List of invited speakers at cryptology conferences

From Wikipedia, the free encyclopedia
Jump to: navigation, search

This is a list of invited speakers at selected cryptography conferences.

2014[edit]

CRYPTO

  • Mihir Bellare "Caught Between Theory, Practice and Peer Review"
  • Yael Kalai "How to Delegate Computations: The Power of No-Signalling Proofs"

EUROCRYPT

  • Jeff Hoffstein "A mathematical history of NTRU and some related cryptosystems"
  • Adi Shamir "The Security and Privacy of Bitcoin"

ASIACRYPT

  • Kenneth G. Paterson "Big bias hunting in Amazonia: Large-scale computation and exploitation of RC4 biases"
  • Helaine Leggat "The legal infrastructure around information security in Asia"

PKC

  • Adi Shamir "Post-Snowden Cryptography"
  • Shai Halevi "Multilinear Maps and Obfuscation"

CHES

  • André Weimerskirch "V2V Communication Security: a privacy-preserving design for 300 million vehicles"

TCC

  • Silvio Micali "Collusion and Privacy in Mechanism Design"
  • Russell Impagliazzo "General Versus Specific Hardness Assumptions in Cryptography"

FSE

  • Thomas Johansson "Low weight polynomials and crypto"
  • Thomas Ristenpart "New Encryption Primitives for Uncertain Times"

CT-RSA

  • Antoine Joux "Discrete logarithms: Recent progress (and open problems)"

SCN

  • Sanjam Garg "Program Obfuscation via Multilinear Maps"
  • Hoeteck Wee "Functional Encryption and its Impact on Cryptography"
  • Dario Catalano "Homomorphic Signatures and Message Authentication Codes"

SAC

  • Nigel Smart "Practical Multi-Party Computation"
  • Alfred Menezes "Scott Vanstone and the Early Years of Elliptic Curve Cryptography"
  • Pierrick Gaudry "NFS: similarities and differences between integer factorization and discrete logarithm"

ACISP

  • Tatsuaki Okamoto "Oblivious Functional Search"
  • Giuseppe Ateniese "Cloud Storage in the Bitcoin Era"

AFRICACRYPT

  • Antoine Joux "Recent advances on the discrete logarithm problem in finite fields"
  • Philippe Gaborit "New results for rank-based cryptography"

INDOCRYPT

  • Maria Naya-Plasencia "On Lightweight Block Ciphers and Their Security"
  • Willi Meier "Stream Ciphers, a Perspective"
  • Phillip Rogaway "Advances in Authenticated Encryption"

2013[edit]

CRYPTO

  • Cindy Cohn "Crypto Wars Part 2 Have Begun"
  • Adam Langley "Why the web still runs on RC4" (joint talk with CHES)

EUROCRYPT

  • Eli Biham (IACR Distinguished Lecture) "How to Make a Difference: 25 Years of Differential Cryptanalysis"
  • Guido Bertoni, Joan Daemen and Gilles Van Assche (joint presentation) "Keccak"

ASIACRYPT

  • George Danezis "Engineering Privacy-Friendly Computations"
  • Lars R. Knudsen "Block ciphers - past and present"

PKC

  • Brent Waters "Functional Encryption: Origins and Recent Developments"
  • Yehuda Lindell "Techniques for Efficient Secure Computation Based on Yao's Protocol"

CT-RSA

  • Nadia Heninger "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices"
  • John Kelsey "SHA3 and the Future of Hashing"

TCC

  • Craig Gentry "Encrypted Messages from the Heights of Cryptomania"
  • Tal Malkin "Secure Computation for Big Data"
  • Benny Applebaum "Cryptographic Hardness of Random Local Functions -- Survey"

FSE

  • Serge Vaudenay "Towards Secure Distance Bounding"
  • Daniel Bernstein "Failures of secret-key cryptography"

CHES

  • Adam Langley "Why the web still runs on RC4" (joint talk with CRYPTO)
  • John Kelsey "The Future of SHA-3"

INDOCRYPT

  • Tatsuaki Okamoto "Functional Encryption on the Decisional Linear Assumption"
  • Kaisa Nyberg "Linear Cryptanalysis and Its Extensions"
  • Kenny Paterson "Cryptographic Aspects of TLS"

AFRICACRYPT

  • Martin Schläffer "New trends in the cryptanalysis of hash functions"

ACISP

  • Paul Ashley "Trends in Advanced Threat Protection"
  • Xavier Boyen "Excessive Cryptography: Lattice Perspectives"
  • Bradley Schatz "Current and future challenges in digital forensics"
  • Yuliang Zheng "Public Key Cryptography for Mobile Cloud"

SAC

  • Paulo S. L. M. Barreto "The realm of the pairings"
  • Anne Canteaut "Similarities between encryption and decryption: how far can we go?"
  • Antoine Joux "Revisiting discrete logarithms in small/medium characteristic finite fields"
  • Douglas R. Stinson "Key distribution in wireless sensor networks"
  • Hugh C. Williams "The Tutte Institute for Mathematics and Computing"

PAIRING

  • Pierrick Gaudry "Computing discrete logarithms in finite fields of small characteristic"
  • Francisco Rodriguez-Henriquez "Implementing pairing-based protocols"
  • Xu Maozhi

2012[edit]

CRYPTO

  • Jonathan Zittrain "The End of Crypto"
  • Ernie Brickell "Recent Advances and Existing Research Questions in Platform Security"

EUROCRYPT

  • Antoine Joux "A Tutorial on High Performance Computing applied to Cryptanalysis"
  • Alfred Menezes "Another Look at Provable Security"

ASIACRYPT

  • Dan Boneh (IACR Distinguished Lecture) "Pairing-based Cryptography: Past, Present, and Future"
  • Chuanming Zong "Some Mathematical Mysteries in Lattices"

PKC

  • David Pointcheval "Password-Based Authenticated Key Exchange"

TCC

  • Jens Groth "Non-Interactive Zero-Knowledge"
  • Sergey Yekhanin "Locally Decodable Codes"

CHES

  • Steven Murdoch "Banking security: attacks and defences"
  • Christof Tarnovsky "(In)security of commonly found smart cards"

FSE

  • Kaisa Nyberg ""Provable" security against differential and linear cryptanalysis"
  • Mitsuru Matsui "The history of linear cryptanalysis"

ACISP

  • Mihir Bellare "A Cryptographic Treatment of the Wiretap Channel"
  • Jorge Munilla "Operating Principles of RFID Systems and Attacks Related to the Location"

INDOCRYPT

  • Orr Dunkelman "From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems"
  • Nigel Smart "Using the Cloud to Determine Key Strengths"
  • Vinod Vaikuntanathan "How to Compute on Encrypted Data"

LATINCRYPT

  • Manoj M. Prabhakaran "A Theory of Cryptographic Complexity"
  • Victor Miller "Elliptic Curves and Cryptography: a 27 year perspective"
  • Gregor Leander "Past and Future of Lightweight Cryptography"
  • Zvika Brakerski "Fully Homomorphic Encryption: The Swiss-Army Knife of Cryptography"

AFRICACRYPT

  • Willi Meier "Stream Ciphers, a Perspective"
  • Craig Gentry "Fully Homomorphic Encryption: Current State of the Art"
  • Marc Fischlin "Black-Box Reductions and Separations in Cryptography"

SAC

  • Vincent Rijmen "Extracts from the SHA-3 competition"
  • Ian Goldberg "Privacy Enhancing Technologies for the Internet"

PAIRING

  • Jean-Luc Beuchat "Hardware Architectures for the Cryptographic Tate Pairing"
  • Jung-Hee Cheon "Discrete Logarithm in Pairing Groups"
  • Dennis Hofheinz "Structure-preserving cryptography"
  • Hovav Shacham "Alternative Structure for Bilinear Groups"

2011[edit]

CRYPTO

  • Ron Rivest (IACR Distinguished Lecture) "Illegitimi Non Carborundum"
  • Roger Dingledine "Tor and Circumvention: Lessons Learned"

EUROCRYPT

  • Phong Nguyen "Lattice Reduction Algorithms: Theory and Practice"
  • Ronald Cramer "The Arithmetic Codex: Theory and Applications"

ASIACRYPT

  • Joan Daemen "15 years of Rijndael"
  • Úlfar Erlingsson "Secure Cloud Computing Services"

PKC

  • Vinod Vaikuntanathan "New Developments in Leakage-Resilient Cryptography"

TCC

  • Luca Trevisan "Dense Model Theorems and Their Applications"
  • Rafael Pass "Concurrent Security and Non-Malleability"

CHES

  • Ernie Brickell "Technologies to Improve Platform Security"
  • Tetsuya Tominaga "Standardization Works for Security regarding the Electromagnetic Environment"

FSE

  • Ivan Damgård "The past, present and future of hash functions – a rehash of some old and new results"
  • Willy Meier "Fast correlation attacks: Methods and countermeasures"

INDOCRYPT

  • Christof Paar: The Yin and Yang Sides of Embedded Security
  • Ross J. Anderson: Cryptology: where is the new frontier?
  • Eric Rescorla: Stone Knives and Bear Skins: Why does the Internet run on pre-historic cryptography?

AFRICACRYPT

  • Bart Preneel "The NIST SHA-3 Competition: A Perspective on the Final Year"
  • Tatsuaki Okamoto "Some Key Techniques on Pairing Vector Spaces"
  • Jens Groth "Efficient Zero-Knowledge Proofs"

ACISP

  • Claude Carlet "On Known and New Differentially Uniform Functions"
  • Nick Ellsmore "The Cyber-Security Landscape, 2011-2015, and the Need to Innovate"

SAC

  • Alfred Menezes "Another Look at Tightness"
  • Kristin Lauter "Cryptographic Techniques for Securing the Cloud"

IMA Cryptography and Coding

  • Ivan Damgård "Using unconditionally secure authentication in multiparty computation with dishonest majority"
  • Paddy Farrell "Non-Statistical Soft-in, Soft-out Decoding with the Euclidean Metric"
  • Jonathan Jedwab "Emerging methods in the analysis of aperiodic autocorrelations"
  • David Naccache "Can a Program Reverse-Engineer Itself?"

2010[edit]

CRYPTO

EUROCRYPT

  • Moti Yung (IACR Distinguished Lecturer) "Cryptography between Wonderland and Underland"

TCC

  • Jan Camenisch "Privacy-Enhancing Cryptography: From Theory Into Practice"
  • Yuval Ishai "Secure Computation and Its Diverse Applications"

ASIACRYPT

  • Bart Preneel "Cryptographic Hash Functions and the SHA-3 Competition"
  • Hugo Krawczyk "Cryptography, from Theory to Practice: A Personal Perspective"

CHES

  • Ivan Damgård and David Naccache "Is Theoretical Cryptography Any Good in Practice?" (Joint with CRYPTO)
  • Hovav Shacham "Cars and Voting Machines: Embedded Systems in the Field"

PKC

  • Jacques Stern "Mathematics, Cryptography, Security"
  • Daniele Micciancio "Duality in Lattice Based Cryptography"

FSE

  • Xiaoyun Wang "The Survey of Cryptanalysis on Hash Functions"
  • Thomas Shrimpton "A Provable-Security Perspective on the Development of Hash Functions"

INDOCRYPT

  • Neal Koblitz "Getting a Few Things Right and Many Things Wrong"
  • Bart Preneel "Cryptographic Hash Functions: Theory and Practice"

LATINCRYPT

  • David Grawrock "Trusting your computing device"
  • Amit Sahai "Rethinking Encryption"
  • Orr Dunkelman "The Hitchhiker's Guide to the SHA-3 Competition"
  • Eike Kiltz "A brief history of OAEP and its roller-coaster ride"

ACISP

  • Stephan Overbeek "Precious"
  • Craig Gentry "How the cloud can process data without seeing it"

SAC

  • Alexandra Boldyreva "Search on Encrypted Data in the Symmetric-Key Setting"
  • Keith Martin "The Rise and Fall and Rise of Combinatorial Key Predistribution"

PAIRING

  • Jens Groth "Pairing-Based Non-Interactive Zero-Knowledge Proofs"
  • Joseph H. Silverman "A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties"
  • Gene Tsudik "Some Security Topics with Possible Applications for Pairing-Based Cryptography"

AFRICACRYPT

  • Gideon Kühn "Two Locally Designed Ciphers: Protex and Keeloq"
  • Mitsuru Matsui "Linear Cryptanalysis: History and recent topics"
  • Kenny Paterson "SSH: A Case Study of Cryptography in Theory and Practice"

2009[edit]

CRYPTO

  • Ed Felton "Alice and Bob go to Washington: A Cryptographic Theory of Politics and Policy"
  • Ueli Maurer "Abstraction in Cryptography"

EUROCRYPT

  • Shafi Goldwasser "Cryptography without (Hardly any) Secrets?"
  • Phil Rogaway "Practice-Oriented Provable-Security and the Social Construction of Cryptography"

ASIACRYPT

  • Tatsuaki Okamoto (IACR Distinguished Lecturer) "A New Approach on Bilinear Pairings and Its Applications"

TCC

  • Chris Peikert "Some Recent Progress in Lattice-Based Cryptography"
  • Cynthia Dwork "The Differential Privacy Frontier"

PKC

  • Anna Lysyanskaya "From Signatures to Anonymous Credentials and Anonymous Delegation"
  • Amit Sahai "A New Paradigm for Secure Protocols"

FSE

  • Shay Gueron "Intel's New AES Instructions for Enhanced Performance and Security"
  • Matt Robshaw "Looking back at the eSTREAM Project "

CHES

  • Srini Devadas "Physical Unclonable Functions and Secure Processors"
  • Christof Paar "Crypto Engineering: Some History and Some Case Studies"
  • Randy Torrance "The State-of-the-Art in IC Reverse Engineering"

IMA Cryptography and Coding

  • Ronald Cramer "Torsion-Limits for Towers of Algebraic Function Fields and Special Codes in Secure Computation and Complexity"
  • Frank R. Kschischang "Subspace Codes"
  • Alexander Pott "(Almost) perfect nonlinear functions in cryptography and geometry"

INDOCRYPT

  • Daniel J. Bernstein "Breaking ECC2K-130"
  • Marc Girault "Cryptography and Elliptic Curves : a 25 year love (?) Story"
  • Thomas Johansson "Coding Theory as a Tool in Cryptography"

PAIRING

  • Victor S. Miller
  • Amit Sahai
  • Tanja Lange "Efficient Implementation of Pairings"

2008[edit]

CRYPTO

  • Adi Shamir "How to Solve it: New Techniques in Algebraic Cryptanalysis"
  • Ron Rivest "The MD6 Hash Function"
  • Gilles Brassard (IACR Distinguished Lecturer) "Vingt-cinq ans apres, with apologies to Alexandre Dumas"

EUROCRYPT

  • Andy Clark "From Gamekeeping to Poaching - Information Forensics and Associated Challenges"
  • Clifford Cocks "The Growth and Development of Public Key Cryptography"

ASIACRYPT

  • John Cannon "Computer Algebra and Cryptography"
  • Andy Yao "Some Perspectives on Complexity-Based Cryptography"

FSE

PKC

  • Victor Shoup "The Role of Discrete Logarithms in Designing Secure CryptoSystems"
  • David Naccache "Cryptographic Test Correction"
  • Jean-Jacques Quisquater "How to Secretly Extract Hidden Secret Keys: A State of the Attacks"

CHES

  • Ernie Brickell "A Vision for Platform Security"
  • Adi Shamir "RSA - Past, Present, Future"

INDOCRYPT

  • Josef Pieprzyk "Multi-Party Computations via Graph Coloring"
  • Palash Sarkar "Modes of Operations for Wide-Block Encryption"
  • Tanja Lange "Post-Quantum Cryptography"

SAC

PAIRING

  • Xavier Boyen "The Uber-Assumption Family: A Unified Complexity Framework for Bilinear Groups"
  • Florian Hess "Pairing Lattices"
  • Nigel Smart "Pairings In Trusted Computing"

2007[edit]

CRYPTO

  • Ross J. Anderson "Information Security Economics -- and Beyond"
  • Paul Kocher "Leaking Secrets: Exploring the Chasm Between Strong Algorithms and Strong Systems"

EUROCRYPT

  • Victor S. Miller "Elliptic Curves and Cryptography: Invention and Impact"
  • Jacques Stern (IACR Distinguished Lecturer) "Cryptography from A to Z"

PKC

  • Rafail Ostrovsky "Single Server PIR and its applications"

FSE

  • Jean-Charles Faugere "Groebner bases. Applications in cryptology"

ASIACRYPT

  • Ran Canetti "Obtaining Universally Composable Security: Towards the Bare Bones of Trust"
  • Tatsuaki Okamoto "Authenticated Key Exchange and Key Encapsulation in the Standard Model"

IMA Cryptography and Coding

  • Whitfield Diffie "Directions in Signals Intelligence"
  • Jonathan Katz "Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise"
  • Patrick Solé "Galois Rings and Pseudo-random Sequences"

PAIRING

  • Dan Boneh "Bilinear Groups of Composite Order"
  • Steven Galbraith "Hyperelliptic Pairings"
  • Alfred Menezes "Supersingular Elliptic Curves in Cryptography"
  • Takakazu Satoh "On Pairing Inversion Problems"
  • Michael Scott "Implementing Cryptographic Pairings"

2006[edit]

CRYPTO

  • Oded Regev "Lattice-Based Cryptography"
  • David A. Wagner "Cryptographic Protocols for Electronic Voting"

EUROCRYPT

  • David Naccache "Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt"
  • Kevin McCurley "Language Modeling and Encryption on Packet Switched Networks"

ASIACRYPT

  • Adi Shamir "Random Graphs in Cryptography"
  • Ivan Damgård (IACR Distinguished Lecturer) "The Past, Present and Future of Multiparty Computation"

FSE

  • Eli Biham "How to Make a Difference: Early History of Differential Cryptanalysis"

INDOCRYPT

2005[edit]

CRYPTO

  • Dan Boneh "Bilinear Maps in Cryptography"
  • Ralph Merkle (IACR Distinguished Lecturer) "The Development of Public Key Cryptography: a Personal View; and Thoughts on Nanotechnology"

EUROCRYPT

  • Joe Kilian "Confusion, Quagmire and Irrelevancy: An Optimist's View of the Future of Cryptographic Research"
  • René Schoof "Counting points on elliptic curves: past, present and future"

ASIACRYPT

FSE

  • Xuejia Lai "Attacks and Protection of Hash Functions"

IMA Cryptography and Coding

  • Tuvi Etzion "Correction of two-dimensional cluster errors"
  • Ueli Maurer "Abstract models of computation in cryptography"
  • Alfred Menezes "Pairing-based cryptography at high security levels"
  • Amin Shokrollahi "Improved decoding of interleaved AG codes"

2004[edit]

CRYPTO

  • Victor Shoup "A survey on chosen ciphertext security in public-key encryption" (exact title unknown)
  • Susan Landau "Security, Liberty, and Electronic Communications"

EUROCRYPT

  • Whitfield Diffie (IACR Distinguished Lecturer) "Information Security at 100: Looking Back -- Looking Forward"
  • Ivan Damgård "Paradigms for Multiparty Computation"

ASIACRYPT

  • Adi Shamir "Stream Ciphers: Dead or Alive?"
  • Ho-Ick Suk "Information Security in Korea IT839 Strategy"

FSE

  • Adi Shamir "New Cryptographic Primitives Based on Multiword T-functions"
  • David A. Wagner "Towards a unifying view of block cipher cryptanalysis"

2003[edit]

CRYPTO

  • Moni Naor "Cryptographic Assumptions and Challenges"
  • Hugo Krawczyk "The Cryptography of the IPSec and IKE Protocols"

EUROCRYPT

  • Arkadiusz Orlowski and Kris Gaj "Facts and Myths of Enigma: Breaking Stereotypes"
  • Jacques Stern "Why Provable Security Matters?"

ASIACRYPT

  • Don Coppersmith (IACR Distinguished Lecturer) "Solving low degree polynomials"
  • Adi Shamir "Cryptography: State of the Science"
  • Hong-Sen Yan "The Secret and Beauty of Ancient Chinese Locks"

FSE

2002[edit]

CRYPTO

  • David Chaum (IACR Distinguished Lecturer) "Privacy Technology: A survey of security without identification"
  • Andrew Yao "New Directions in Quantum Cryptographic Protocols"

EUROCRYPT

  • Joan Daemen and Vincent Rijmen "AES and the wide trail design strategy"
  • Stephen Kent "Rethinking PKI: What's Trust Got to do with It?"

ASIACRYPT

  • Moti Yung "Crypto-integrity"
  • Tsutomu Matsumoto "Gummy and Conductive Silicone Rubber Fingers"

2001[edit]

CRYPTO

  • Mark Sherwin "Quantum information processing in semiconductors: an experimentalist's view"
  • Daniel Weitzner "Privacy, Authentication & Identity: A recent history of cryptographic struggles for freedom"

EUROCRYPT

ASIACRYPT

  • Arjen Lenstra "Unbelievable Security (Matching AES Security Using Public Key Systems)"

FSE

  • Bart Preneel "NESSIE: A European Approach to Evaluate Cryptographic Algorithms"

2000[edit]

CRYPTO

  • Martin Abadi "Taming the Adversary"
  • Don Coppersmith "The Development of DES"

EUROCRYPT

  • Mike Walker "On the Security of 3GPP Networks"
  • Tony Sale "Colossus and the German Lorenz Cipher"

ASIACRYPT

  • Tom Berson (IACR Distinguished Lecturer) "Cryptography Everywhere"

1999[edit]

CRYPTO

1998[edit]

CRYPTO

ASIACRYPT

  • Burton S. Kaliski Jr. "ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families"

1997[edit]

CRYPTO

EUROCRYPT