Presentations
2022
2021
- December 13, 2021: The Matrix Reloaded: Multiplication Strategies in FrodoKEM
Conference on Cryptology And Network Security (CANS), Virtual. [Video]
- September 28, 2021: An Introduction to FrodoKEM and Post-Quantum Crypto for Embedded Devices
Industrial Computeralgebra Conference with Focus Cryptography, Virtual.
- June 16, 2021: Tribute to Peter L. Montgomery
IEEE International Symposium on Computer Arithmetic, Virtual.
- February 3, 2021: Post-Quantum Cryptography: What You Need to Know
NXP Webinar Training, Virtual. [Webpage]
- January 12, 2021: Post-Quantum Crypto: The Embedded Challenge
Real World Crypto Symposium 2021, Virtual. [Video]
2020
2019
2018
2017
- November 11, 2017: Software Engineering Aspects of Elliptic Curve Cryptography
School on Elliptic Curve Cryptography, Radboud University, Nijmegen, Netherlands
- September 20, 2017: Post-Quantum Key Exchange based on Lattices
Romanian Cryptology Days Conference, Bucharest, Romania
- January 4, 2017: Security assessment of software security: A closer look at white-box cryptographic implementations
Real World Cryptography Conference, Columbia University, New York City, USA
2016
- September 16, 2016: Post-Quantum Key Exchange for the Internet
Kayaks & Dreadnoughts in a sea of crypto, Université Libre de Bruxelles, Brussels, Belgium
- August 24, 2016: Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
Microsoft Research, Redmond, WA, USA (video)
- August 18, 2016: Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Workshop on Cryptographic Hardware and Embedded Systems (CHES), Santa Barbara, CA, USA (video)
- August 14, 2016: Practical white-box topics: design and attacks – part 1
White-Box Cryptography and Obfuscation (WhibOx), Santa Barbara, CA, USA
- June 9, 2016: Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Summer school on real-world crypto and privacy, Šibenik, Croatia
- February 10, 2016: Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Laboratory for cryptologic algorithms (LACAL), École Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland
- January 25, 2016: Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
QualSec seminars, QualSec cryptography and computer security group, Université Libre de Bruxelles, Brussels, Belgium
2015
- June 12, 2015: Elliptic Curves: a Hardware Perspective
Workshop on Elliptic Curve Cryptography Standards, NIST, Gaithersburg, MD, USA
- June 4: Parallel Cryptanalysis
Summer school on real-world crypto and privacy, Hotel Ivan, Šibenik, Croatia
- March 25, 2015: Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
Computer Security and Industrial Cryptography (COSIC), Leuven, Belgium
- February 6, 2015: Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
Special LACAL@RISC Seminar on Cryptologic Algorithms, CWI, Amsterdam, the Netherlands
2014
- July 29, 2014: Selecting Elliptic Curves for Cryptography: an Efficiency and Security Analysis
Innovation Center Crypto & Security Colloquium, NXP Hamburg, Germany
- May 7, 2014: Elliptic and Hyperelliptic Curves: a Practical Security Analysis
Conference on the Theoretical and Practical Aspects of the Discrete Logarithm Problem, Ascona, Switzerland
- March 6, 2014: Fast Cryptography in Practice
Microsoft Research Security /Crypto Summit, Redmond, WA, USA
2013
- December 12, 2013: Elliptic Curve Cryptography in Practice
Laboratory for cryptologic algorithms (LACAL), École Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland
- October 25, 2013: Fast Cryptography in Genus 2
Microsoft Research Privacy Workshop, Redmond, WA, USA
- September 17, 2013: Fast Cryptography in Genus 2
Workshop on Elliptic Curve Cryptography (ECC), Leuven, Belgium
- August 23, 2013: High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
Workshop on Cryptographic Hardware and Embedded Systems (CHES), Santa Barbara, CA, USA
- August 16, 2013: Montgomery Multiplication Using Vector Instructions
Selected Areas in Cryptography (SAC), Simon Fraser University, Burnaby, Canada
- March 21, 2013: High-Performance Cryptology on GPUs
GPU Technology Conference, San Jose, CA, USA
2012
- December 18, 2012: (Genus) 2 > (Genus) 1
Cryptography Group, University of Bristol, UK
- December 17, 2012: ECM at Work
Cryptography Group, University of Bristol, UK
- December 12, 2012: Homomorphic Encryption from RLWE – Schemes and Parameter
Laboratory for cryptologic algorithms (LACAL), École Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland
- December 10, 2012: (Genus) 2 > (Genus) 1
Laboratory for cryptologic algorithms (LACAL), École Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland
- December 5, 2012: ECM at Work
Asiacrypt, Beijing, China
- October 23, 2012: RSA keys with common factors
Microsoft Research Privacy Workshop, Redmond, WA, USA
2011
2010
- November 25, 2010: High-performance implementations on the Cell Broadband Engine Architecture
Cryptography Group, University of Bristol, UK
- August 19, 2010: Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures
Cryptographic Hardware and Embedded Systems – CHES, Santa Barbara, California, USA
- July 20, 2010: On the Use of the Negation Map in the Pollard Rho Method
Algorithmic Number Theory Symposium – ANTS-IX, Nancy, INRIA, France
- June 28, 2010: High-Performance Modular Multiplication on the Cell Processor
Workshop on the Arithmetic of Finite Fields – WAIFI 2010, Istanbul, Turkey
2009
- October 12, 2009: High-Performance Modular Multiplication on the Cell Broadband Engine
Software Performance Enhancement for Encryption and Decryption and Cryptographic Compilers – SPEED-CC, Berlin, Germany
- September 9, 2009: Pollard Rho on the PlayStation 3
Special-purpose Hardware for Attacking Cryptographic Systems – SHARCS, EPFL, Lausanne, Switzerland
- March 27, 2009: Cryptanalysis on a PlayStation 3 Cluster
Scientific POWER Meeting 2009, Mazurian Lakes area, Poland
2008