Rito Maitra

CEO

Delhi, India11 yrs 4 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Experienced in building technology solutions for healthcare.
  • Strong background in computer security and cryptography.
  • Entrepreneurial experience with multiple start-ups.
Stackforce AI infers this person is a Cybersecurity expert with a strong focus on cryptography and software development.

Contact

Skills

Core Skills

Software DevelopmentBusiness DevelopmentComputer SecurityCryptographyManagement

Other Skills

StatisticsLaTeXCJavaC++

About

I try to find the best talent and align them to the hardest problems in health today -- and we build awesome technology together. I previously founded a start-up that made some classic mistakes and shut shop after a couple of pivots. But I learnt more from that than I could have from anything else. In another life, my focus was on computer security and I worked on a variety of projects at different places, mostly in France and the United Kingdom. I'm an aviation enthusiast; gift me an aircraft scale model and I will be your flagbearer; build me a flight simulator at home and I will marry you.

Experience

11 yrs 4 mos
Total Experience
2 yrs 4 mos
Average Tenure
10 yrs
Current Experience

Radical health

Co-Founder & CEO

Jun 2017Present · 8 yrs 11 mos · localhost:5173

  • Software Eats Healthcare
Software DevelopmentBusiness Development

Samcara foundation

Consultant

Mar 2017Jul 2017 · 4 mos · Greater Delhi Area

  • The Samcara Foundation is a non-profit foundation based out of New Delhi, India; looking to invest in the social entrepreneurial ecosystem in India and not just in start-ups.

Dhikchik

Producer

May 2016Present · 10 yrs · Greater Kolkata Area

  • Films. Theatre. Events.
  • We groove to the beats of the people around us.

Berkman klein center for internet & society at harvard university

Open Source Developer

Apr 2016May 2017 · 1 yr 1 mo · Greater Boston

  • Building a formally verified security product that enables time-sensitive encryption - i.e., allows a user to encrypt data in a way that can be decrypted only under a certain set of conditions after a specified period of time.
  • Watch this space for updates to links to the live project soon!
Computer SecurityCryptography

Stealth mode

Co-Founder

Apr 2016May 2017 · 1 yr 1 mo · Gurugram, Haryana, India

  • Heads technology; focus on a smart engine powering things underneath a clean interface. Unraveling the chaos in the food supply chain in India.
Software DevelopmentManagement

Microsoft research - inria joint centre, paris

Research Associate

Mar 2016Sep 2016 · 6 mos · Greater Paris Metropolitan Region

  • Formal security analysis of the Chromium browser, and started building off the Chromium-Star project which aims to build a formally verified core of a modern, usable and dynamic web browser.
Computer Security

Cnrs - centre national de la recherche scientifique

Research And Development Specialist

Oct 2015Mar 2016 · 5 mos · Greater Saint-Etienne Metropolitan Area

  • Reverse engineering and clean, refactored implementation of HyMES - Hybrid McEliece Encryption Scheme.
Cryptography

Weave

Co-Founder

May 2015Oct 2015 · 5 mos · London Area, United Kingdom

  • I co-founded a start-up called Weave, that had a nice product on human body visualisations and virtual trial rooms for fashion e-commerce. We also wanted to work with marginalised weavers of our country. We got a few clients, and garnered interest from investors but really could not crack product-market fit or unit economics, and realised that we had overlooked fundamental flaws in our strategies. In retrospect, we made the classic mistake of running after products without going through customer development.
  • On the upside, I am now a Steve Blank evangelist, and I don't think anything could have taught me more about building a business, technology and life than a failed start-up.
Cryptography

Loughborough university

Research Assistant

May 2015Aug 2015 · 3 mos · Greater Leicester Area

  • Internship on algebraic cryptanalysis of stream ciphers, specifically higher order differentiation over finite fields with applications to generalising the cube attack.

University of cambridge

Researcher

Mar 2015Nov 2015 · 8 mos · Greater Cambridge Area

  • WGB/Computer Laboratory of the University of Cambridge, working on browser security analysis; with a focus on anti-censorship tools.
Computer Security

Guardtime

Software Architect

Jan 2015Aug 2015 · 7 mos · London Area, United Kingdom

  • Created and build client-facing proofs for technical architecture of the company product. Involved in writing security proofs in the post-quantum domain, and computationally proving them through simulations or otherwise.
Cryptography

Iiit-delhi

Research Assistant

Apr 2014Apr 2015 · 1 yr · Greater Delhi Area

  • Research internship, and extended research assistantship in cryptanalysis of hash functions in cryptography, with a specific focus on automated techniques to build collisions efficiently for the functions in the SHA-family.
Cryptography

Education

University of Cambridge

Researcher — Computer and Information Systems Security/Information Assurance

Jan 2015Jan 2015

Indian Institute of Technology, Patna

Bachelor of Technology (B.Tech.) — Computer Science

Stackforce found 100+ more professionals with Software Development & Business Development

Explore similar profiles based on matching skills and experience