
Khandaker Md. Al-Amin
Cybersecurity Engineer
I am a Cybersecurity Engineer at ITK Engineering GmbH, focusing on cryptographic solutions and secure system design. Previously, I worked as a Research Engineer at EAGLYS Inc., where I developed privacy-preserving machine learning solutions using homomorphic encryption and secure multiparty computation.
I hold a Ph.D. in Cryptography from Okayama University, where I specialized in elliptic curve pairing-based cryptography and its applications for IoT security. My research was supported by the Japan Government Scholarship (MEXT).
Research Interests
- Cybersecurity & Threat Analysis
- Cryptographic Libraries & Implementation
- Embedded Systems Security
- Application of Homomorphic-Encryption
- Privacy-Preserving Machine Learning
- Secure Multi-Party Computation
Education
- Ph.D. in Public Key Cryptography Okayama University, Japan 2019
- M.Sc. (Dropped) in Computer Science and Engineering Jahangirnagar University, Bangladesh 2015
- B.Sc. in Computer Science and Engineering Jahangirnagar University, Bangladesh 2012
Experience
Cybersecurity Engineer
Responsibilities include:
- Performed in-depth Threat Analysis & Risk Assessment, integrating cryptographic measures to comply with industry security standards (e.g., ISO/SAE 21434).
- Developed and integrated cryptographic libraries (Mbed-TLS) across large-scale systems for secure data processing in diverse environments.
- Prepared secure coding guidelines (aligned with SEI CERT) and performed code reviews to ensure robust security for embedded systems.
Research Engineer
Responsibilities include:
- Requirement analysis, design and development of the secure computing project GateDB
- Converting business requirements and theoretic algorithms into PoC
- Performance and security improvement of existing products
- Technology used: Python, Rust, C++, gRPC, Docker, SQL, PostgreSQL, MySQL, AWS, Azure, Tensorflow
Featured Projects

DataArmorGate DB
A database proxy application that enables users to perform SQL queries on encrypted data without storing the key to the database server.
Selected Publications

An Improvement of Scalar Multiplication by Skew Frobenius Map with Multi-Scalar Multiplication for KSS Curve
Scalar multiplication over higher degree rational point groups is often regarded as the bottleneck for faster pairing based cryptography. This paper presents a skew Frobenius mapping technique in the sub-field isomorphic sextic twisted curve of KSS pairing friendly curve.
Invited Talks

Towards the Implementation of Efficient and Distributable Pairing-based Crypto Library
Invited talk on Pairing-Based Cryptography and Open-Source Library.
Learn MoreBlog
Welcome to my blog where I share insights on cryptography, secure computing, and privacy-preserving technologies.
Visit Blog