TALKS

     Presentations

     2023
  • Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings. Contributed talk at CHES 2023, Prague, Czech Republic, September 2023.
    [video] [slides]

  • Panel: Implementation and side channels. Invited panelist at the Workshop on Real World Post Quantum Cryptography (RWPQC 2023), Tokyo, Japan (virtual participation), March 2023.
  • NIST PQC standardization. Contributed talk at BlueHat 2023, Redmond, USA, February 2023.

     2022
  • Standardization of post-quantum crypto - A summary. Talk at MSR security research meeting, Redmond, USA, May 2022.

     2021
  • Supersingular isogeny-based cryptography: Implementation aspects and parameter selection. Invited lecture at the Isogeny-Based Cryptography School, virtual conference, September 2021.
    [lecture notes] [slides]

  • FrodoKEM: A simple and conservative KEM from generic lattices. Contributed talk at the 3rd NIST Post-Quantum Cryptography Standardization Conference, virtual conference, June 2021.
    [video]  [slides]


     2020
  • Software implementation of (post-quantum) public-key cryptography. Invited tutorial at SPACE 2020, virtual conference, December 2020.
    [slides]


     2019
  • Practical quantum-resistant key exchange from supersingular isogenies and its efficient implementation. Invited keynote at Latincrypt 2019, Santiago, Chile, October 2019.
    [slides]

  • The post-quantum signature scheme qTESLA. Contributed talk at ICMC'19, Vancouver, Canada, May 2019.
    [slides]


     2018
  • Post-quantum key exchange from supersingular isogenies and its efficient implementation. Invited talk at TU Darmstadt, Darmstadt, Germany, September 2018.
    [slides]

  • Practical quantum-resistant cryptography from supersingular isogenies. Contributed talk at ICMC'18, Ottawa, Canada, May 2018.
    [slides]

  • Supersingular isogeny based cryptography gets practical. Contributed talk at Real World Cryptography 2018, Zurich, Switzerland, January 2018.
    [video]  [slides]


     2017
  • LWE-based key agreement in a post-quantum world. Invited talk at Nanjing University of Aeronautics and Astronautics, Nanjing, China, October 2017.
    [slides]
  • Practical post-quantum cryptography from the Learning with Errors Problem. Invited keynote at ChinaCrypt 2017, Jinan, China, October 2017.
    [slides]
  • FourQ-based cryptography for high-performance and low-power applications. Contributed talk at Real World Cryptography 2017, New York, January 2017.
    [video]  [slides]


     2016
  • Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography. Contributed talk at CANS 2016, Milan, Italy, November 2016.
    [slides]

  • Software Implementation of Public-Key Cryptography. Invited lecture at the S3 – Summer School (SAC 2016), St. John’s, Canada, August 2016.
    [slides]

  • FourQNEON: faster elliptic curve scalar multiplications on ARM processors. Contributed talk at SAC 2016, St. John’s, Canada, August 2016.
    [slides]


     2015
  • FourQ: pushing the limits of curve-based cryptography. Invited talk at University of Luxembourg, Luxembourg, November 2015.
    [slides]

  • FourQ and FourQlib: faster curve-based scalar multiplications. Invited talk at COSIC – KU Leuven, Leuven, Belgium, November 2015.
    [slides]

  • FourQ and FourQlib. Invited talk at the MSR Privacy Workshop 2015, Redmond, USA, October 2015.
  • FourQ: four-dimensional decompositions on a Q-curve. Rump session talk at CHES 2015, Saint-Malo, France, August 2015.
    [slides]

  • An Analysis of High-Performance Primes at High-Security Levels. Contributed talk at the NIST Workshop on Elliptic Curve Cryptography Standards, Gaithersburg, USA, June 2015.
    [slides]

  • Post-Snowden Elliptic Curve Cryptography. Contributed talk at Real World Cryptography 2015, London, UK, January 2015.
    [slides]


     2014
  • NUMS Elliptic Curves and their Implementation. Invited talk at the University of Washington (Tacoma), Tacoma, USA, November 2014.
    [slides]

  • NUMS Elliptic Curves and their Efficient Implementation. Invited talk at the MSR Privacy Workshop 2014, Cambridge, UK, October 2014.
  • Selecting Elliptic Curves for Cryptography. Presentation for the IETF Crypto Forum Research Group (CFRG), interim teleconference meeting, April 2014.
    [slides]

  • Efficient and Secure Methods for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves. Talk at CT-RSA 2014, San Francisco, USA, February 2014.
    [slides]


     2013
  • Efficient Formulas and Algorithms for Standardized Elliptic Curve Cryptography. Invited talk at the MSR Privacy Workshop 2013, Redmond, USA, 2013.
Share by: