 2021August 25, 2021).

Committee Member, Program Committee of the 22nd World Conference on Information Security Applications (WISA 2021), Denton, TX. (June 30, 2021July 31, 2021).

Committee Member, Program Committee of the 2nd International Workshop on Code-Based Cryptography (CBCrypto 2021), Denton, TX. (May 10, 2021June 8, 2021).

Committee Member, Program Committee of the 26th Australasian Conference on Information Security and Privacy (ACISP 2021), Denton, TX. (February 25, 2021April 25, 2021).

Committee Member, Program Committee of the 2020 IEEE Cloud Summit, Denton, TX. (September 14, 2020October 5, 2020).

Committee Member, Program Committee of the 14th International Conference on Provable and Practical Security (ProvSec 2020), Denton, TX. (July 15, 2020August 31, 2020).

Committee Member, Program Committee of the 21st World Conference on Information Security Applications (WISA 2020), Denton, TX. (May 31, 2020July 10, 2020).

Committee Member, Program Committee of the International Workshop on Code-Based Cryptography (CBCrypto 2020), Denton, TX. (February 8, 2020March 4, 2020).

Committee Member, Program Committee of the 6th International Conference on Information Systems Security and Privacy (ICISSP 2020), Denton, TX. (October 25, 2019December 20, 2019).

Committee Member, Program Committee of the 20th World Conference on Information Security Applications (WISA 2019), Denton, TX. (June 26, 2019July 29, 2019).

Committee Member, Program Committee of the 13th International Conference on Provable and Practical Security (ProvSec 2019), Denton, TX. (June 24, 2019July 15, 2019).

Committee Member, Program Committee of the 14th International Workshop on Security (IWSEC 2019), Denton, TX. (April 2, 2019May 27, 2019).

Committee Member, Program Committee of the 24th Australasian Conference on Information Security and Privacy (ACISP 2019), Denton, TX. (March 1, 2019April 1, 2019).

Committee Member, Program Committee of the 1st International Conference on Frontiers in Cyber Security (FCS 2018), Denton, TX. (June 20, 2018August 10, 2018).

Committee Member, Program Committee of the 12th International Conference on Provable Security (Provsec 2018), DENTON, TX. (June 30, 2018August 3, 2018).

Committee Member, Program Committee of the 13th International Workshop on Security (IWSEC 2018), Denton, TX. (April 2, 2018May 23, 2018).

Public Service

Other, HackUNT 2023 Hackathon, Denton, TX. (November 12, 2023November 12, 2023).

Other, NSBEHack 2023 Hackathon, Denton, TX. (October 13, 2023October 14, 2023).

Other, HackUNT 2022 Hackathon, Denton, TX. (April 24, 2022April 24, 2022).

Other, HackUNT 2020 Hackathon, Denton, TX. (February 15, 2020February 15, 2020).

Other, HackUNT 2018 Hackathon, Denton, TX. (April 7, 2018April 7, 2018).