Welcome to my corner of the World Wide Web!

Software Engineering has always been my passion.

Recently, I obtained my Ph.D. in Computer Science at the Graduate Center of CUNY under supervision of Professor Nelly Fazio. My main research fields of interest included foundations, provable constructions, and practical implementations of Cryptography, Steganography, and Computer Security.

Currently, I'm working at Google (Mountain View) as a Software Engineer.

In this website, you will find information regarding the papers that I've authored, the presentations that I've given, and also the professional communities that I was affiliated with during my Ph.D. years. If you would like to know me more, feel free to contact me via email or even connect to me via Facebook or LinkedIn.

Best!


Publications:

  1. Oblivious Group Storage
    Nelly Fazio, Antonio R. Nicolosi, and Irippuge Milinda Perera
    The Annual Conference of International Technology Alliance – ACITA, 2015
    [ paper ]
  2. Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption
    Joseph Soryal, Irippuge Milinda Perera, Ihab Darwish, Nelly Fazio, Rosario Gennaro, and Tarek Saadawi
    Int. Conf. on Advanced Information Networking and Applications – AINA 2014, ISSN 1550-445X, pp. 472-479, IEEE, 2014
    [ paper | ieee ]
  3. Broadcast Steganography
    Nelly Fazio, Antonio R. Nicolosi, and Irippuge Milinda Perera
    Topics in Cryptology – CT-RSA 2014, LNCS 8366, pp. 64-84, Springer, 2014
    [ paper | eprint | springer ]
  4. Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
    Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, and William E. Skeith III
    Advances in Cryptology – CRYPTO 2013, LNCS 8043, pp. 148-165, Springer, 2013
    [ paper | eprint | springer ]
  5. Protecting Receivers' Identities in Secure Data Distribution
    Nelly Fazio and Irippuge Milinda Perera
    The Annual Conference of International Technology Alliance – ACITA, 2012
    [ paper | poster ]
  6. Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
    Nelly Fazio and Irippuge Milinda Perera
    Public Key Cryptography – PKC 2012, LNCS 7293, pp. 225-242, Springer, 2012
    [ paper | eprint | springer | poster ]

Presentations:

  1. Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption
    AINA Conference, University of Victoria, BC, Canada, May 14, 2014
    [ slides | listing ]
  2. Broadcast Steganography
    RSA Conference, Moscone Center, CA, USA, February 25, 2014
    [ slides | listing ]
  3. How to Broadcast a Secret Covertly
    GC Cryptography Student Seminar, The Graduate Center of CUNY, NY, USA, February 21, 2014
    [ slides | listing ]
  4. Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
    CRYPTO Conference, UC Santa Barbara, CA, USA, August 21, 2013
    [ video | slides | listing ]
  5. Challenges in Proving Hard-Core Predicates for a Diffie-Hellman Problem
    IBM Research Cryptography Seminar, Thomas J. Watson Research Center, NY, USA, April 10, 2013
    [ slides ]
  6. Anonymous Broadcast Encryption
    GC Cryptography Student Seminar, The Graduate Center of CUNY, NY, USA, June 22, 2012
    [ slides | listing ]
  7. Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
    NYU Cryptography Seminar, New York University, NY, USA, April 25, 2012
    [ slides | listing ]

Theses:

  1. Doctoral Dissertation: Theory and Applications of Outsider Anonymity in Broadcast Encryption
    Irippuge Milinda Perera
    The Department of Computer Science, The Graduate Center of CUNY, 2015
    [ paper ]
  2. Master's Thesis: Anonymity in Public-Key Cryptography
    Irippuge Milinda Perera
    The Department of Computer Science, The City College of CUNY, 2013
    [ paper ]
  3. Senior Capstone Project: A Secure Communication System for Sensor Networks
    Tolulope Abayomi, Stanis Laus Billy, Edwin Guzman, and Irippuge Milinda Perera
    The Department of Computer Science, The City College of CUNY, 2010
    [ paper ]

Technical Reports:

  1. Decentralized Information Flow Control for Operating Systems – A Survey
    Kenneth Ezirim, Wai Khoo, George Koumantaris, Raymond Law, and Irippuge Milinda Perera
    The Department of Computer Science, The Graduate Center of CUNY, 2012
    [ paper ]
  2. Trusted Platform Module – A Survey
    Kenneth Ezirim, Wai Khoo, George Koumantaris, Raymond Law, and Irippuge Milinda Perera
    The Department of Computer Science, The Graduate Center of CUNY, 2012
    [ paper ]
  3. Defenses Against Network Coding Pollution Attacks in Wireless Mesh Networks
    Irippuge Milinda Perera
    The Department of Computer Science, The Graduate Center of CUNY, 2011
    [ paper ]

Affiliations:

  1. The Graduate Center Crypto Group – GCCG
    The Graduate Center of CUNY
    [ website ]
  2. Center for Algorithms & Interactive Scientific Software – CAISS
    The City College of New York of CUNY
    [ website ]