./About Me

Hey! My name is Dimitris Mouris (Δημήτρης Μούρης) and I am the Head of Cryptography at Nillion (Nilogy). I'm originally from Athens, Greece, and currently based in Philadelphia, USA.


I am motivated by the impact of cryptography in contemporary society and on humanity - how it preserves privacy and unlocks new forms of digital cooperation. My research focuses on applied cryptography, particularly privacy-preserving and verifiable computation using secure multi-party computation (MPC), zero-knowledge proofs (ZKP), and fully homomorphic encryption (FHE).


I earned my Ph.D. in Electrical & Computer Engineering from the University of Delaware, advised by Dr. Nektarios Tsoutsos. During my Ph.D., I interned at Meta in 2022, where I worked on private record linkage protocols within the Statistics & Privacy team, and after my internship I continued part-time through the end of that year. I also interned at AWS in 2021, working on role-based access control for Amazon Redshift. Before moving to the US, I worked at Athena Research Center, focusing on privacy-preserving analytics for medical data. I hold a Master's in Computer Systems and a Bachelor's in Computer Science from the Dept. of Informatics at the University of Athens.

./Publications

Journal Articles

  1. SecurED: Secure Multiparty Edit Distance for Genomic Sequences
    J. Gao, Y. Palanikumar, D. Mouris, D. Nguyen, and N. Trieu Proceedings on Privacy Enhancing Technologies (PoPETS), 2025 Paper, ePrint, blogpost, BibTeX
  2. HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables
    C. Gouert*, D. Mouris*, and N.G. Tsoutsos IEEE Trans. on Information Forensics and Security (TIFS), 2025 Paper, ePrint, Code, BibTeX
    * The authors had equal contributions.
  3. Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics
    D. Mouris, C. Patton, H. Davis, P. Sarkar, and N.G. Tsoutsos Proceedings on Privacy Enhancing Technologies (PoPETS), 2025 Paper, ePrint, IRTF Crypto Forum Research Group (CFRG), Code, BibTeX
  4. Juliet: A Configurable Processor for Computing on Encrypted Data
    C. Gouert, D. Mouris, and N.G. Tsoutsos IEEE Trans. on Computers (TC), 2024 Paper, ePrint, Code, BibTeX
  5. PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries
    D. Mouris*, P. Sarkar*, and N.G. Tsoutsos Proceedings on Privacy Enhancing Technologies (PoPETS), 2024 Paper, ePrint, PETS 2024, IRTF Crypto Forum Research Group (CFRG), Code, BibTeX
    * The authors had equal contributions.
  6. Delegated Private Matching for Compute
    D. Mouris, D. Masny, N. Trieu, S. Sengupta, P. Buddhavarapu, and B. Case Proceedings on Privacy Enhancing Technologies (PoPETS), 2024 Paper, ePrint, blogpost, PETS 2024, Code, BibTeX
  7. Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments
    D. Mouris and N.G. Tsoutsos ACM Transactions on Internet Technology (TOIT), 2024 Paper, ePrint, BibTeX
  8. SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
    C. Gouert*, D. Mouris*, and N.G. Tsoutsos Proceedings on Privacy Enhancing Technologies (PoPETS), 2023 Paper, ePrint, PETS 2023, Code, BibTeX
    * The authors had equal contribution and are listed in alphabetical order.
  9. Privacy-Preserving IP Verification
    D. Mouris, C. Gouert, and N.G. Tsoutsos IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2021 Paper, BibTeX
  10. Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs
    D. Mouris and N.G. Tsoutsos IEEE Trans. on Information Forensics and Security (TIFS), 2021 Paper, ePrint, Code, BibTeX
  11. Peak your Frequency: Advanced Search of 3D CAD Files in the Fourier Domain
    D. Mouris*, C. Gouert*, N. Gupta and N.G. Tsoutsos IEEE Access, 2020 Paper, Video, Code, BibTeX
    * The authors had equal contribution.
  12. TERMinator Suite: Benchmarking Privacy-Preserving Architectures
    D. Mouris, N.G. Tsoutsos and M. Maniatakos IEEE Computer Architecture Letters, 2018 Paper, ePrint, Code, BibTeX

Conference Papers

  1. Fission: Distributed Privacy-Preserving Large Language Model Inference
    M. Ugurbil, D. Mouris, M.B. Santos, J. Cabrero-Holgueras, M. de Vega, and S. Sengupta 2025 IEEE Conference on Communications and Network Security (CNS) Paper, ePrint, Code, BibTeX
  2. Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations
    C. Gouert*, M. Ugurbil*, D. Mouris, M. de Vega, and N.G. Tsoutsos 27th Information Security Conference (ISC), 2024 Paper, ePrint, FHE Summit @ EthCC Brussels, blogpost, Code, BibTeX
    * The authors had equal contributions.
  3. Curl: Private LLMs through Wavelet-Encoded Look-Up Tables
    M.B. Santos, D. Mouris, M. Ugurbil, S. Jarecki, J. Reis, S. Sengupta, and M. de Vega Conference on Applied Machine Learning in Information Security (CAMLIS), 2024 Paper, ePrint, CAMLIS 2024, blogpost, Code, BibTeX
  4. MPloC: Privacy-Preserving IP Verification using Logic Locking and Secure Multiparty Computation
    D. Mouris*, C. Gouert*, N.G. Tsoutsos IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS), 2023 Paper, ePrint, Code, BibTeX
    * The authors had equal contributions.
  5. zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge
    D. Mouris, C. Gouert, and N.G. Tsoutsos IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2022 Paper, ePrint, BibTeX
  6. Pythia: Intellectual Property Verification in Zero-Knowledge
    D. Mouris and N.G. Tsoutsos 57th ACM/EDAC/IEEE Design Automation Conference (DAC), 2020 Paper, BibTeX
  7. Covert Data Exfiltration Using Light and Power Channels
    P. Cronin, C. Gouert, D. Mouris, N.G. Tsoutsos, and C. Yang 37th IEEE International Conference on Computer Design (ICCD), 2019 Paper, BibTeX

Open-access Archives

  1. TLShare: Private Authenticated MPC and FHE Inputs Over TLS
    M.B. Santos, D. Mouris, X. Xie, M. de Vega, and A. Lapets ePrint, zkTLS Day (Devconnect 2025), Code, BibTeX

Theses

  1. Private And Verifiable Computation
    D. Mouris Advisor: N.G. Tsoutsos Ph.D. thesis, University of Delaware, 2024 Thesis, BibTeX
  2. Privacy Preserving Medical Data Analytics using Secure Multi Party Computation. An End-To-End Use Case.
    T. Giannopoulos* and D. Mouris* Supervisors: Y. Ioannidis, M. Garofalakis M.Sc. thesis, University of Athens, 2018 Thesis, Code, BibTeX
    * The authors had equal contribution and are listed in alphabetical order.

Internet Drafts

  1. The Mastic Verifiable Distributed Aggregation Function (VDAF)
    H. Davis, D. Mouris, C. Patton, P. Sarkar, N.G. Tsoutsos Internet Research Task Force (IRTF) IRTF Crypto Forum Research Group (CFRG), Code

Magazines

  1. NFTs For 3D Models: Sustaining Ownership In Industry 4.0
    D. Mouris and N.G. Tsoutsos IEEE Consumer Electronics Magazine (CEM), 2022 Paper, BibTeX

./Talks

  1. TLShare: Private Authenticated MPC and FHE Inputs Over TLS
    November 19, 2025
    TLShare talk thumbnail
  2. Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics
    November 9, 2023
    Mastic talk thumbnail
  3. Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations
    July 10, 2024
    Ripple talk thumbnail
  4. Curl: Private LLMs through Wavelet-Encoded Look-Up Tables
    October 24,2024
    Curl talk thumbnail
  5. PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries
    July 18, 2024
    PLASMA talk thumbnail
  6. PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries
    March 31, 2023
    PLASMA CFRG talk thumbnail
  7. Delegated Private Matching for Compute
    July 18, 2024
    Delegated talk thumbnail
  8. SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
    July 13, 2023
    SoK talk thumbnail
  9. Peak your Frequency: Advanced Search of 3D CAD Files in the Fourier Domain
    July 31, 2020
    FFS video thumbnail

./Open-Source

VRF. Verifiable Random Function (VRF) using Ed25519 curve.


EC ElGamal. ElGamal over elliptic curves.


Ring Signatures. A Rust implementation of ring signatures using Ristretto.


RPC Middleware. A middleware that accepts Ethereum JSON-RPC requests and forwards each to a randomly chosen provider from a pool.


Net Config. Configure latency and bandwidth for local experiments.


Curl. Private LLMs through Wavelet-Encoded Look-Up Tables.


Ripple. Accelerating Programmable Bootstraps for FHE with Wavelet Approximations.


Mastic. Private Weighted Heavy-Hitters and Attribute-Based Metrics.


HELM. Navigating Homomorphic Encryption through Gates and Lookup Tables. HELM is a framework for evaluating synthesizable HDL designs in the encrypted domain that is designed for multi-core CPU evaluation. Users can choose between evaluating circuits composed of standard Boolean gates, low-precision LUTs, or high-precision arithmetic operations. In all cases, both sequential and combinational circuits are supported with the exception of arithmetic circuits (which only support combinational logic).


PLASMA. Private, Lightweight Aggregated Statistics against Malicious Adversaries.


Private-ID. Private Matching for Compute, or Private-ID, is a collection of algorithms to match records between two or more parties, while preserving the privacy of these records.


T2: A cross compiler and standardized benchmarks for FHE computation. T2 is an extensible cross compiler and standardized benchmark suite enabling comparisons between fully-homomorphic encryption (FHE) libraries. The T2 repository comprises the T2 DSL and the T2 compiler from T2 DSL to state-of-the-art FHE back-ends. T2 aims to offer a standardized benchmark suite for FHE that encompasses realistic use-cases. Additionally, the T2 compiler offers a great starting point to explore the different backends (e.g., HElib, Lattigo, PALISADE, SEAL, and TFHE) as a single T2 program is transpiled to all supported FHE libraries.


liboqs-java: Java wrapper for liboqs. liboqs is an open source C library for quantum-resistant cryptographic algorithms. See more about liboqs at openquantumsafe.org.


CSAW 2022 Embedded Security Challenge (ESC). ESC'2022 focused on machine learning-based attacks in both edge and cloud computing. Machine learning cloud services are used by millions of users every day, and special care needs to be taken to ensure trained models are protected from malicious users. In ESC'2022, teams investigated a range of attacks (such as model leakage) on the machine learning models hosted on a cloud server using a remote Raspberry Pi virtual device.


CSAW 2021 Embedded Security Challenge (ESC). ESC is an educational, research-oriented tournament aimed at hacking into the hardware of embedded systems. ESC'2021 focused on side channel attacks (SCAs) and fault injection attacks (FIAs), which can be employed to exfiltrate private information from hardware.


CSAW 2020 Embedded Security Challenge (ESC). ESC'2020 focused on the security of Internet of Things (IoT) where contestants were tasked to hack the firmware of a wifi access point running on a RISC-V IoT platform.


Zilch. A Framework for Deploying Transparent Zero Knowledge Proofs


ZeroJava to zMIPS compiler. A compiler to translate ZeroJava code to zMIPS assembly and create zero-knowledge proofs using the Zilch framework.


SMPC Analytics. Source code for "Privacy Preserving Medical Data Analytics using Secure Multi Party Computation. An End-To-End Use Case" A. Giannopoulos, D. Mouris M.Sc. thesis for the National and Kapodistrian University of Athens. See more about liboqs at mhmd.madgik.di.uoa.gr.


TERMinator Suite. Data-oblivious benchmarks for encrypted data computation.


QR-secret-sharing. Create QR codes to secret share a message using Shamir's secret sharing algorithm. Ideal for cryptocurrency wallet recovery keys, passwords, etc. Protect your message by sharing it to secrets. Print the created QR codes and store them separately somewhere safe.


FFS: Fourier Fingerprint Search. Advanced search of 3D CAD files in the Fourier domain.


Auction Website. An e-commerce marketplace template. An online auction and shopping website for buying and selling a wide variety of goods and services worldwide.


Parallel Convolution. An image-filtering project optimized with parallel programming techniques (MPI, MPI & OpenMP, and CUDA).

./Contact

You can reach me via e-mail: jimouris at gmail dot com.


Need some privacy?

PGP Key ID: 51131AD7
PGP Key Fingerprint: 2EEC 8214 2AEC 04E4 5C08 2A24 CCA9 8AEF 5113 1AD7