All Focus Areas
Driving innovation across five key areas to create a faster, safer, more private, reliable, and measurable Internet.
Filter by: AI DDoS DNS IPFS IPv4 SSH SSL TCP VPN Workload Analysis Analytics Announcements Applications Authentication Automation Bots Caching Censorship Certificates Collaboration Cryptography Data Detection Differential Privacy Distributed systems Distributed Systems Education Encryption Formal Verification Infrastructure Javascript Key Management Machine Learning Malware Measurement Networking Optimization Passwords Performance Post Quantum Privacy Protocols Proxies Quic Randomness Research Resilience Security Similarity Standards Storage Transparency Tunnel Vulnerabilities Web3 Zero Trust
securityvulnerabilities
censorshipmeasurement
privacybots
privacycryptography
securityDDoSquic
performancenetworking
VPNprivacy
measurementTCP
measurementIPv4
cryptographyprivacy
measurementresilience
post-quantumcryptography
measurement
performancemeasurement
dataanalytics
measurementDNS
measurementtransparency
measurementanalytics
securityjavascript
securityautomation
post-quantumcryptography
blog
2025
Message Signatures are now part of our Verified Bots Program, simplifying bot authentication
cryptographybots
encryptionprivacy
securitybots
securitycertificates
securitySSH
cryptographypost-quantum
securityencryption
cryptographyAI
post-quantumzero-trust
Workload Analysisstorage
AIsimilarity
publication
2025
Rhizomes and the Roots of Efficiency — Improving Prio
cryptographyprivacy
publication
2025
Auditing Key Transparency
privacy
publication
2025
RFC 9814: Use of the SLH-DSA Signature Algorithm in the Cryptographic Message Syntax (CMS)
cryptographyprotocols
publication
2025
RFC 9881: Algorithm Identifiers for Module-Lattice-Based Digital Signature Algorithm (ML-DSA)
cryptographyprotocols
publication
2025
Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics
cryptographyprivacy
publication
2025
Valet: Efficient Data Placement on Modern SSDs
storage
distributed-systemsnetworking
publication
2025
Efficient intrusion detection via heterogeneous graph attention networks and parallel provenance analysis
securityAIstorage
publication
2025
Rethinking Web Cache Design for the AI Era
AIstorage
performancecaching
securityDNS
post-quantumcryptography
performanceoptimization
cryptographytransparency
measurementTCP
measurementsecurity
blog
2024
NIST’s first post-quantum standards
post-quantumstandards
securitySSL
blog
2024
Harnessing chaos in Cloudflare offices
cryptographyrandomness
blog
2024
The state of the post-quantum Internet
post-quantumcryptography
privacystandards
publication
2024
X-Wing: The Hybrid KEM You've Been Looking For
cryptographyprotocols
publication
2024
RFC 9578: Privacy Pass Issuance Protocols
cryptographyprotocols
publication
2024
RFC 9576: The Privacy Pass Architecture
privacycryptographyprotocols
Workload Analysisstorage
publication
2024
Private SCT Auditing, Revisted
security
publication
2024
PreSight: A Vision for an Instantaneous Web
distributed-systemsmachine-learning
publication
2024
Topaz: Declarative and Verifiable Authoritative DNS at CDN-Scale
distributed-systemssecuritymeasurementformal-verification
publication
2024
RFC 9577: The Privacy Pass HTTP Authentication Scheme
privacycryptographyprotocols
privacydifferential-privacy
blog
2023
Birthday Week recap: everything we announced — plus an AI-powered opportunity for startups
announcements
blog
2023
Post-quantum cryptography goes GA
post-quantumcryptography
privacyencryption
privacymeasurement
post-quantumcryptography
performanceoptimization
post-quantumcryptography
post-quantumcryptography
securitykey-management
cryptographyprotocols
publication
2023
Verifiable Distributed Aggregation Functions
privacyprotocolscryptography
publication
2023
Security Analysis of Signature Schemes with Key Blinding
cryptographyprotocols
Workload Analysisstorage
publication
2023
RFC 9380: Hashing to Elliptic Curves
cryptographyprotocols
authenticationsecurityprivacy
publication
2023
Portunus: Re-imagining access control in distributed systems
distributed systemscryptography
publication
2023
Portunus: Re-imagining access control in distributed systems using attribute-based encryption
distributed-systemscryptography
publication
2023
Post-Quantum Privacy Pass via Post-Quantum Anonymous Credentials
cryptographyprotocols
cryptographysecurity
publication
2023
Global, Passive Detection of Connection Tampering
measurement
privacysecurityprotocols
privacycryptography
post-quantumcryptography
post-quantumcryptography
securitySSL
blog
2022
Deep dives & how the Internet works
education
post-quantumcryptography
blog
2022
NIST’s pleasant post-quantum surprise
post-quantumstandards
blog
2022
Hertzbleed explained
securityvulnerabilities
web3infrastructure
web3IPFS
blog
2022
Gaining visibility in IPFS systems
measurementweb3
blog
2022
Breaking down broadband nutrition labels
measurementtransparency
blog
2022
Future-proofing SaltStack
securityinfrastructure
performancequic
blog
2022
A Primer on Proxies
performanceproxies
blog
2022
Announcing experimental DDR in 1.1.1.1
privacyDNS
post-quantumcryptography
post-quantumcryptography
cryptographyencryption
post-quantumcryptography
post-quantumcryptography
blog
2022
Making protocols post-quantum
post-quantumprotocols
post-quantumcryptography
post-quantumcryptography
post-quantumcryptography
blog
2022
The quantum solace and spectre
post-quantumcryptography
publication
2022
This is not the padding you are looking for! On the ineffectiveness of QUIC PADDING against website fingerprinting
cryptographysecurity
publication
2022
RFC 9180: Hybrid Public Key Encryption
cryptographyprotocols
publication
2022
RFC 9258: Importing External Pre-Shared Keys (PSKs) for TLS 1.3
securityprivacyprotocols
cryptographysecurityprotocols
publication
2022
Gossamer: Securely Measuring Password-based Logins
authenticationsecurityprivacy
publication
2022
A tale of two models: Formal verification of KEMTLS via Tamarin
cryptography
publication
2022
Standardizing MPC for Privacy Preserving Measurement
privacycryptography
publication
2022
RFC 9257: Guidance for External Pre-Shared Key (PSK) Usage in TLS
securityprivacyprotocols
publication
2022
RFC 9230: Oblivious DNS over HTTPS
securityprivacyprotocols
authenticationsecurityprivacy
publication
2022
RFC 9149: TLS Ticket Requests
securityprotocols
publication
2022
Toppling Top Lists: Evaluating the Accuracy of Popular Website Lists
measurement
publication
2022
The Decoupling Principle: A Practical Privacy Framework
privacysecurity
publication
2022
Respect the ORIGIN! A Best-case Evaluation of Connection Coalescing
privacymeasurement
publication
2022
RFC 9261: Exported Authenticators in TLS
securityprotocols
publication
2022
RFC 9292: Binary Representation of HTTP Messages
protocolsapplications
publication
2022
A Fast and Simple Partially Oblivious PRF, with Applications
cryptography
publication
2022
Let The Right One In: Attestation as a Usable CAPTCHA Alternative
privacy
blog
2021
Sizing Up Post-Quantum Signatures
post-quantumcryptography
blog
2021
Tunnel: Cloudflare’s Newest Homeowner
infrastructuretunnel
measurementperformance
blog
2021
Multi-User IP Address Detection
measurementdetection
infrastructurekey-management
privacysecurity
networkinginfrastructure
blog
2021
Research Directions in Password Security
securitypasswords
blog
2021
Cloudflare and the IETF
standardscollaboration
blog
2021
Pairings in CIRCL
cryptography
securitystandards
performanceoptimization
blog
2021
Introducing SSL/TLS Recommender
securitySSL
securityresearch
privacyencryption
blog
2021
Privacy Pass v3: the new privacy bits
privacy
blog
2021
Announcing Cloudflare Research Hub
research
blog
2021
Internship Experience: Research Engineer
research
blog
2021
Cloudflare invites visiting researchers
research
blog
2021
Cloudflare Research: Two Years In
research
web3infrastructure
cryptography
publication
2021
Implementing and measuring KEMTLS
cryptographymeasurement
publication
2021
Post-quantum TLS without handshake signatures
cryptography
publication
2021
The Ties that un-Bind: Decoupling IP from web services and sockets for robust addressing agility at CDN-scale
securitymeasurement
publication
2021
ZKAttest: Ring and Group Signatures for Existing ECDSA Keys
cryptography
distributed-systems
privacymeasurement
publication
2020
RFC 8937: Randomness Improvements for Security Protocols
cryptographysecurityprotocols
cryptography
publication
2020
RFC 8922: A Survey of the Interaction between Security Protocols and Transport Services
securityprotocols
publication
2019
RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins
measurementsecurity
publication
2019
Strong post-compromise secure proxy re-encryption
cryptography
publication
2019
Measuring TLS key exchange with post-quantum KEM
cryptographysecuritymeasurement
publication
2019
Protocols for checking compromised credentials
privacycryptography
publication
2019
RFC 8586: Loop Detection in Content Delivery Networks (CDNs)
measurementprotocols
security
publication
2018
Is the web ready for OSCP must-staple?
measurementsecurity
publication
2018
Privacy Pass: Bypassing Internet Challenges Anonymously
privacyauthenticationcryptography
publication
2018
nQUIC: Noise-based QUIC packet protection
securitycryptography
publication
2018
403 Forbidden: A Global View of CDN Geoblocking
measurement
publication
2018
Geo Key Manager
cryptographyprotocols
cryptographymeasurementsecurity
publication
2017
Understanding the mirai botnet
malwaremeasurement
publication
2017
The Security Impact of HTTPS Interception
securitymeasurement
publication
2016
Attacking White-Box AES Constructions
cryptography
publication
2015
An analysis of TLS handshake proxying
cryptographyauthentication