
Presentations
2022

Sunit attacks,
invited talk at KpqC workshop in Korea
slides
 Disorientation faults in CSIDH,
talk at
at ACCESS
seminar
slides
 Introduction to postquantum cryptography,
invited presentaion with Daniel J. Bernstein
at The First USFQSancus Workshop on PostQuantum Cryptography
slides
 PostQuantum Cryptography: Detours, delays, and disasters
,
invited presentaion with Daniel J. Bernstein
at HITCON 2022
slides
 Sunit attacks,
invited talk
at ANTSXV
slides
video (link goes to YouTube)
 Postquantum cryptography,
talk at editor meeting Nature communication –
Quantum and optical technology community
slides
 How to fit an elephant into a Smart car – PQC for small devices
,
invited talk at ESA Workshop on "Secure Communications for Space Missions
in the PostQuantum Era"
at
European Space Research and Technology Centre (ESTEC)
slides
 Elliptic curves for futureproof cryptography,
invited talk at
at
Effective Methods in Algebraic Geometry
slides
 Codebased cryptography for secure communication
,
nvited presentaion
at Algebraic Methods in Coding Theory and Communication
slides
 Hashbased signatures II – Stateful and stateless signatures,
lecture at National Taiwan University in course ``Postquantum cryptography''
slides
 The transition to postquantum cryptography
,
invited presentaion with Daniel J. Bernstein
at International Distinguished Lecture Series at EECS
at National Taiwan University.
slides
 EU Activities in PostQuantum Cryptography,
invited talk at
at Postquantum cryptography forum
slides
 Hashbased Signature, the Round3 Candidate: SPHINCS+,
nvited talk at
at Postquantum cryptography forum
slides
2021
 Ask me anything,
me being interviewed by Lejla Batina
at CHES 2021
video on YouTube
 Cryptology,
not srictly speaking a talk but many videos on YouTube channel for
course Cryptology
YouTube Channel
 Transitioning to postquantum: How PQC affects protocols and what we can do today?,
invited talk at ICMC 2021
slides
 Timing attacks,
presentaion with Daniel J. Bernstein
at IkV Technologies
slides
 Introduction to SIDH and CSIDH ,
invited lecture at Isogenybased cryptography school organized online by University of Bristol.
For lecture notes, exercises, and videos see here
 Classic McEliece: conservative codebased cryptography
,
presentation at NIST's Third PQC Standardization Conference
slides
video
 Hashbased signatures II – Stateful and stateless signatures,
lecture at National Taiwan University in course ``Postquantum cryptography''
slides
 Postquantum cryptography,
not srictly speaking a talk but many videos on YouTube channel for
course Selected areas in cryptology
YouTube Channel
2020
 Intro to crypto,
not srictly speaking a talk but many videos on YouTube channel for
course Introduction to cryptology
YouTube Channel
 Ellipticcurve cryptography,
invited talk at DESDA symposium
Alice in Cryptoland
slides
 Communications protocol implications of using codebased cryptography,
presentation at NCCoE
Virtual Workshop on Considerations in Migrating to PostQuantum Cryptographic Algorithms
slides
short video
long video
 Postquantum cryptography,
keynote at HITCON 2020 given jointly
with Daniel J. Bernstein
slides
 McTiny: Fast HighConfidence PostQuantum Key Erasure for Tiny Network Servers,
contributed talk at Usenix Security 2020
gien jointly with Daniel J. Bernstein
slides
Page at Usenix, incl. video
 IsogenyBased Cryptography I  III,
slides for three invited lecture at PQCRYPTO
MiniSchool
slides
Videos: part I, part II, part III
 Hashbased Signatures,
invited lecture at PQCRYPTO MiniSchool
slides
code snippets from the slides
video (mp4, can download
 Exploring the parameter space in lattice attacks,
invited talk at online workshop on the Mathematics of PostQuantum crypto (scroll to the bottom for the right schedule)
given jointly with
Daniel J. Bernstein
slides
 Overview of CodeBased Crypto Assumptions,
invited talk at Quantum Cryptanalysis of PostQuantum Cryptography
slides
video
 Challenges in evaluating costs of known lattice attacks,
invited talk at Lattices: Geometry, Algorithms and Hardnessy
given jointly with
Daniel J. Bernstein
slides
video
 Quantum computers – the future attack that breaks today's messages,
invited talk at EU Telecom Security  30th Article 13a Group Meeting
slides
 Crypto horror stories,
invited talk at Talking Heads event at Sicherheitnetzwerk München e.V given jointly with
Daniel J. Bernstein
slides
 Quantencomputer – der Angriff aus der
Zukunft auf unsere Daten von heute,
keynote at OOP 2020
slides
2019
 Highassurance crypto software,
talk at 36C3
given jointly with
Daniel J. Bernstein
slides
video
 Kleptography, Dual EC,
lecture in Applied Cryptography course at TU/e.
Slides

Update on postquantum cryptography
presentation at ISO TC 68 meeting in Sydney.
slides

Postquantum cryptography: schemes and standards
invited presentation at
Inside Quantum Technology EUROPE
The Future of Quantum Computing, Quantum Communication and Quantum Sensors.
slides

Quantum circuits for the CSIDH:
optimizing quantum evaluation of
isogenies
presentation at
Dagstuhl seminar on Quantum Cryptanalysis
slides

McTiny: McEliece for Tiny Network Servers
invited presentation at
Munich Workshop on Coding and Cryptography (MWCC) 2019
given jointly with
Daniel J. Bernstein
slides

Codebased crypto for small servers,
invited presentation at SIAM Conference on Applied Algebraic Geometry
slides

Codebased cryptography,
lecture given at Executive School on PostQuantum Cryptography 2019.
slides

Introduction to postquantum cryptography I,
lecture given at Executive School on PostQuantum Cryptography 2019.
slides

Discretelog attacks and factorization, Part 2,
lecture given at Summer School on Cryptography CryptoCO.
slides in single page format
slides in twopage sliding format

Discretelog attacks and factorization, Part I,
lecture given at Summer School on Cryptography CryptoCO.
slides in single page format
slides in twopage sliding format

Postquantum cryptography,
keybote given together with Daniel J. Bernstein
at Summer School on Cryptography CryptoCO.
slides

Progress in PostQuantum Cryptography,
presentation at ICMC 2019
slides

Backdoors always backfire,
invited seminar talk at Cambridge University Ethics in Mathematics Society (CUEiMS) series
slides

CodeBased Cryptography,
invited talk at 12th International ITG conference on Systems, Communications and Coding
slides

Introduction to postquantum cryptography,
talk at AIM Quantum algorithms for analysis of publickey crypto workshop
slides

Quantum computers the future attack that breaks today's messages,
invited talk at Cybersecurity in de zorg
slides
2018

The year in postquantum crypto,
talk given jointly with Daniel J. Bernstein
at 35C3
slides
video

Quantum computers:
the future attack that breaks today’s messages,
talk given jointly with Daniel J. Bernstein
at The Optus Macquarie University Cyber Security Hub
slides

CodeBased Cryptography,
tutorial at
Australian Summer School on Embedded Cryptography
slides

PostQuantenKryptographie für Langzeitsicherheit,
invited talk at
8. Handelsblatt Jahrestagung Cybersecurity
slides

The standardization ecosystem  A fertile ground for bad ideas and
back doors,
invited talk at
SSR 2018: Security Standardisation Research
slides

CodeBased Cryptography,
tutorial at
Korea Cryptography Forum’s annual symposium
slides
 Quantum computers  the future attack that breaks today’s messages,
invited presentation at
Korea Cryptography Forum’s annual symposium
slides

Results of PQCRYPTO (ICT645622),
invited talk at
1st FutureTPM Workshop on QuantumResistant Crypto Algorithms
slides
 Postquantum crypto – Summary and recommendations,
invited lecture at
Network and Information Security (NIS'18) Summer School
slides

Cryptology, cryptography, cryptanalysis. Definitions, meanings, requirements, and current challenges,
invited lecture at
Network and Information Security (NIS'18) Summer School
slides

Cryptanalysis of NISTPQC submissions,
Invited talk given jointly with Daniel J. Bernstein and Lorenz Panny
at
Workshop on Attacks in Cryptography
slides

NTRU Prime,
Invited talk given jointly with Daniel J. Bernstein at
PQCRYPTO MiniSchool and Workshop.
slides

CodeBased Public Key Cryptosystems,
course of two lectures given at
PQCRYPTO MiniSchool and Workshop.
slides

NTRU Prime  reducing attack surface at low cost,
invited talk at
Cryptography and Algorithmic Number Theory (CAEN).
slides

Cryptanalysis using GPUs,
Talk given jointly with Daniel J. Bernstein at
Fourth workshop in NIRICT GPGPU Reconnaissance workshop series.
slides
 Progress in PostQuantum Cryptography,
presentation at
International Cryptographic Module Conference.
Slides
 Progress in PostQuantum Cryptography,
presentation at
13th International View of the StateoftheArt of Cryptography and Security and its Use in Practice.
Slides
 Classic McEliece: conservative codebased cryptography,
presentation at NIST's First PQC Standardization Conference.
Slides
 PostQuantum Cryptography,
invited presentation at ASML Tech Talks.
Slides
 PostQuantum Cryptography,
invited presentation at
SURF Security en Privacyconferentie
Slides
 NTRU Prime,
presentatin at
Combined event on PostQuantum Cryptography
Slides
2017
 LatticeHacks,
Talk given jointly with Daniel J. Bernstein and Nadia Heninger at
34C3
Slides
See also our related webpage http://latticehacks.cr.yp.to/ and the Youtube
and CCC media
video.
 Kleptography, Dual EC,
lecture in Applied Cryptography
course at TU/e.
Slides
 Rounded Gaussians – Fast and Secure ConstantTime Sampling for LatticeBased Crypto,
quick announcment at
CHES 2017 rump session
Slides
 PostQuantum Cryptography – CodeBased Cryptography,
lecture at
ASCrypto 2017
Slides
 PostQuantum Cryptographyy,
lecture at
ASCrypto 2017
Slides
 Publickey cryptography Part I – Ellipticcurve crypto,
lecture at
SAC Summer School (S3)
Slides
Part II – factorization was given by
Daniel J. Bernstein.
 Practical PostQuantum Cryptography,
invited presentation at
SIAM conference on Group on Algebraic Geometry
Slides
 Postquantum cryptography,
lecture given jointly with
Daniel J. Bernstein and
Peter Schwabe.
Slides
 Introduction to postquantum cryptography I and II,
lecture at
Executive School on PostQuantum Cryptography 2017
Slides part I and II
 Introduction to postquantum cryptography,
lecture at
Summer School on PostQuantum Cryptography 2017
Slides
Video
 Preparing Today for Key Management in a PostQuantum Computing World,
presentation given jointly with Tony Cox at
ICMC17
Slides
 Quantum cryptanalysis – the catastrophe we know and don't know,
presentation at cataCrypt
Slides
 PostQuantum Cryptography,
invited presentation at dot Security
Slides
event page with video
 (In)secure messaging with SCimp,
presentation at
CryptoAction Symposium 2017
on work with Sebastian Verschoor
(actually his master thesis!).
Slides
 NTRU Prime,
presentation at Oberwolfach Workshop "Cryptography"
Slides
2016
 Kleptography, Dual EC,
lecture in Applied Cryptography course at TU/e.
Slides
 Cryptanalysis Course, Part V  Factorization,
invited lecture at
IACRSEAMS School "Cryptography: Foundations and New Directions"
Slides
 Cryptanalysis Course, Part IV  Factorization,
invited lecture at
IACRSEAMS School "Cryptography: Foundations and New Directions"
Slides
 Cryptanalysis Course, Part III  DLPs in intervals,
invited lecture at
IACRSEAMS School "Cryptography: Foundations and New Directions"
Slides
 Cryptanalysis Course, Part II  DLP,
invited lecture at
IACRSEAMS School "Cryptography: Foundations and New Directions"
Slides
 Cryptanalysis Course, Part I  ECC,
invited lecture at
IACRSEAMS School "Cryptography: Foundations and New Directions"
Slides
 Longterm security for cars,
keynote presentation given jointly with Daniel J. Bernstein at
escar 2016
Slides

Postquantum cryptography,
invited presentation given jointly with
Daniel J. Bernstein and
Peter Schwabe
Slides
 NTRU Prime,
invited presentation at
Mathematical Structures for Cryptography
Slides
 Postquantum crypto and sidechannel attacks 
getting ready for the real world,
invited presentation at
ArcticCrypt
Slides
 PQCRYPTO overview,
presentation at
1day workshop PQCRYPTO
Slides
 Publickey cryptography in Tor and pluggable transports,
invited presentation at
Summer school
on realworld crypto and privacy
Slides
 Standardization of postquantum cryptography,
invited presentation at
A Workshop About Cryptographic Standards (AWACS)
Slides
video
 You thought your communication was secure? Quantum computers are coming!,
Invited talk given jointly with Daniel J. Bernstein at the
Science and Cocktails
Slides
video
 PostQuantum Cryptography,
invited presentation at
BeNeLuxMC 2016 Amsterdam
Slides
 The cryptoapocalypse: cybersecurity in a postquantum world,
presentation at
Studium Generale
Slides
 Codebased cryptography,
invited presentation at
PostQuantum Cryptography Winter School
Slides
video
 Postquantum cryptography,
invited presentation at
8th Winter School on Quantum Cybersecurity
Slides
2015
 PQCHacks: a gentle introduction to postquantum cryptography.
Talk given jointly with Daniel J. Bernstein
at 32C3
Slides
video
 Failures in NIST's ECC standards,
Talk given jointly with Daniel J. Bernstein
at the SSR 2015 rump session
Slides
 How to manipulate curve standards: a white paper for the black hat,
Talk given jointly with Daniel J. Bernstein
at SSR 2015: Security Standardisation Research
Slides
 Kryptographie für Langzeitsicherheit (in German),
invited presentation at Bundesdruckerei Berlin
Slides
 Postquantum cryptography,
invited presentation at
Security, Privacy, and
Applied Cryptography Engineering (SPACE)
Slides
 Postquantum cryptography,
invited presentation at
Academy Contact Forum 'Coding Theory and Cryptography VI'
Slides
 Initial recommendations of longterm secure postquantum systems,
presentation at
Dagstuhl Workshop on Quantum Cryptanalysis
Slides
 Twisted Hessian Curves,
invited presentation at
SIAM Conference on Applied Algebraic Geometry 2015
Slides
 EdDSA for more curves,
Invited talk given jointly with Daniel J. Bernstein
at the CFRG during IETF 93
Slides
 Batch NFS,
invited presentation at
Summer school on realworld crypto and privacy
Slides
 Elliptic curves,
invited presentation at
Summer school on realworld crypto and privacy
Slides
 PQCRYPTO  PostQuantum Cryptography for Longterm Security,
invited presentation at
Intel Workshop: International View of the State of the Art in Cryptography and Security and its Use in Practice (VII)
Slides
 TLS alternatives – faster and more secure,
presentation at
CryptoAction meeting in Sofia
Slides
 Coppersmith in the wild,
invited presentation at
Mathematics of Lattices and Cybersecurity
Slides
 PQCRYPTO project in the EU,
presentation at
NIST Workshop on Cybersecurity in a PostQuantum World
Slides
 Batch NFS,
Talk given jointly with Daniel J. Bernstein
at the Crypto Working Group
Slides
 Sneaking key escrow in through the back door,
invited presentation at
MAPPING WP5 Round Table on Privacy, Personality and Business Models
Slides
 NaCl: a new crypto library,
Talk given jointly with Daniel J. Bernstein
at ShmooCon 2015
Slides
2014
 A gentle introduction to ellipticcurve cryptography,
Talk given jointly with Daniel J. Bernstein
at
31C3
Slides video
 Physically unclonable functions found in standard
PC components (PUFFIN),
invited presentation at
International View of the StateoftheArt of Cryptography and Security
and its Use in Practice (VI)
Slides
 The security impact of a new cryptographic library,
Invited talk given jointly with Daniel J. Bernstein
at the KPN Guest Hacker Program
Slides
 Quantum algorithms for subset sum problem,
invited presentation at
PostQuantum Cryptography: Recent Results and Trends
Slides
 Dual EC and what it taught us about
vulnerabilities of the standardization ecosystem,
presentation at
Dagstuhl Perspectives Workshop "Privacy and Security in an Age of Surveillance"
Slides
 EM key extraction from constanttime software on fast ARMs,
Talk given jointly with Daniel J. Bernstein
at
CHES 2014 rump session
Slides
 Batch NFS,
Talk given jointly with Daniel J. Bernstein
at
SAC 2014
Slides
 On the Practical Exploitability of Dual EC DRBG in TLS Implementations,
presentation at
Oberwolfach Workshop "Cryptography"
Slides
 Ellipticcurve cryptography,
invted presentation at
CFRG during IETF 90
Slides
 Pairings, index calculus, and hyperelliptic curves,
invited presentation at
The 9th annual AMSI Winter School
Slides
 Curves with endomorphisms and DLPs in intervals,
invited presentation at
The 9th annual AMSI Winter School
Slides
 Signatures and DLP,
invited presentation at
The 9th annual AMSI Winter School
Slides
 Publickey cryptography and the DiscreteLogarithm Problem,
invited presentation at
The 9th annual AMSI Winter School
Slides
 Crypto news and views,
Invited alk given jointly with Daniel J. Bernstein and Nadia Heninger at
NCSC ONE
Slides
 Randomness generation,
Inivited talk given jointly with Daniel J. Bernstein
at International State of the Art Cryptography Workshop
Slides
 Verifiably random secure curves,
Talk given jointly with Daniel J. Bernstein
at the Eurocrypt 2014 Rump session
Slides
 On the Practical Exploitability of Dual EC DRBG in TLS
Implementations,
Inivited talk at Theoretical and
Practical Aspects of the Discrete Logarithm Problem.
Slides
 SafeCurves: choosing safe curves for ellipticcurve cryptography,
Talk given jointly with Daniel J. Bernstein
at the ShmooCon 2014.
Slides
 A "Challenge in Finesse",
Talk given jointly with Matthew D. Green at the rump session of the Real World Cryptography Workshop.
Slides: censored.
 Randomness,
Talk given jointly with Daniel J. Bernstein
at the Dagstuhl
Seminar "Symmetric Cryptography".
Slides
Slides of recent (well..) talks
The talks come in chronological order.
 Fast arithmetic on hyperelliptic Koblitz curves ,
invited talk at the MAGiC conference in Urbana/Champaign
Abstract
M1.ps M2.ps M3.ps Slides (3 files, middle one containing picture of DiffieHellman keyexchange)
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
talk at UCL Crypto Group  Seminar Series
Slides
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
invited talk at 2003 International Symposium on Next Generation Cryptography and Related Mathematics, Japan
Slides
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
invited talk at Computational Aspects of Algebraic Curves, and Cryptography, Gainesville
Slides
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
talk at Cryptography Seminar in Rennes
Slides
 Improved Algorithms for Efficient Arithmetic on Elliptic Curve using
Fast Endomorphisms,
talk given by Francesco Sica at Eurocrypt 2003
Slides in pdf
 Efficient arithmetic on (hyper) elliptic curves over finite fields,
invited talk at ECC 2003
Slides
 Cryptographic Applications of Trace Zero Varieties,
invited talk at Mathematics of Discrete Logarithms, Essen
Slides
 Cryptographic Applications of Trace Zero Varieties,
talk at Dagsthul Seminar 
Algorithms and Number Theory
Slides
 Mathematical Countermeasures Against SideChannel Attacks on
ECC/HECC,
talk at YACC 2004 Slides
 Introduction to SideChannel Attacks on elliptic and
hyperelliptic curves,
talk at ANTS VI 2004 Slides
 Montgomery Addition for Genus Two Curves,
talk at ANTS VI 2004 Slides
 Mathematical Countermeasures against SideChannel Attacks on
Elliptic and Hyperelliptic Curves,
invited talk at WARTACRYPT
'04 Slides
 Pseudorandom Number Generators Based on Elliptic Curves,
invited talk at
Number Theoretic Algorithms and Related Topics Slides
 Hyperelliptic curves in cryptography,
talk at the
"Seminar on zeta functions'' at the Technical University Tokyo
Slides
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
talk at the "COSIC Seminar" KU Leuven
Slides
 Curve Cryptography  suitable primitives for embedded device
,
invited talk at Cryptologie et Algorithmique En Normandie (CAEN'05) Slides
 Pairings on ordinary hyperelliptic curves,
invited talk at Pairings in Cryptography Slides
 Arithmetic on Binary Genus 2 Curves Suitable for Small Devices,
talk at Workshop on RFID and Lightweight Crypto Slides
 Arithmetic of hyperelliptic curves over finite fields,
talk at
Discrete Mathematics Seminar, University of Calgary Slides
 Efficient computation of pairings on nonsupersingular
hyperelliptic curves,
talk at Number Theory Inspired by Cryptography, Banff Slides
 Efficient computation of pairings on nonsupersingular hyperelliptic curves,
invited talk at Algebraic Methods in Cryptography, Bochum Slides
 Cryptographic Applications of Trace Zero Varieties,
seminar talk at Cryptology Research Group at the Indian Statistical Institute, Kolkata Slides
 Pairings in Cryptography,
tutorial at ASIACRYPT 2005
Slides
 Distribution of Some Sequences of Points on Elliptic Curves,
invited talk at
AMS Sectional Meeting Program by Special Session, Special Session on Number Theory
Slides
 Arithmetic of hyperelliptic curves over finite fields, part of lecture at
Summer School on "Computational Number Theory and Applications to Cryptography"
Slides
 Pairing Based Cryptography, part of lecture at
Summer School on "Computational Number Theory and Applications to Cryptography"
Slides
 Analysis of pseudorandom number generators based on elliptic
curves,
talk at
31st Australasian Conference on Combinatorial Mathematics & Combinatorial Computing(ACCMCC)
Slides
 Fast bilinear maps from the TateLichtenbaum pairing on
hyperelliptic curves,
talk at
ANTS VII, Berlin
Slides
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
invited talk at
2006 Workshop on Cryptography and Related Mathematics
Slides
 Hyperelliptic Curves,
talk at
Information Security Summer School (ISSS) 2006. Taiwan.
Slides
 Efficient arithmetic on hyperelliptic curves over finite fields,
talk at
Information Security Summer School (ISSS) 2006. Taiwan.
Slides
 Pairing Based Cryptography,
talk at
Information Security Summer School (ISSS) 2006. Taiwan.
Slides
 Public Key Cryptography  Performance Comparison and Benchmarking,
keynote at
Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBSeg)
Slides
 Index Calculus in Finite Fields & Hyperelliptic Curves,
tutorial at
WCAP 2006  III Workshop on Cryptographic Algorithms and Protocols
Slides
 Efficient arithmetic on hyperelliptic curves over finite fields
& Pairings,
tutorial at
WCAP 2006  III Workshop on Cryptographic Algorithms and Protocols
Slides
 Elliptic vs. hyperelliptic, part 2,
invited talk at ECC 2006
Slides and Slides in ps.gz
Part 1 of the fight was excecuted by Daniel J. Bernstein, his slides can be found here.
 Open Problems in Pairings,
invited talk at
Number Theory and Cryptography  Open Problems
Slides
 Tanja Lange,
on the occasion of presentating the new
employees of the faculty for mathematics and computer science of the Technische Universiteit
Eindhoven Slides
(pdf)
 Cryptographic applications of curves over finite fields,
invited talk at
General Mathematical Colloquium Utrecht Slides
 Unified addition formulae for elliptic curves,
invited talk
at
AMS Special Session on Mathematical Aspects of Cryptography, 2007
Spring AMS Eastern Section Meeting Slides
 Elliptic vs. hyperelliptic, part 2,
talk at EIDMA Seminar Combinatorial
Theory Slides
 Mathematical Background of Pairings,
talk at ECRYPT PhD Summer School on
Emerging Topics in Cryptographic Design and Cryptanalysis Slides
 Fast scalar multiplication on elliptic curves,
invited talk
at Conference on
Algorithmic Number Theory Slides
 Elliptic vs. hyperelliptic, part 3  Elliptic Strikes
Back,
talk at
Eurocrypt 07 Rump Session Slides
 Sidechannel attacks and countermeasures for curve based
cryptography,
invited talk at Quo vadis
cryptology ?  Threat of SideChannel Attacks Slides in ps Slides in pdf
 Fast scalar multiplication on elliptic curves,
talk
at 8th International Conference
on Finite Fields and Applications Slides
 Elliptic vs. Hyperelliptic, part 3: Elliptic strikes
back,
invited presentation at 11th Workshop
on Elliptic Curve Cryptography 2007 Slides for my half Slides for Dan
Bernstein's half
 The EFD thing,
presentation
at the rump session of CHES 2007 given jointly with Dan
Bernstein Slides
 Edwards Curves for Cyptography,
presentation at
EIDMA/DIAMANT Cryptography Working Group
Slides
 Edwards coordinates for elliptic curves, part 1,
invited presentation at
Explicit Methods in Number Theory
In honour of Henri Cohen
Slides
Part 2 was given by Dan
Bernstein
Dan's slides
 Edwards Coordinates for Elliptic Curves, part 1,
invited presentation at
SAGE Days 6: Cryptology, Number theory, and Arithmetic Geometry
Slides
Part 2 was given by Dan
Bernstein
Dan's slides
 Edwards Curves for Cryptography,
invited keynote presentation at
Kolloquium über Kombinatorik
Slides
 Faster Addition and Doubling on Elliptic Curves,
joint presentation with Dan Bernstein at
ASIACRYPT 2007
Slides
 Edwards Coordinates,
invited keynote presentation at
Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC17)
Slides
 The power of mathematics to protect data and to break data protection,
presentation at
Research day at TU/e
Slides
 Revisiting pairing based group key exchange,
presentation at
Financial Cryptography and Data Security 2008
Slides
 Binary Edwards Curves,
presentation at the
Eurocrypt 2008 Rump Session
Slides
 Faster arithmetic on elliptic curves  blessing to ECC, harm to RSA,
presentation at
EIPSI Grand Opening
Slides
 Binary Edwards Curves,
invited presentation at
Seminario Matematico, Universidad Autonoma Madrid
Slides
 Scalar Multiplication and Weierstrass Curves,
presentation at 3rd
ECRYPT PhD SUMMER SCHOOL Advanced Topics in Cryptography Slides
 Shapes of Elliptic Curves,
rumpsession presentation at
ANTS 2008
Slides
See also the
zoo pictures.
 Twisted Edwards Curves,
talk given by
Daniel J. Bernstein on our joint paper at
Africacrypt 2008
Slides
 Binary Edwards Curves,
invited presentation at
Séminaire de Cryptographie de Rennes
Slides
 Binary Edwards Curves,
presentation at
CHES 2008
Slides
 ECM on Graphics Cards,
presentation at
CADO workshop on integer factorization
Slides
 PostQuantum Cryptography,
invited presentation at
INDOCRYPT 2008
Slides in ps
Slides in pdf
 Elliptic Curve Cryptography,
invited presentation at
Malaviya National Institute of Technology, Jaipur, India (Department of Computer Engineering)
Slides
 Models of Elliptic Curves,
joint invited presentation with Dan Bernstein at
Curves, Coding Theory, And Cryptography, ESF Exploratory Workshop  PESC
Slides
 Pairings on Edwards Curves,
invited presentation at
Arithmétique, géométrie, cryptographie et théorie des codes
Slides
Preprint with more details
 Pairings on Edwards curves,
invited presentation at
Fields Cryptography Retrospective Meeting
Slides
 Pairings on Edwards Curves,
presentation at
Dagstuhl Seminar Algorithms and Number Theory
Slides
 PostQuantum Cryptography,
presentation at
Dagstuhl Seminar 09311Classical and Quantum Information Assurance Foundations and Practice
Slides
 Efficient Implementation of Pairings,
invited key note presentation at
Pairing 2009
Slides
 Applied cryptanalysis  or  how to win an iPhone,
rump session presentation at
ECC
Slides
 ECM using Edwards curves,
invited presentation at
Workshop on Factoring Large Integers
Slides
 ECM using Edwards curves,
invited presentation at
Workshop on Discovery and Experimentation in Number Theory
held at Fields Institute, Toronto and Simon Fraser University, Burnaby.
Slides
See also here for
audio recordings.
 What is a use case for quantum key exchange? Part I,
invited presentation at
Workshop on quantum information
Slides
PartII was given by Daniel J. Bernstein,
see his talks page.
 Coppersmith's factorization factory,
invited presentation at
General Colloquium Leiden
Slides
 PostQuantum Cryptography,
invited presentation at
ISI Seminar at QUT Brisbane
Slides
 Breaking ECC2K130,
presentation at
Early Symmetric Crypto (ESC) seminar
Slides
 Small highsecurity publickey encryption and signatures,
invited presentation at
The First Taiwanese Workshop on Security and SystemonChip
Slides
 ECC minicourse,
talk given jointly with Daniel J. Bernstein in a minicourse following Africacrypt 2010.
Slides
 Starsh on strike,
talk given jointly with Daniel J. Bernstein
at Latincrypt.
Slides
 Why CHES is better than CRYPTO,
talk given jointly with Daniel J. Bernstein
that the CHES 2010 Rump Session.
Slides
Movie
 Attacking Elliptic Curve Challenges,
presentation at
European Cryptography Day
Slides
 Breaking ECC2K130,
invited presentation at
Workshop on Elliptic Curves and Computation
Slides
 Elliptic Curve Cryptography,
key note presentation at
81. Arbeitstagung Allgemeine Algebra
Slides
 Codebased cryptography,
invited presentation at
Workshop on: Solving polynomial equations
Slides
 On the correct use of the negation map in the Pollard rho method,
talk given jointly with Daniel J. Bernstein at
PKC 2011
Slides
 Minicourse on the ECDLP,
given jointly with Daniel J. Bernstein at CSIT (Centre for Strategic Infocomm Technologies), Singapore
day 1
my part of day 2
my part of day 3
my part of day 4
 Breaking ECC2K130,
key note presentation at
CrossFyre
Slides
 Syndromebased hash functions,
invited presentation at
International Workshop on Coding & Cryptology (IWCC)
Slides
 Codebased cryptography,
key note presentation at
The 10th International Conference on Finite Fields and their Applications
Slides
 Codebased cryptography,
invited presentation at
Aspects of Coding Theory
Slides
 Advances in EllipticCurve Cryptography,
invited
presentation at International Conference on
Coding and Cryptography Slides
 Stateoftheart branchless techniques for elliptic curve scalar
multiplication,
talk at Dagstuhl seminar on Quantum Cryptanalysis
blackboard snapshots
 Advances in EllipticCurve Cryptography,
plenary talk
at SIAM
Conference on Applied Algebraic Geometry Slides
 Advances in EllipticCurve Cryptography,
invited talk at the General Mathematics Colloquium Slides
 Codebased cryptography,
invited talk at the
Spanish Cryptography Days
Slides
 Elliptic curves for applications,
tutorial at
Indocrypt 2011
Slides
 A battle of bits: building confidence in cryptography,
invited talk given jointly with Daniel J. Bernstein at
Mathematical and Statistical Aspects of Cryptography
Slides
 The new SHA3 software shootout,
Talk given jointly with Daniel J. Bernstein at the Third SHA3 Candidate Conference
Slides
 Two grumpy giants and a baby,
Talk given jointly with Daniel J. Bernstein at the Ei/PSI Cryptography Working Group
Slides
 Factorization (tutorial),
given jointly with Daniel J. Bernstein at
CSIT (Centre for Strategic Infocomm Technologies), Singapore.
 The security impact of a new cryptographic library.,
Talk given jointly with Daniel J. Bernstein at the ACNS 2012
Slides
 Never trust a bunny,
Talk given jointly with Daniel J. Bernstein at the RFIDsec 2012
Slides
 Two grumpy giants and a baby,
Talk given jointly with Daniel J. Bernstein at the ANTS 2012
Slides
 The security impact of a new cryptographic library.,
Invited talk given jointly with Daniel J. Bernstein at the "Short
Subjects in Security seminar" at Qualcomm, San Diego, Slides
 Two grumpy giants and a baby,
Talk given jointly with Daniel J. Bernstein at YACC 2012
Slides
 Postquantum cryptography  longterm confidentiality and integrity
for communication,
invited presentation at
This Week's Discoveries  science faculty Leiden
Slides
 Advances in EllipticCurve Cryptography,
invited presentation at
Academia Sinica, IIS seminar (Taiwan)
Slides
 Highspeed highsecurity cryptography on ARMs,
Talk given jointly with Daniel J. Bernstein at the escar 2012
Slides
Abstract:
Secure cryptography does not need to be big and slow. This talk
explains the cryptographic primitives behind the recordsetting
software in the NaCl library (http://nacl.cr.yp.to), reports
timings on a variety of CPUs, and then focuses on ARM processors, with
an emphasis on the popular ARM Cortex A8 CPU core.
 Computing small discrete logarithms faster,
Talk given jointly with Daniel J. Bernstein at Indocrypt 2012
Slides
 FactHacks  RSA factorization in the real world,
Talk given jointly with Daniel J. Bernstein and Nadia Heninger at
29C3
Slides
See also our related webpage http://facthacks.cr.yp.to/ and the video.
 The state of factoring algorithms and other cryptanalytic
threats to RSA ,
Talk given jointly with Daniel J. Bernstein and Nadia Heninger.
Slides See also our
related webpage http://facthacks.cr.yp.to/
 Nonuniform cracks in the concrete: the power of free
precomputation ,
Talk given jointly with Daniel J. Bernstein at ESC 2013 Slides
 PostQuantum Cryptography ,
presentation at Crypto for 2020
Slides
 Crypto for Security and Privacy,
panel at Crypto for 2020
Slides
 Modeling the Security of Cryptography, Part 2: PublicKey Cryptography,
invited presentation at
Modeling Intractability workshop
Slides
Part 1: secretkey cryptography. was given by Daniel J. Bernstein.
 Never trust a bunny,
rump session presentation at
Modeling Intractability workshop
Slides
 The security impact of a new cryptographic library.,
Inivited talk given jointly with Daniel J. Bernstein at the Security seminar at the University of Haifa and 2 days later at the
Theory Seminar at the Weizmann Institute of Science
Slides
 Security dangers of the NIST curves,
Invited talk given jointly with Daniel J. Bernstein at the International State of the Art in Cryptography  Security workshop in Athens.
Slides
 Publickey cryptography and the DiscreteLogarithm Problem,
first lecture in
Summer School  Number Theory for Cryptography
slides
 Signatures and DLPI,
second lecture in
Summer School  Number Theory for Cryptography
slides
 DLPII and curves with endomorphisms,
third lecture in
Summer School  Number Theory for Cryptography
slides
 Pairings and DLPIII,
fourth lecture in
Summer School  Number Theory for Cryptography
slides
 Factoring RSA keys from certified smart cards: Coppersmith in the wild,
invited presentation at
Number Theory, Geometry and Cryptography
Slides
 PostQuantum Cryptography,
presentation at
SIAM conference on Applied Algebraic Geometry
Slides
 Spyin' NSA,
song with several others at
Crypto 2013 Rump Session
Slides
YouTube recording.
 Under Surveillance,
song with several others at
Crypto 2013 Rump Session
Slides
YouTube recording.
 Factoring RSA keys from certified smart cards: Coppersmith in the wild,
presentation at
Cryptography Working Group, Sep 6, 2013
Slides
 Factoring RSA keys from certified smart cards: Coppersmith in the wild,
presentation at
ECC Rump session
Slides
 Benchmarking of postquantum cryptographyi,
invited presentation at
ETSI QuantumSafeCrypto Workshop
Slides
 Factoring RSA keys from certified smart cards: Coppersmith in the wild,
invited presentations at
Computer Science Colloquium (Macquarie University) and
Computational Algebra Seminar (Sydney University)
Slides
 Presentation at Department Dialog (TU/e)
Slides
 Some Elliptic CUrve REsults
presentation at the
Asiacrypt 2013 rump session
slides
 Nonuniform cracks in the concrete: the power of free precomputation,
Talk given jointly with Daniel J. Bernstein at Asiacrypt 2013
Slides
 Factoring RSA keys from certified smart cards: Coppersmith in
the wild
Talk given jointly with Nadia Heninger at Asiacrypt 2013
slides
 Cleaning up crypto,
Invited talk given jointly with Daniel J. Bernstein
at the
International View of the StateoftheArt of Cryptography and Security and its Use in Practice (IV) in Bangalore
Slides
 The year in crypto,
Talk given jointly with Daniel J. Bernstein
and Nadia Heninger at
30C3
Slides video
 (Tweet)NaCl,
Invited talk given jointly with Daniel J. Bernstein
and Peter Schwabe at
30C3 during the #youbroketheinternet
assembly.
Slides
Last modified: 2022.11.24
