Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings. Contributed talk at CHES 2023, Prague, Czech Republic, September 2023. [video][slides]
Panel: Implementation and side channels. Invited panelist at the Workshop on Real World Post Quantum Cryptography (RWPQC 2023), Tokyo, Japan (virtual participation), March 2023.
NIST PQC standardization. Contributed talk at BlueHat 2023, Redmond, USA, February 2023.
2022
Standardization of post-quantum crypto - A summary.Talk at MSR security research meeting, Redmond, USA, May 2022.
2021
Supersingular isogeny-based cryptography: Implementation aspects and parameter selection. Invited lecture at the Isogeny-Based Cryptography School, virtual conference, September2021. [lecture notes][slides]
The cost to break SIKE: A comparative hardware-based analysis with AES and SHA-3.Contributed talk at CRYPTO 2021, virtual conference, August2021. [livestream video CRYPTO'21][long video][slides]
FrodoKEM: A simple and conservative KEM from generic lattices.Contributed talk at the 3rd NIST Post-Quantum Cryptography Standardization Conference, virtual conference, June2021. [video][slides]
2020
Software implementation of (post-quantum) public-key cryptography.Invited tutorial at SPACE 2020, virtual conference, December2020. [slides]
2019
Practical quantum-resistant key exchange from supersingular isogenies and its efficient implementation.
Invited keynote at Latincrypt 2019, Santiago, Chile, October 2019. [slides]
The post-quantum signature scheme qTESLA.Contributed talk at ICMC'19, Vancouver, Canada, May 2019. [slides]
2018
Post-quantum key exchange from supersingular isogenies and its efficient implementation.Invited talk at TU Darmstadt, Darmstadt, Germany, September 2018. [slides]
Practical quantum-resistant cryptography from supersingular isogenies.Contributed talk at ICMC'18, Ottawa, Canada, May 2018. [slides]
Supersingular isogeny based cryptography gets practical.
Contributed talk at Real World Cryptography 2018, Zurich, Switzerland, January 2018. [video][slides]
2017
LWE-based key agreement in a post-quantum world.Invited talk at Nanjing University of Aeronautics and Astronautics, Nanjing, China, October 2017. [slides]
Practical post-quantum cryptography from the Learning with Errors Problem.Invited keynote at ChinaCrypt 2017, Jinan, China, October 2017. [slides]
FourQ-based cryptography for high-performance and low-power applications.Contributed talk at Real World Cryptography 2017, New York, January 2017. [video][slides]
2016
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography.
Contributed talk at CANS 2016, Milan, Italy, November 2016. [slides]
Software Implementation of Public-Key Cryptography.Invited lecture at the S3 – Summer School (SAC 2016), St. John’s, Canada, August 2016. [slides]
FourQNEON: faster elliptic curve scalar multiplications on ARM processors.
Contributed talk at SAC 2016, St. John’s, Canada, August 2016. [slides]
2015
FourQ: pushing the limits of curve-based cryptography.
Invited talk at University of Luxembourg, Luxembourg, November 2015. [slides]
FourQ and FourQlib: faster curve-based scalar multiplications.
Invited talk at COSIC – KU Leuven, Leuven, Belgium, November 2015. [slides]
FourQ and FourQlib.
Invited talk at the MSR Privacy Workshop 2015, Redmond, USA, October 2015.
FourQ: four-dimensional decompositions on a Q-curve.
Rump session talk at CHES 2015, Saint-Malo, France, August 2015. [slides]
An Analysis of High-Performance Primes at High-Security Levels.
Contributed talk at the NIST Workshop on Elliptic Curve Cryptography Standards, Gaithersburg, USA, June 2015. [slides]
Post-Snowden Elliptic Curve Cryptography.
Contributed talk at Real World Cryptography 2015, London, UK, January 2015. [slides]
2014
NUMS Elliptic Curves and their Implementation.
Invited talk at the University of Washington (Tacoma), Tacoma, USA, November 2014. [slides]
NUMS Elliptic Curves and their Efficient Implementation.
Invited talk at the MSR Privacy Workshop 2014, Cambridge, UK, October 2014.
Selecting Elliptic Curves for Cryptography.
Presentation for the IETF Crypto Forum Research Group (CFRG), interim teleconference meeting, April 2014. [slides]
Efficient and Secure Methods for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves.
Talk at CT-RSA 2014, San Francisco, USA, February 2014. [slides]
2013
Efficient Formulas and Algorithms for Standardized Elliptic Curve Cryptography.
Invited talk at the MSR Privacy Workshop 2013, Redmond, USA, 2013.