To educate the public, governments, and companies about both the techniques used and the outcomes of using them, and to make sure people demand more security and privacy since they would be aware that more is possible.
Study a wide variety of topics, from designing cryptographic protocols to the evaluation of their effectiveness to enable secure communication, such as key agreement protocols, key distribution schemes, secret sharing schemes,
Study a wide variety of topics from security assessment and audit. Provides many techniques used and the outcomes of using them.