Resume
Brief Biography
I studied mathematics as an undergrad at Boston University. Continuing at Harvard, I completed my Ph.D. in 1999. Concurrent with these studies, starting in 1989, I worked as a consultant and software engineer involving quantitative analysis in the finance industry. After completing my degree, I learned about web technologies, but turned my interests to cryptography. In 2000, I joined RSA Laboratories where I pursued research topics in cryptography and data security. In 2007 I joined the mapping department at Akamai, moving into management in 2010. During my tenure at Akamai I led an elite group of engineers building and operating the core traffic steering algorithms, whose output was passed to DNS and controlled a large fraction of internet traffic. This webpage is one way to find me, communicate a brief history of work at Akamai and post some earlier papers I wrote while working in cryptography research.
Akamai Experience
At Akamai, I served as Director of Global Load Balancing, leading an organization of nearly 30 members across the US, Poland, and India. My teams evolved and operated a centralized global controller, which, every 30 seconds, steered up to 15-30% of the world's internet traffic. With safe engineering and operation, we ensured high reliability and 100% uptime for this mission-critical system, even as the network infrastructure and CDN products scaled exponentially. I founded a remote team for real-time control system visibility tools, drove multi-million dollar CAPEX savings through software changes, and led cross-organization engineering efforts for a new Cloud offering.
As a leader, I used SAFe-inspired planning cycles to achieve prioritization, transparency, and alignment. An expert in stakeholder management, I collaborated weekly with dozens of leaders company-wide, including network planners, SRE teams, Product Management, safety/software release teams, and executive business owners. I consistently delivered rapid level-of-effort assessments that directly informed prioritization. My focus on relationship building, continuous performance feedback, and motivating and coaching my team resulted in highly productive and one of this most stable teams at Akamai. I've also refined my communication and presentation skills for over 25 years.
Journal Paper
- Elliptic Fibers over non-Perfect Residue Fields, Journal of Number Theory, Volume 104, Issue 1, January 2004, Pages 75-99 Postscript / PDF
Conference Papers
- Johannes Buchmann, Erik Dahmen, Michael Szydlo: Hash-based Digital Signature Schemes
- John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung: Fourth-factor authentication: somebody you know. ACM Conference on Computer and Communications Security 2006: 168-178 PDF
- Michael Szydlo, Yiqun Lisa Yin: Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. CT-RSA 2006: 99-114 PDF
- Michael Szydlo: A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions. Financial Cryptography 2006: 166-170 webarchive
- Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo: A Chat at the Old Phishin' Hole. Financial Cryptography 2005: 88
- Michael Szydlo: Risk Assurance for Hedge Funds Using Zero Knowledge Proofs. Financial Cryptography 2005: 156-171 PDF
- Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, Michael Szydlo: Security Analysis of a Cryptographically-Enabled RFID Device. USENIX Security 2005 PDF
- Proofs for Two-Server Password Authentication, RSA Cryptographers Track '05, Postscript PDF
- A Method to Solve Cyclotomic Norm Equations f*f_rev, ANTS '04, Postscript PDF
- Merkle Tree Traversal in Log Space and Time, Eurocrypt '04, Postscript PDF
Preprint version- 2003 - (more efficient, but also more complicated algorithm) Postscript PDF - The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy., with Ari Juels and Ronald Rivest, ACM-CCS '03 Postscript / PDF
- Nightingale: A New Two-Server Approach for Authentication with Short Secrets, with John Brainard, Ari Juels, and Burt Kaliski. USENIX '03. Postscript / PDF
- Hypercubic Lattice Reduction and Analysis of GGH and NTRUSign Signatures, Eurocrypt '03, Postscript / PDF
- Fractal Merkle Tree Representation and Traversal, with Markus Jakobsson, Tom Leighton, Silvio Micali, RSA Cryptographers Track '03 Postscript / PDF
- Ring Signatures for Ad-hoc Groups, with Emmanuel Bresson and Jacques Stern, Crypto '02 Postscript / PDF
- Analysis of the Revised NTRU signature scheme R-NSS, with Craig Gentry, Eurocrypt '02, Postscript / PDF
Full version: including appendices, applications to NTRUSign Postscript PDF - A Two-Server Sealed-Bid Auction Protocol, with Ari Juels, Financial Cryptography '02. Postscript / PDF
- Cryptanalysis of the NTRU signature scheme, (NSS), from Eurocrypt 2001, with Craig Gentry, Jakob Jonsson, and Jacques Stern, Asiacrypt '01. Postscript / PDF
Some Manuscripts and Presentations (Cryptography)
- NSS Cryptanalysis - Slides presented at Eurocrypt 2001 Powerpoint
- Revised NSS Cryptanalysis Summary Postscript / PDF
- Revised NSS Cryptanalysis Presentation Powerpoint
Some Manuscripts and Presentations (Mathematics)
This thesis work involves explicit constructions of Néron models, extensions of Tate's Algorithm to compute the special fiber of an elliptic curve to the non perfect residue field case, and the resolution of singularities on elliptic schemes.
- Thesis Abstract and Theorem statements Postscript / PDF
- Discussion specialized to characteristic zero Postscript / PDF
- Treatment in Mixed Characteristic, (full generality), (Ph. D. thesis) Postscript / PDF
- Some Presentation Slides: Postscript / PDF
Conference Committee Participation
- RSA Conference '04
- ACNS '04 (also publicity chair)
- EuroPKI'04
- WISE'04 (publicity co-chair)
- External Referee, RSA'02, RSA'03, FC'02, FC'03, FC'04, ACM'02, ACM'03
Selected Invited Workshop Participation and Speaking Engagements
- Boston University Business School, Feb 5, 2001, Boston, MA.
- Boston University Mathematics Department, April 8, 2001, Boston, MA.
- United States Patent Office (USPTO), April 26, 2001, Washington DC.
- Ecole Normale Superieure (ENS), Cryptography and Security Seminar, October 11, 2001, Paris, France.
- Catholic University of Lovain (UCL), Cryptography and Security Seminar, October 18, 2001, Louvain, Belgium.
- Mathematical Association of America (MAA) MathFest Cryptography Seminar, June 30-31, 2002, Burlington, Vermont.
- International Conference and Research Center for Computer Science, Cryptography Workshop, Sept 22-26, 2002, Dagstuhl, Germany.
- European Institute for Computer Anti-Virus Research (EICAR), May 1-4 2004, Luxemburg.
- United States Patent Office (USPTO), October 5, 2004, Washington DC.
- Centre International de Rencontres Mathematiques (CIRM), Cryptography Workshop, Nov 8-12 2004, Luminy, France.