|
Presentations
2024
2023
2022
-
Post-Quantum Cryptography: Detours, delays, and disasters,
presentaion with Daniel J. Bernstein
at FireShonks
slides
video
-
Post-quantum cryptography,
lecture in Applied Cryptography course at TU/e.
slides
-
Update Post-Quanten-Kryptographie für Langzeitsicherheit
,
invited talk
at Handelsblatt Jahrestagung
Cybersecurity 2022
slides
-
S-unit attacks,
invited talk at KpqC workshop in Korea
slides
video
- Disorientation faults in CSIDH,
invited talk at
at ACCESS
seminar
slides
- Introduction to post-quantum cryptography,
invited presentaion with Daniel J. Bernstein
at The First USF-QSancus Workshop on Post-Quantum Cryptography
slides
- Post-Quantum Cryptography: Detours, delays, and disasters
,
invited presentaion with Daniel J. Bernstein
at HITCON 2022
slides
- S-unit attacks,
invited talk
at ANTS-XV
slides
video (link goes to YouTube)
- Post-quantum cryptography,
invited talk at editor meeting Nature communication –
Quantum and optical technology community
slides
- How to fit an elephant into a Smart car – PQC for small devices
,
invited talk at ESA Workshop on "Secure Communications for Space Missions
in the Post-Quantum Era"
at
European Space Research and Technology Centre (ESTEC)
slides
- Elliptic curves for future-proof cryptography,
invited talk at
at
Effective Methods in Algebraic Geometry
slides
- Code-based cryptography for secure communication
,
nvited presentaion
at Algebraic Methods in Coding Theory and Communication
slides
- Hash-based signatures II – Stateful and stateless signatures,
lecture at National Taiwan University in course ``Post-quantum cryptography''
slides
- The transition to post-quantum cryptography
,
invited presentaion with Daniel J. Bernstein
at International Distinguished Lecture Series at EECS
at National Taiwan University.
slides
- EU Activities in Post-Quantum Cryptography,
invited talk at
at Post-quantum cryptography forum
slides
- Hash-based Signature, the Round-3 Candidate: SPHINCS+,
nvited talk at
at Post-quantum cryptography forum
slides
2021
- Ask me anything,
me being interviewed by Lejla Batina
at CHES 2021
video on YouTube
- Cryptology,
not srictly speaking a talk but many videos on YouTube channel for
course Cryptology
YouTube Channel
- Transitioning to post-quantum: How PQC affects protocols and what we can do today?,
invited talk at ICMC 2021
slides
- Timing attacks,
presentaion with Daniel J. Bernstein
at IkV Technologies
slides
- Introduction to SIDH and CSIDH ,
invited lecture at Isogeny-based cryptography school organized online by University of Bristol.
For lecture notes, exercises, and videos see here
- Classic McEliece: conservative code-based cryptography
,
presentation at NIST's Third PQC Standardization Conference
slides
video
- Hash-based signatures II – Stateful and stateless signatures,
lecture at National Taiwan University in course ``Post-quantum cryptography''
slides
- Post-quantum cryptography,
not srictly speaking a talk but many videos on YouTube channel for
course Selected areas in cryptology
YouTube Channel
2020
- Intro to crypto,
not srictly speaking a talk but many videos on YouTube channel for
course Introduction to cryptology
YouTube Channel
- Elliptic-curve cryptography,
invited talk at DESDA symposium
Alice in Cryptoland
slides
- Communications protocol implications of using code-based cryptography,
presentation at NCCoE
Virtual Workshop on Considerations in Migrating to Post-Quantum Cryptographic Algorithms
slides
short video
long video
- Post-quantum cryptography,
keynote at HITCON 2020 given jointly
with Daniel J. Bernstein
slides
- McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers,
contributed talk at Usenix Security 2020
gien jointly with Daniel J. Bernstein
slides
Page at Usenix, incl. video
- Isogeny-Based Cryptography I - III,
slides for three invited lecture at PQCRYPTO
Mini-School
slides
Videos: part I, part II, part III
- Hash-based Signatures,
invited lecture at PQCRYPTO Mini-School
slides
code snippets from the slides
video (mp4, can download
- Exploring the parameter space in lattice attacks,
invited talk at online workshop on the Mathematics of Post-Quantum crypto (scroll to the bottom for the right schedule)
given jointly with
Daniel J. Bernstein
slides
- Overview of Code-Based Crypto Assumptions,
invited talk at Quantum Cryptanalysis of Post-Quantum Cryptography
slides
video
- Challenges in evaluating costs of known lattice attacks,
invited talk at Lattices: Geometry, Algorithms and Hardnessy
given jointly with
Daniel J. Bernstein
slides
video
- Quantum computers – the future attack that breaks today's messages,
invited talk at EU Telecom Security - 30th Article 13a Group Meeting
slides
- Crypto horror stories,
invited talk at Talking Heads event at Sicherheitnetzwerk München e.V given jointly with
Daniel J. Bernstein
slides
- Quantencomputer – der Angriff aus der
Zukunft auf unsere Daten von heute,
keynote at OOP 2020
slides
2019
- High-assurance crypto software,
talk at 36C3
given jointly with
Daniel J. Bernstein
slides
video
- Kleptography, Dual EC,
lecture in Applied Cryptography course at TU/e.
Slides
-
Update on post-quantum cryptography
presentation at ISO TC 68 meeting in Sydney.
slides
-
Post-quantum cryptography: schemes and standards
invited presentation at
Inside Quantum Technology EUROPE
The Future of Quantum Computing, Quantum Communication and Quantum Sensors.
slides
-
Quantum circuits for the CSIDH:
optimizing quantum evaluation of
isogenies
presentation at
Dagstuhl seminar on Quantum Cryptanalysis
slides
-
McTiny: McEliece for Tiny Network Servers
invited presentation at
Munich Workshop on Coding and Cryptography (MWCC) 2019
given jointly with
Daniel J. Bernstein
slides
-
Code-based crypto for small servers,
invited presentation at SIAM Conference on Applied Algebraic Geometry
slides
-
Code-based cryptography,
lecture given at Executive School on Post-Quantum Cryptography 2019.
slides
-
Introduction to post-quantum cryptography I,
lecture given at Executive School on Post-Quantum Cryptography 2019.
slides
-
Discrete-log attacks and factorization, Part 2,
lecture given at Summer School on Cryptography Crypto-CO.
slides in single page format
slides in two-page sliding format
-
Discrete-log attacks and factorization, Part I,
lecture given at Summer School on Cryptography Crypto-CO.
slides in single page format
slides in two-page sliding format
-
Post-quantum cryptography,
keybote given together with Daniel J. Bernstein
at Summer School on Cryptography Crypto-CO.
slides
-
Progress in Post-Quantum Cryptography,
presentation at ICMC 2019
slides
-
Backdoors always backfire,
invited seminar talk at Cambridge University Ethics in Mathematics Society (CUEiMS) series
slides
-
Code-Based Cryptography,
invited talk at 12th International ITG conference on Systems, Communications and Coding
slides
-
Introduction to post-quantum cryptography,
talk at AIM Quantum algorithms for analysis of public-key crypto workshop
slides
-
Quantum computers the future attack that breaks today's messages,
invited talk at Cybersecurity in de zorg
slides
2018
-
The year in post-quantum crypto,
talk given jointly with Daniel J. Bernstein
at 35C3
slides
video
-
Quantum computers:
the future attack that breaks today’s messages,
talk given jointly with Daniel J. Bernstein
at The Optus Macquarie University Cyber Security Hub
slides
-
Code-Based Cryptography,
tutorial at
Australian Summer School on Embedded Cryptography
slides
-
Post-Quanten-Kryptographie für Langzeitsicherheit,
invited talk at
8. Handelsblatt Jahrestagung Cybersecurity
slides
-
The standardization ecosystem -- A fertile ground for bad ideas and
back doors,
invited talk at
SSR 2018: Security Standardisation Research
slides
-
Code-Based Cryptography,
tutorial at
Korea Cryptography Forum’s annual symposium
slides
- Quantum computers -- the future attack that breaks today’s messages,
invited presentation at
Korea Cryptography Forum’s annual symposium
slides
-
Results of PQCRYPTO (ICT-645622),
invited talk at
1st FutureTPM Workshop on Quantum-Resistant Crypto Algorithms
slides
- Post-quantum crypto – Summary and recommendations,
invited lecture at
Network and Information Security (NIS'18) Summer School
slides
-
Cryptology, cryptography, cryptanalysis. Definitions, meanings, requirements, and current challenges,
invited lecture at
Network and Information Security (NIS'18) Summer School
slides
-
Cryptanalysis of NISTPQC submissions,
Invited talk given jointly with Daniel J. Bernstein and Lorenz Panny
at
Workshop on Attacks in Cryptography
slides
-
NTRU Prime,
Invited talk given jointly with Daniel J. Bernstein at
PQCRYPTO Mini-School and Workshop.
slides
-
Code-Based Public Key Cryptosystems,
course of two lectures given at
PQCRYPTO Mini-School and Workshop.
slides
-
NTRU Prime -- reducing attack surface at low cost,
invited talk at
Cryptography and Algorithmic Number Theory (CAEN).
slides
-
Cryptanalysis using GPUs,
Talk given jointly with Daniel J. Bernstein at
Fourth workshop in NIRICT GPGPU Reconnaissance workshop series.
slides
- Progress in Post-Quantum Cryptography,
presentation at
International Cryptographic Module Conference.
Slides
- Progress in Post-Quantum Cryptography,
presentation at
13th International View of the State-of-the-Art of Cryptography and Security and its Use in Practice.
Slides
- Classic McEliece: conservative code-based cryptography,
presentation at NIST's First PQC Standardization Conference.
Slides
- Post-Quantum Cryptography,
invited presentation at ASML Tech Talks.
Slides
- Post-Quantum Cryptography,
invited presentation at
SURF Security- en Privacyconferentie
Slides
- NTRU Prime,
presentatin at
Combined event on Post-Quantum Cryptography
Slides
2017
- LatticeHacks,
Talk given jointly with Daniel J. Bernstein and Nadia Heninger at
34C3
Slides
See also our related webpage http://latticehacks.cr.yp.to/ and the Youtube
and CCC media
video.
- Kleptography, Dual EC,
lecture in Applied Cryptography
course at TU/e.
Slides
- Rounded Gaussians – Fast and Secure Constant-Time Sampling for Lattice-Based Crypto,
quick announcment at
CHES 2017 rump session
Slides
- Post-Quantum Cryptography – Code-Based Cryptography,
lecture at
ASCrypto 2017
Slides
- Post-Quantum Cryptographyy,
lecture at
ASCrypto 2017
Slides
- Public-key cryptography Part I – Elliptic-curve crypto,
lecture at
SAC Summer School (S3)
Slides
Part II – factorization was given by
Daniel J. Bernstein.
- Practical Post-Quantum Cryptography,
invited presentation at
SIAM conference on Group on Algebraic Geometry
Slides
- Post-quantum cryptography,
lecture given jointly with
Daniel J. Bernstein and
Peter Schwabe.
Slides
- Introduction to post-quantum cryptography I and II,
lecture at
Executive School on Post-Quantum Cryptography 2017
Slides part I and II
- Introduction to post-quantum cryptography,
lecture at
Summer School on Post-Quantum Cryptography 2017
Slides
Video
- Preparing Today for Key Management in a Post-Quantum Computing World,
presentation given jointly with Tony Cox at
ICMC17
Slides
- Quantum cryptanalysis – the catastrophe we know and don't know,
presentation at cataCrypt
Slides
- Post-Quantum Cryptography,
invited presentation at dot Security
Slides
event page with video
- (In-)secure messaging with SCimp,
presentation at
CryptoAction Symposium 2017
on work with Sebastian Verschoor
(actually his master thesis!).
Slides
- NTRU Prime,
presentation at Oberwolfach Workshop "Cryptography"
Slides
2016
- Kleptography, Dual EC,
lecture in Applied Cryptography course at TU/e.
Slides
- Cryptanalysis Course, Part V -- Factorization,
invited lecture at
IACR-SEAMS School "Cryptography: Foundations and New Directions"
Slides
- Cryptanalysis Course, Part IV -- Factorization,
invited lecture at
IACR-SEAMS School "Cryptography: Foundations and New Directions"
Slides
- Cryptanalysis Course, Part III -- DLPs in intervals,
invited lecture at
IACR-SEAMS School "Cryptography: Foundations and New Directions"
Slides
- Cryptanalysis Course, Part II -- DLP,
invited lecture at
IACR-SEAMS School "Cryptography: Foundations and New Directions"
Slides
- Cryptanalysis Course, Part I -- ECC,
invited lecture at
IACR-SEAMS School "Cryptography: Foundations and New Directions"
Slides
- Long-term security for cars,
keynote presentation given jointly with Daniel J. Bernstein at
escar 2016
Slides
-
Post-quantum cryptography,
invited presentation given jointly with
Daniel J. Bernstein and
Peter Schwabe
Slides
- NTRU Prime,
invited presentation at
Mathematical Structures for Cryptography
Slides
- Post-quantum crypto and side-channel attacks --
getting ready for the real world,
invited presentation at
ArcticCrypt
Slides
- PQCRYPTO overview,
presentation at
1-day workshop PQCRYPTO
Slides
- Public-key cryptography in Tor and pluggable transports,
invited presentation at
Summer school
on real-world crypto and privacy
Slides
- Standardization of post-quantum cryptography,
invited presentation at
A Workshop About Cryptographic Standards (AWACS)
Slides
video
- You thought your communication was secure? Quantum computers are coming!,
Invited talk given jointly with Daniel J. Bernstein at the
Science and Cocktails
Slides
video
- Post-Quantum Cryptography,
invited presentation at
BeNeLuxMC 2016 Amsterdam
Slides
- The crypto-apocalypse: cybersecurity in a post-quantum world,
presentation at
Studium Generale
Slides
- Code-based cryptography,
invited presentation at
Post-Quantum Cryptography Winter School
Slides
video
- Post-quantum cryptography,
invited presentation at
8th Winter School on Quantum Cybersecurity
Slides
2015
- PQCHacks: a gentle introduction to post-quantum cryptography.
Talk given jointly with Daniel J. Bernstein
at 32C3
Slides
video
- Failures in NIST's ECC standards,
Talk given jointly with Daniel J. Bernstein
at the SSR 2015 rump session
Slides
- How to manipulate curve standards: a white paper for the black hat,
Talk given jointly with Daniel J. Bernstein
at SSR 2015: Security Standardisation Research
Slides
- Kryptographie für Langzeitsicherheit (in German),
invited presentation at Bundesdruckerei Berlin
Slides
- Post-quantum cryptography,
invited presentation at
Security, Privacy, and
Applied Cryptography Engineering (SPACE)
Slides
- Post-quantum cryptography,
invited presentation at
Academy Contact Forum 'Coding Theory and Cryptography VI'
Slides
- Initial recommendations of long-term secure post-quantum systems,
presentation at
Dagstuhl Workshop on Quantum Cryptanalysis
Slides
- Twisted Hessian Curves,
invited presentation at
SIAM Conference on Applied Algebraic Geometry 2015
Slides
- EdDSA for more curves,
Invited talk given jointly with Daniel J. Bernstein
at the CFRG during IETF 93
Slides
- Batch NFS,
invited presentation at
Summer school on real-world crypto and privacy
Slides
- Elliptic curves,
invited presentation at
Summer school on real-world crypto and privacy
Slides
- PQCRYPTO - Post-Quantum Cryptography for Long-term Security,
invited presentation at
Intel Workshop: International View of the State of the Art in Cryptography and Security and its Use in Practice (VII)
Slides
- TLS alternatives – faster and more secure,
presentation at
CryptoAction meeting in Sofia
Slides
- Coppersmith in the wild,
invited presentation at
Mathematics of Lattices and Cybersecurity
Slides
- PQCRYPTO project in the EU,
presentation at
NIST Workshop on Cybersecurity in a Post-Quantum World
Slides
- Batch NFS,
Talk given jointly with Daniel J. Bernstein
at the Crypto Working Group
Slides
- Sneaking key escrow in through the back door,
invited presentation at
MAPPING WP5 Round Table on Privacy, Personality and Business Models
Slides
- NaCl: a new crypto library,
Talk given jointly with Daniel J. Bernstein
at ShmooCon 2015
Slides
2014
- A gentle introduction to elliptic-curve cryptography,
Talk given jointly with Daniel J. Bernstein
at
31C3
Slides video>
- Physically unclonable functions found in standard
PC components (PUFFIN),
invited presentation at
International View of the State-of-the-Art of Cryptography and Security
and its Use in Practice (VI)
Slides
- The security impact of a new cryptographic library,
Invited talk given jointly with Daniel J. Bernstein
at the KPN Guest Hacker Program
Slides
- Quantum algorithms for subset sum problem,
invited presentation at
Post-Quantum Cryptography: Recent Results and Trends
Slides
- Dual EC and what it taught us about
vulnerabilities of the standardization ecosystem,
presentation at
Dagstuhl Perspectives Workshop "Privacy and Security in an Age of Surveillance"
Slides
- EM key extraction from constant-time software on fast ARMs,
Talk given jointly with Daniel J. Bernstein
at
CHES 2014 rump session
Slides
- Batch NFS,
Talk given jointly with Daniel J. Bernstein
at
SAC 2014
Slides
- On the Practical Exploitability of Dual EC DRBG in TLS Implementations,
presentation at
Oberwolfach Workshop "Cryptography"
Slides
- Elliptic-curve cryptography,
invted presentation at
CFRG during IETF 90
Slides
- Pairings, index calculus, and hyperelliptic curves,
invited presentation at
The 9th annual AMSI Winter School
Slides
- Curves with endomorphisms and DLPs in intervals,
invited presentation at
The 9th annual AMSI Winter School
Slides
- Signatures and DLP,
invited presentation at
The 9th annual AMSI Winter School
Slides
- Public-key cryptography and the Discrete-Logarithm Problem,
invited presentation at
The 9th annual AMSI Winter School
Slides
- Crypto news and views,
Invited alk given jointly with Daniel J. Bernstein and Nadia Heninger at
NCSC ONE
Slides
- Randomness generation,
Inivited talk given jointly with Daniel J. Bernstein
at International State of the Art Cryptography Workshop
Slides
- Verifiably random secure curves,
Talk given jointly with Daniel J. Bernstein
at the Eurocrypt 2014 Rump session
Slides
- On the Practical Exploitability of Dual EC DRBG in TLS
Implementations,
Inivited talk at Theoretical and
Practical Aspects of the Discrete Logarithm Problem.
Slides
- SafeCurves: choosing safe curves for elliptic-curve cryptography,
Talk given jointly with Daniel J. Bernstein
at the ShmooCon 2014.
Slides
- A "Challenge in Finesse",
Talk given jointly with Matthew D. Green at the rump session of the Real World Cryptography Workshop.
Slides: censored.
- Randomness,
Talk given jointly with Daniel J. Bernstein
at the Dagstuhl
Seminar "Symmetric Cryptography".
Slides
Slides of recent (well..) talks
The talks come in chronological order.
- Fast arithmetic on hyperelliptic Koblitz curves ,
invited talk at the MAGiC conference in Urbana/Champaign
Abstract
M1.ps M2.ps M3.ps Slides (3 files, middle one containing picture of Diffie-Hellman key-exchange)
- Efficient arithmetic on (hyper-)elliptic curves over finite fields,
talk at UCL Crypto Group - Seminar Series
Slides
- Efficient arithmetic on (hyper-)elliptic curves over finite fields,
invited talk at 2003 International Symposium on Next Generation Cryptography and Related Mathematics, Japan
Slides
- Efficient arithmetic on (hyper-)elliptic curves over finite fields,
invited talk at Computational Aspects of Algebraic Curves, and Cryptography, Gainesville
Slides
- Efficient arithmetic on (hyper-)elliptic curves over finite fields,
talk at Cryptography Seminar in Rennes
Slides
- Improved Algorithms for Efficient Arithmetic on Elliptic Curve using
Fast Endomorphisms,
talk given by Francesco Sica at Eurocrypt 2003
Slides in pdf
- Efficient arithmetic on (hyper-) elliptic curves over finite fields,
invited talk at ECC 2003
Slides
- Cryptographic Applications of Trace Zero Varieties,
invited talk at Mathematics of Discrete Logarithms, Essen
Slides
- Cryptographic Applications of Trace Zero Varieties,
talk at Dagsthul Seminar --
Algorithms and Number Theory
Slides
- Mathematical Countermeasures Against Side-Channel Attacks on
ECC/HECC,
talk at YACC 2004 Slides
- Introduction to Side-Channel Attacks on elliptic and
hyperelliptic curves,
talk at ANTS VI 2004 Slides
- Montgomery Addition for Genus Two Curves,
talk at ANTS VI 2004 Slides
- Mathematical Countermeasures against Side-Channel Attacks on
Elliptic and Hyperelliptic Curves,
invited talk at WARTACRYPT
'04 Slides
- Pseudorandom Number Generators Based on Elliptic Curves,
invited talk at
Number Theoretic Algorithms and Related Topics Slides
- Hyperelliptic curves in cryptography,
talk at the
"Seminar on zeta functions'' at the Technical University Tokyo
Slides
- Efficient arithmetic on (hyper-)elliptic curves over finite fields,
talk at the "COSIC Seminar" KU Leuven
Slides
- Curve Cryptography - suitable primitives for embedded device
,
invited talk at Cryptologie et Algorithmique En Normandie (CAEN'05) Slides
- Pairings on ordinary hyperelliptic curves,
invited talk at Pairings in Cryptography Slides
- Arithmetic on Binary Genus 2 Curves Suitable for Small Devices,
talk at Workshop on RFID and Lightweight Crypto Slides
- Arithmetic of hyperelliptic curves over finite fields,
talk at
Discrete Mathematics Seminar, University of Calgary Slides
- Efficient computation of pairings on non-supersingular
hyperelliptic curves,
talk at Number Theory Inspired by Cryptography, Banff Slides
- Efficient computation of pairings on non-supersingular hyperelliptic curves,
invited talk at Algebraic Methods in Cryptography, Bochum Slides
- Cryptographic Applications of Trace Zero Varieties,
seminar talk at Cryptology Research Group at the Indian Statistical Institute, Kolkata Slides
- Pairings in Cryptography,
tutorial at ASIACRYPT 2005
Slides
- Distribution of Some Sequences of Points on Elliptic Curves,
invited talk at
AMS Sectional Meeting Program by Special Session, Special Session on Number Theory
Slides
- Arithmetic of hyperelliptic curves over finite fields, part of lecture at
Summer School on "Computational Number Theory and Applications to Cryptography"
Slides
- Pairing Based Cryptography, part of lecture at
Summer School on "Computational Number Theory and Applications to Cryptography"
Slides
- Analysis of pseudo-random number generators based on elliptic
curves,
talk at
31st Australasian Conference on Combinatorial Mathematics & Combinatorial Computing(ACCMCC)
Slides
- Fast bilinear maps from the Tate-Lichtenbaum pairing on
hyperelliptic curves,
talk at
ANTS VII, Berlin
Slides
- Efficient arithmetic on (hyper-)elliptic curves over finite fields,
invited talk at
2006 Workshop on Cryptography and Related Mathematics
Slides
- Hyperelliptic Curves,
talk at
Information Security Summer School (ISSS) 2006. Taiwan.
Slides
- Efficient arithmetic on hyperelliptic curves over finite fields,
talk at
Information Security Summer School (ISSS) 2006. Taiwan.
Slides
- Pairing Based Cryptography,
talk at
Information Security Summer School (ISSS) 2006. Taiwan.
Slides
- Public Key Cryptography - Performance Comparison and Benchmarking,
keynote at
Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBSeg)
Slides
- Index Calculus in Finite Fields & Hyperelliptic Curves,
tutorial at
WCAP 2006 - III Workshop on Cryptographic Algorithms and Protocols
Slides
- Efficient arithmetic on hyperelliptic curves over finite fields
& Pairings,
tutorial at
WCAP 2006 - III Workshop on Cryptographic Algorithms and Protocols
Slides
- Elliptic vs. hyperelliptic, part 2,
invited talk at ECC 2006
Slides and Slides in ps.gz
Part 1 of the fight was excecuted by Daniel J. Bernstein, his slides can be found here.
- Open Problems in Pairings,
invited talk at
Number Theory and Cryptography - Open Problems
Slides
- Tanja Lange,
on the occasion of presentating the new
employees of the faculty for mathematics and computer science of the Technische Universiteit
Eindhoven Slides
(pdf)
- Cryptographic applications of curves over finite fields,
invited talk at
General Mathematical Colloquium Utrecht Slides
- Unified addition formulae for elliptic curves,
invited talk
at
AMS Special Session on Mathematical Aspects of Cryptography, 2007
Spring AMS Eastern Section Meeting Slides
- Elliptic vs. hyperelliptic, part 2,
talk at EIDMA Seminar Combinatorial
Theory Slides
- Mathematical Background of Pairings,
talk at ECRYPT PhD Summer School on
Emerging Topics in Cryptographic Design and Cryptanalysis Slides
- Fast scalar multiplication on elliptic curves,
invited talk
at Conference on
Algorithmic Number Theory Slides
- Elliptic vs. hyperelliptic, part 3 - Elliptic Strikes
Back,
talk at
Eurocrypt 07 Rump Session Slides
- Side-channel attacks and countermeasures for curve based
cryptography,
invited talk at Quo vadis
cryptology ? - Threat of Side-Channel Attacks Slides in ps Slides in pdf
- Fast scalar multiplication on elliptic curves,
talk
at 8th International Conference
on Finite Fields and Applications Slides
- Elliptic vs. Hyperelliptic, part 3: Elliptic strikes
back,
invited presentation at 11th Workshop
on Elliptic Curve Cryptography 2007 Slides for my half Slides for Dan
Bernstein's half
- The EFD thing,
presentation
at the rump session of CHES 2007 given jointly with Dan
Bernstein Slides
- Edwards Curves for Cyptography,
presentation at
EIDMA/DIAMANT Cryptography Working Group
Slides
- Edwards coordinates for elliptic curves, part 1,
invited presentation at
Explicit Methods in Number Theory
In honour of Henri Cohen
Slides
Part 2 was given by Dan
Bernstein
Dan's slides
- Edwards Coordinates for Elliptic Curves, part 1,
invited presentation at
SAGE Days 6: Cryptology, Number theory, and Arithmetic Geometry
Slides
Part 2 was given by Dan
Bernstein
Dan's slides
- Edwards Curves for Cryptography,
invited key-note presentation at
Kolloquium über Kombinatorik
Slides
- Faster Addition and Doubling on Elliptic Curves,
joint presentation with Dan Bernstein at
ASIACRYPT 2007
Slides
- Edwards Coordinates,
invited key-note presentation at
Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC-17)
Slides
- The power of mathematics to protect data and to break data protection,
presentation at
Research day at TU/e
Slides
- Revisiting pairing based group key exchange,
presentation at
Financial Cryptography and Data Security 2008
Slides
- Binary Edwards Curves,
presentation at the
Eurocrypt 2008 Rump Session
Slides
- Faster arithmetic on elliptic curves -- blessing to ECC, harm to RSA,
presentation at
EIPSI Grand Opening
Slides
- Binary Edwards Curves,
invited presentation at
Seminario Matematico, Universidad Autonoma Madrid
Slides
- Scalar Multiplication and Weierstrass Curves,
presentation at 3rd
ECRYPT PhD SUMMER SCHOOL Advanced Topics in Cryptography Slides
- Shapes of Elliptic Curves,
rump-session presentation at
ANTS 2008
Slides
See also the
zoo pictures.
- Twisted Edwards Curves,
talk given by
Daniel J. Bernstein on our joint paper at
Africacrypt 2008
Slides
- Binary Edwards Curves,
invited presentation at
Séminaire de Cryptographie de Rennes
Slides
- Binary Edwards Curves,
presentation at
CHES 2008
Slides
- ECM on Graphics Cards,
presentation at
CADO workshop on integer factorization
Slides
- Post-Quantum Cryptography,
invited presentation at
INDOCRYPT 2008
Slides in ps
Slides in pdf
- Elliptic Curve Cryptography,
invited presentation at
Malaviya National Institute of Technology, Jaipur, India (Department of Computer Engineering)
Slides
- Models of Elliptic Curves,
joint invited presentation with Dan Bernstein at
Curves, Coding Theory, And Cryptography, ESF Exploratory Workshop - PESC
Slides
- Pairings on Edwards Curves,
invited presentation at
Arithmétique, géométrie, cryptographie et théorie des codes
Slides
Preprint with more details
- Pairings on Edwards curves,
invited presentation at
Fields Cryptography Retrospective Meeting
Slides
- Pairings on Edwards Curves,
presentation at
Dagstuhl Seminar Algorithms and Number Theory
Slides
- Post-Quantum Cryptography,
presentation at
Dagstuhl Seminar 09311Classical and Quantum Information Assurance Foundations and Practice
Slides
- Efficient Implementation of Pairings,
invited key note presentation at
Pairing 2009
Slides
- Applied cryptanalysis - or - how to win an iPhone,
rump session presentation at
ECC
Slides
- ECM using Edwards curves,
invited presentation at
Workshop on Factoring Large Integers
Slides
- ECM using Edwards curves,
invited presentation at
Workshop on Discovery and Experimentation in Number Theory
held at Fields Institute, Toronto and Simon Fraser University, Burnaby.
Slides
See also here for
audio recordings.
- What is a use case for quantum key exchange? Part I,
invited presentation at
Workshop on quantum information
Slides
PartII was given by Daniel J. Bernstein,
see his talks page.
- Coppersmith's factorization factory,
invited presentation at
General Colloquium Leiden
Slides
- Post-Quantum Cryptography,
invited presentation at
ISI Seminar at QUT Brisbane
Slides
- Breaking ECC2K-130,
presentation at
Early Symmetric Crypto (ESC) seminar
Slides
- Small high-security public-key encryption and signatures,
invited presentation at
The First Taiwanese Workshop on Security and System-on-Chip
Slides
- ECC minicourse,
talk given jointly with Daniel J. Bernstein in a minicourse following Africacrypt 2010.
Slides
- Starsh on strike,
talk given jointly with Daniel J. Bernstein
at Latincrypt.
Slides
- Why CHES is better than CRYPTO,
talk given jointly with Daniel J. Bernstein
that the CHES 2010 Rump Session.
Slides
Movie
- Attacking Elliptic Curve Challenges,
presentation at
European Cryptography Day
Slides
- Breaking ECC2K-130,
invited presentation at
Workshop on Elliptic Curves and Computation
Slides
- Elliptic Curve Cryptography,
key note presentation at
81. Arbeitstagung Allgemeine Algebra
Slides
- Code-based cryptography,
invited presentation at
Workshop on: Solving polynomial equations
Slides
- On the correct use of the negation map in the Pollard rho method,
talk given jointly with Daniel J. Bernstein at
PKC 2011
Slides
- Minicourse on the ECDLP,
given jointly with Daniel J. Bernstein at CSIT (Centre for Strategic Infocomm Technologies), Singapore
day 1
my part of day 2
my part of day 3
my part of day 4
- Breaking ECC2K-130,
key note presentation at
CrossFyre
Slides
- Syndrome-based hash functions,
invited presentation at
International Workshop on Coding & Cryptology (IWCC)
Slides
- Code-based cryptography,
key note presentation at
The 10th International Conference on Finite Fields and their Applications
Slides
- Code-based cryptography,
invited presentation at
Aspects of Coding Theory
Slides
- Advances in Elliptic-Curve Cryptography,
invited
presentation at International Conference on
Coding and Cryptography Slides
- State-of-the-art branchless techniques for elliptic curve scalar
multiplication,
talk at Dagstuhl seminar on Quantum Cryptanalysis
blackboard snapshots
- Advances in Elliptic-Curve Cryptography,
plenary talk
at SIAM
Conference on Applied Algebraic Geometry Slides
- Advances in Elliptic-Curve Cryptography,
invited talk at the General Mathematics Colloquium Slides
- Code-based cryptography,
invited talk at the
Spanish Cryptography Days
Slides
- Elliptic curves for applications,
tutorial at
Indocrypt 2011
Slides
- A battle of bits: building confidence in cryptography,
invited talk given jointly with Daniel J. Bernstein at
Mathematical and Statistical Aspects of Cryptography
Slides
- The new SHA-3 software shootout,
Talk given jointly with Daniel J. Bernstein at the Third SHA-3 Candidate Conference
Slides
- Two grumpy giants and a baby,
Talk given jointly with Daniel J. Bernstein at the Ei/PSI Cryptography Working Group
Slides
- Factorization (tutorial),
given jointly with Daniel J. Bernstein at
CSIT (Centre for Strategic Infocomm Technologies), Singapore.
- The security impact of a new cryptographic library.,
Talk given jointly with Daniel J. Bernstein at the ACNS 2012
Slides
- Never trust a bunny,
Talk given jointly with Daniel J. Bernstein at the RFIDsec 2012
Slides
- Two grumpy giants and a baby,
Talk given jointly with Daniel J. Bernstein at the ANTS 2012
Slides
- The security impact of a new cryptographic library.,
Invited talk given jointly with Daniel J. Bernstein at the "Short
Subjects in Security seminar" at Qualcomm, San Diego, Slides
- Two grumpy giants and a baby,
Talk given jointly with Daniel J. Bernstein at YACC 2012
Slides
- Post-quantum cryptography -- long-term confidentiality and integrity
for communication,
invited presentation at
This Week's Discoveries - science faculty Leiden
Slides
- Advances in Elliptic-Curve Cryptography,
invited presentation at
Academia Sinica, IIS seminar (Taiwan)
Slides
- High-speed high-security cryptography on ARMs,
Talk given jointly with Daniel J. Bernstein at the escar 2012
Slides
Abstract:
Secure cryptography does not need to be big and slow. This talk
explains the cryptographic primitives behind the record-setting
software in the NaCl library (http://nacl.cr.yp.to), reports
timings on a variety of CPUs, and then focuses on ARM processors, with
an emphasis on the popular ARM Cortex A8 CPU core.
- Computing small discrete logarithms faster,
Talk given jointly with Daniel J. Bernstein at Indocrypt 2012
Slides
- FactHacks - RSA factorization in the real world,
Talk given jointly with Daniel J. Bernstein and Nadia Heninger at
29C3
Slides
See also our related webpage http://facthacks.cr.yp.to/ and the video.
- The state of factoring algorithms and other cryptanalytic
threats to RSA ,
Talk given jointly with Daniel J. Bernstein and Nadia Heninger.
Slides See also our
related webpage http://facthacks.cr.yp.to/
- Non-uniform cracks in the concrete: the power of free
precomputation ,
Talk given jointly with Daniel J. Bernstein at ESC 2013 Slides
- Post-Quantum Cryptography ,
presentation at Crypto for 2020
Slides
- Crypto for Security and Privacy,
panel at Crypto for 2020
Slides
- Modeling the Security of Cryptography, Part 2: Public-Key Cryptography,
invited presentation at
Modeling Intractability workshop
Slides
Part 1: secret-key cryptography. was given by Daniel J. Bernstein.
- Never trust a bunny,
rump session presentation at
Modeling Intractability workshop
Slides
- The security impact of a new cryptographic library.,
Inivited talk given jointly with Daniel J. Bernstein at the Security seminar at the University of Haifa and 2 days later at the
Theory Seminar at the Weizmann Institute of Science
Slides
- Security dangers of the NIST curves,
Invited talk given jointly with Daniel J. Bernstein at the International State of the Art in Cryptography - Security workshop in Athens.
Slides
- Public-key cryptography and the Discrete-Logarithm Problem,
first lecture in
Summer School - Number Theory for Cryptography
slides
- Signatures and DLP-I,
second lecture in
Summer School - Number Theory for Cryptography
slides
- DLP-II and curves with endomorphisms,
third lecture in
Summer School - Number Theory for Cryptography
slides
- Pairings and DLP-III,
fourth lecture in
Summer School - Number Theory for Cryptography
slides
- Factoring RSA keys from certified smart cards: Coppersmith in the wild,
invited presentation at
Number Theory, Geometry and Cryptography
Slides
- Post-Quantum Cryptography,
presentation at
SIAM conference on Applied Algebraic Geometry
Slides
- Spyin' NSA,
song with several others at
Crypto 2013 Rump Session
Slides
YouTube recording.
- Under Surveillance,
song with several others at
Crypto 2013 Rump Session
Slides
YouTube recording.
- Factoring RSA keys from certified smart cards: Coppersmith in the wild,
presentation at
Cryptography Working Group, Sep 6, 2013
Slides
- Factoring RSA keys from certified smart cards: Coppersmith in the wild,
presentation at
ECC Rump session
Slides
- Benchmarking of post-quantum cryptographyi,
invited presentation at
ETSI Quantum-Safe-Crypto Workshop
Slides
- Factoring RSA keys from certified smart cards: Coppersmith in the wild,
invited presentations at
Computer Science Colloquium (Macquarie University) and
Computational Algebra Seminar (Sydney University)
Slides
- Presentation at Department Dialog (TU/e)
Slides
- Some Elliptic CUrve REsults
presentation at the
Asiacrypt 2013 rump session
slides
- Non-uniform cracks in the concrete: the power of free precomputation,
Talk given jointly with Daniel J. Bernstein at Asiacrypt 2013
Slides
- Factoring RSA keys from certified smart cards: Coppersmith in
the wild
Talk given jointly with Nadia Heninger at Asiacrypt 2013
slides
- Cleaning up crypto,
Invited talk given jointly with Daniel J. Bernstein
at the
International View of the State-of-the-Art of Cryptography and Security and its Use in Practice (IV) in Bangalore
Slides
- The year in crypto,
Talk given jointly with Daniel J. Bernstein
and Nadia Heninger at
30C3
Slides video
- (Tweet)NaCl,
Invited talk given jointly with Daniel J. Bernstein
and Peter Schwabe at
30C3 during the #youbroketheinternet
assembly.
Slides
Last modified: 2024.12.20
|