List of invited speakers at cryptology conferences

This is a list of invited speakers at selected cryptography conferences.

2018

EUROCRYPT

  • Anne Canteaut "Desperately Seeking Sboxes"
  • Matthew Green "Thirty Years of Digital Currency: From DigiCash to the Blockchain"

PKC

  • Hugo Krawczyk "Oblivious Pseudo-Random Functions and Their Applications to Password Protocols"
  • Elette Boyle "How (and Why) to Compute on Secret-Shared Values"

2017

CRYPTO

  • John Martinis "Prospects for a Quantum Factoring Machine"
  • Cedric Fournet "Deploying cryptographically-verified components for the HTTPS ecosystem"

EUROCRYPT

  • Gilles Barthe "Advances in computer-aided cryptography"
  • Nigel Smart "Living Between the Ideal and Real Worlds"

ASIACRYPT

  • Dustin Moody "The ship has sailed: the NIST Post-Quantum Cryptography `competition'"
  • Huaxiong Wang "Combinatorics in Information-Theoretic Cryptography"
  • Pascal Paillier "White-box Cryptomania"

PKC

  • Vipul Goyal "Recent Advances in Non-Malleable Cryptography"
  • Kenny Paterson "The Evolution of Public Key Cryptography in SSL/TLS"

TCC

  • Chris Peikert and Alon Rosen "To Cyclicity and Beyond!"
  • Cynthia Dwork "Theory for Society: Fairness in Classification"

CHES

  • Shih-Lien Lu "HW security: A Foundry Perspective"

INDOCRYPT

  • Elette Boyle "Recent Advances in Function & Homomorphic Secret Sharing"
  • Tancrède Lepoint "Post-Quantum Cryptography using Module Lattices"
  • Saikat Datta

PQCRYPTO

  • Jaya Baloo "EU Quantum Flagship"
  • Vadim Lyubashevsky "Standardizing Lattice Crypto and Beyond"
  • Lieven Vandersypen "A `spins-inside' quantum computer"

AFRICACRYPT

  • Johannes Buchmann "Cryptographic Long-Term Protection?"
  • Luca De Feo "A Review of Isogeny-Based Cryptography"
  • Damien Stehlé "The Learning with Errors Problem: From Lattices to Cryptography"

2016

CRYPTO

  • Brian Sniffen "Crypto at Scale"
  • Paul Kocher "Obvious in Hindsight: From Side Channel Attacks to the Security Challenges Ahead"

EUROCRYPT

  • Karthikeyan Bhargavan "Protecting Transport Layer Security from Legacy Vulnerabilities"
  • Bart Preneel (IACR Distinguished Lecture) "The Future of Cryptography"
  • Christian Collberg "Engineering Code Obfuscation"

ASIACRYPT

  • Nadia Heninger "The reality of cryptographic deployments on the internet"
  • Hoeteck Wee "Advances in functional encryption"
  • Neal Koblitz "Cryptography in Vietnam in the French and American wars"

INDOCRYPT

  • Francois-Xavier Standaert "Leakage-Resilient Symmetric Cryptography"
  • Claudio Orlandi "Fast Zero-Knowledge from Secure Computation"
  • Tetsu Iwata "Breaking and Repairing Security Proofs of Authenticated Encryption Schemes"

AFRICACRYPT

  • Tatsuaki Okamoto "A New Methodology for Constructing Functional Encryption"
  • Vinod Vaikuntanathan "Computing on Encrypted Data"

TCC 2016-A

  • Kobbi Nissim "Differential Privacy: Ten Years of Making Noise"
  • Yael Tauman Kalai "Cryptographic Assumptions: A Position Paper"
  • Yevgeniy Dodis "Non-Malleable Codes"

TCC 2016-B

  • Allison Bishop "Through the Looking Glass: What Cryptography Should Do for Alice"
  • Srini Devadas "Secure Hardware and Cryptography: Contrasts, Challenges and Opportunities"
  • Ueli Maurer: "From Indifferentiability to Constructive Cryptography (and Back)"

FSE

  • Henri Gilbert "On White-Box Cryptography"
  • Ross Anderson "Low entropy crypto"

PKC

  • Vinod Vaikuntanathan "The Many Faces of Garbled Circuits"
  • Vadim Lyubashevsky "Future Directions in Lattice Cryptography"
  • Daniel J. Bernstein "The first 10 years of Curve25519"

PQCrypto

  • Daniel Bernstein "The Post-Quantum Internet"
  • Masahide Sasaki "Quantum Key Distribution Platform and Its Applications"
  • Ernie Brickell "The Intel Strategy for Post Quantum Cryptography"
  • Steven Galbraith "Challenges for Lattice Cryptography"

2015

CRYPTO

  • Shai Halevi "The state of cryptographic multilinear maps"
  • Edward Felten "Cryptography, Security, and Public Safety: A Policy Perspective"

EUROCRYPT

  • Tal Rabin "A Privacy Research Roadmap for a National Privacy Research Strategy"
  • Kristin Lauter "Practical Applications of Homomorphic Encryption"
  • Vincent Rijmen "Threshold Implementations"

ASIACRYPT

  • Phillip Rogaway (IACR Distinguished Lecture) "The Moral Character of Cryptographic Work"
  • Masayuki Abe "Structure-Preserving Cryptography"
  • Gilles Barthe "Computer-Aided Cryptography: Status and Perspectives"

INDOCRYPT

  • Alon Rosen "On the cryptographic hardness of finding a Nash equilibrium"
  • Itai Dinur "The power of linear algebra: Breaking block ciphers using linearization"
  • Seny Kamara "Encrypted search: Theory, practice and cryptanalysis"
  • Palash Sarkar "Another look at normal approximations in cryptanalysis"
  • Sanjam Garg "New advances in program obfuscation"

PKC

  • Antoine Joux "Recent Advances in Algorithms for Computing Discrete Logarithms"
  • Sanjam Garg "New Advances in Obfuscation and its Applications"

TCC

  • John P. Steinberger "Block Ciphers: From Practice back to Theory"
  • Leonid Reyzin "Wyner's Wire-Tap Channel, Forty Years Later"

LATINCRYPT

  • Tal Rabin "A Fair Journey"
  • Adi Shamir: "Improved Attacks on Generic Block Ciphers"
  • Jung Hee Cheon "Cryptanalysis of multilinear maps over the integers"
  • Yuriy Bulygin "ASN.1 parsing in crypto libraries: what could go wrong?"

CT-RSA

  • Panel: Bart Preneel, Adi Shamir, Hugo Krawczyk, Nigel Smart, Paul Kocher "Post-Snowden Cryptography"

SAC

  • Paul Syverson "Trust Aware Traffic Security"
  • Gaëtan Leurent "Generic Attacks against MAC Algorithms"

ACISP

  • Colin Boyd "How cryptography politics influences cryptography research"
  • Simon Pope "Security in the wild - challenges and opportunities of helping to protect millions of customers"
  • Jason Smith "Partnership for cyber resilience"

ACNS

  • Vitaly Shmatikov "All Your SSL Are Belong To Us"
  • Matthew D. Green "From strong mathematics to weak cryptography"

IMA Cryptography and Coding

  • Sihem Mesnager "Bent functions and their connections to coding theory and cryptography"
  • Alexander May "Recent advances in decoding binary linear codes and their implication for cryptography"
  • Allison Bishop "Steps towards a unified coding theory for distributed algorithms"
  • Daniel Wichs "Tamper detection and non-malleable codes"

2014

CRYPTO

  • Mihir Bellare (IACR Distinguished Lecture) "Caught Between Theory, Practice and Peer Review"
  • Yael Tauman Kalai "How to Delegate Computations: The Power of No-Signalling Proofs"

EUROCRYPT

  • Jeff Hoffstein "A mathematical history of NTRU and some related cryptosystems"
  • Adi Shamir "The Security and Privacy of Bitcoin"

ASIACRYPT

  • Kenneth G. Paterson "Big bias hunting in Amazonia: Large-scale computation and exploitation of RC4 biases"
  • Helaine Leggat "The legal infrastructure around information security in Asia"

PKC

  • Adi Shamir "Post-Snowden Cryptography"
  • Shai Halevi "Multilinear Maps and Obfuscation"

CHES

  • André Weimerskirch "V2V Communication Security: a privacy-preserving design for 300 million vehicles"

TCC

  • Silvio Micali "Collusion and Privacy in Mechanism Design"
  • Russell Impagliazzo "General Versus Specific Hardness Assumptions in Cryptography"

FSE

  • Thomas Johansson "Low weight polynomials and crypto"
  • Thomas Ristenpart "New Encryption Primitives for Uncertain Times"

CT-RSA

  • Antoine Joux "Discrete logarithms: Recent progress (and open problems)"

SCN

  • Sanjam Garg "Program Obfuscation via Multilinear Maps"
  • Hoeteck Wee "Functional Encryption and its Impact on Cryptography"
  • Dario Catalano "Homomorphic Signatures and Message Authentication Codes"

SAC

  • Nigel Smart "Practical Multi-Party Computation"
  • Alfred Menezes "Scott Vanstone and the Early Years of Elliptic Curve Cryptography"
  • Pierrick Gaudry "NFS: similarities and differences between integer factorization and discrete logarithm"

ACISP

  • Tatsuaki Okamoto "Oblivious Functional Search"
  • Giuseppe Ateniese "Cloud Storage in the Bitcoin Era"

AFRICACRYPT

  • Antoine Joux "Recent advances on the discrete logarithm problem in finite fields"
  • Philippe Gaborit "New results for rank-based cryptography"

INDOCRYPT

  • Maria Naya-Plasencia "On Lightweight Block Ciphers and Their Security"
  • Willi Meier "Stream Ciphers, a Perspective"
  • Phillip Rogaway "Advances in Authenticated Encryption"

2013

CRYPTO

  • Cindy Cohn "Crypto Wars Part 2 Have Begun"
  • Adam Langley "Why the web still runs on RC4" (joint talk with CHES)

EUROCRYPT

  • Eli Biham (IACR Distinguished Lecture) "How to Make a Difference: 25 Years of Differential Cryptanalysis"
  • Guido Bertoni, Joan Daemen and Gilles Van Assche (joint presentation) "Keccak"

ASIACRYPT

  • George Danezis "Engineering Privacy-Friendly Computations"
  • Lars R. Knudsen "Block ciphers - past and present"

PKC

  • Brent Waters "Functional Encryption: Origins and Recent Developments"
  • Yehuda Lindell "Techniques for Efficient Secure Computation Based on Yao's Protocol"

CT-RSA

  • Nadia Heninger "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices"
  • John Kelsey "SHA3 and the Future of Hashing"

TCC

  • Craig Gentry "Encrypted Messages from the Heights of Cryptomania"
  • Tal Malkin "Secure Computation for Big Data"
  • Benny Applebaum "Cryptographic Hardness of Random Local Functions -- Survey"

FSE

  • Serge Vaudenay "Towards Secure Distance Bounding"
  • Daniel Bernstein "Failures of secret-key cryptography"

CHES

  • Adam Langley "Why the web still runs on RC4" (joint talk with CRYPTO)
  • John Kelsey "The Future of SHA-3"

INDOCRYPT

  • Tatsuaki Okamoto "Functional Encryption on the Decisional Linear Assumption"
  • Kaisa Nyberg "Linear Cryptanalysis and Its Extensions"
  • Kenny Paterson "Cryptographic Aspects of TLS"

AFRICACRYPT

  • Martin Schläffer "New trends in the cryptanalysis of hash functions"

ACISP

  • Paul Ashley "Trends in Advanced Threat Protection"
  • Xavier Boyen "Excessive Cryptography: Lattice Perspectives"
  • Bradley Schatz "Current and future challenges in digital forensics"
  • Yuliang Zheng "Public Key Cryptography for Mobile Cloud"

SAC

  • Paulo S. L. M. Barreto "The realm of the pairings"
  • Anne Canteaut "Similarities between encryption and decryption: how far can we go?"
  • Antoine Joux "Revisiting discrete logarithms in small/medium characteristic finite fields"
  • Douglas R. Stinson "Key distribution in wireless sensor networks"
  • Hugh C. Williams "The Tutte Institute for Mathematics and Computing"

PAIRING

  • Pierrick Gaudry "Computing discrete logarithms in finite fields of small characteristic"
  • Francisco Rodriguez-Henriquez "Implementing pairing-based protocols"
  • Xu Maozhi

2012

CRYPTO

  • Jonathan Zittrain "The End of Crypto"
  • Ernie Brickell "Recent Advances and Existing Research Questions in Platform Security"

EUROCRYPT

  • Antoine Joux "A Tutorial on High Performance Computing applied to Cryptanalysis"
  • Alfred Menezes "Another Look at Provable Security"

ASIACRYPT

  • Dan Boneh (IACR Distinguished Lecture) "Pairing-based Cryptography: Past, Present, and Future"
  • Chuanming Zong "Some Mathematical Mysteries in Lattices"

PKC

  • David Pointcheval "Password-Based Authenticated Key Exchange"

TCC

  • Jens Groth "Non-Interactive Zero-Knowledge"
  • Sergey Yekhanin "Locally Decodable Codes"

CHES

  • Steven Murdoch "Banking security: attacks and defences"
  • Christof Tarnovsky "(In)security of commonly found smart cards"

FSE

  • Kaisa Nyberg ""Provable" security against differential and linear cryptanalysis"
  • Mitsuru Matsui "The history of linear cryptanalysis"

ACISP

  • Mihir Bellare "A Cryptographic Treatment of the Wiretap Channel"
  • Jorge Munilla "Operating Principles of RFID Systems and Attacks Related to the Location"

INDOCRYPT

  • Orr Dunkelman "From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems"
  • Nigel Smart "Using the Cloud to Determine Key Strengths"
  • Vinod Vaikuntanathan "How to Compute on Encrypted Data"

LATINCRYPT

  • Manoj M. Prabhakaran "A Theory of Cryptographic Complexity"
  • Victor Miller "Elliptic Curves and Cryptography: a 27 year perspective"
  • Gregor Leander "Past and Future of Lightweight Cryptography"
  • Zvika Brakerski "Fully Homomorphic Encryption: The Swiss-Army Knife of Cryptography"

AFRICACRYPT

  • Willi Meier "Stream Ciphers, a Perspective"
  • Craig Gentry "Fully Homomorphic Encryption: Current State of the Art"
  • Marc Fischlin "Black-Box Reductions and Separations in Cryptography"

SAC

  • Vincent Rijmen "Extracts from the SHA-3 competition"
  • Ian Goldberg "Privacy Enhancing Technologies for the Internet"

PAIRING

  • Jean-Luc Beuchat "Hardware Architectures for the Cryptographic Tate Pairing"
  • Jung-Hee Cheon "Discrete Logarithm in Pairing Groups"
  • Dennis Hofheinz "Structure-preserving cryptography"
  • Hovav Shacham "Alternative Structure for Bilinear Groups"

2011

CRYPTO

  • Ron Rivest (IACR Distinguished Lecture) "Illegitimi Non Carborundum"
  • Roger Dingledine "Tor and Circumvention: Lessons Learned"

EUROCRYPT

  • Phong Nguyen "Lattice Reduction Algorithms: Theory and Practice"
  • Ronald Cramer "The Arithmetic Codex: Theory and Applications"

ASIACRYPT

  • Joan Daemen "15 years of Rijndael"
  • Úlfar Erlingsson "Secure Cloud Computing Services"

PKC

  • Vinod Vaikuntanathan "New Developments in Leakage-Resilient Cryptography"

TCC

  • Luca Trevisan "Dense Model Theorems and Their Applications"
  • Rafael Pass "Concurrent Security and Non-Malleability"

CHES

  • Ernie Brickell "Technologies to Improve Platform Security"
  • Tetsuya Tominaga "Standardization Works for Security regarding the Electromagnetic Environment"

FSE

  • Ivan Damgård "The past, present and future of hash functions – a rehash of some old and new results"
  • Willy Meier "Fast correlation attacks: Methods and countermeasures"

INDOCRYPT

  • Christof Paar: The Yin and Yang Sides of Embedded Security
  • Ross J. Anderson: Cryptology: where is the new frontier?
  • Eric Rescorla: Stone Knives and Bear Skins: Why does the Internet run on pre-historic cryptography?

AFRICACRYPT

  • Bart Preneel "The NIST SHA-3 Competition: A Perspective on the Final Year"
  • Tatsuaki Okamoto "Some Key Techniques on Pairing Vector Spaces"
  • Jens Groth "Efficient Zero-Knowledge Proofs"

ACISP

  • Claude Carlet "On Known and New Differentially Uniform Functions"
  • Nick Ellsmore "The Cyber-Security Landscape, 2011-2015, and the Need to Innovate"

SAC

  • Alfred Menezes "Another Look at Tightness"
  • Kristin Lauter "Cryptographic Techniques for Securing the Cloud"

IMA Cryptography and Coding

  • Ivan Damgård "Using unconditionally secure authentication in multiparty computation with dishonest majority"
  • Paddy Farrell "Non-Statistical Soft-in, Soft-out Decoding with the Euclidean Metric"
  • Jonathan Jedwab "Emerging methods in the analysis of aperiodic autocorrelations"
  • David Naccache "Can a Program Reverse-Engineer Itself?"

2010

CRYPTO

EUROCRYPT

  • Moti Yung (IACR Distinguished Lecturer) "Cryptography between Wonderland and Underland"

TCC

  • Jan Camenisch "Privacy-Enhancing Cryptography: From Theory Into Practice"
  • Yuval Ishai "Secure Computation and Its Diverse Applications"

ASIACRYPT

  • Bart Preneel "Cryptographic Hash Functions and the SHA-3 Competition"
  • Hugo Krawczyk "Cryptography, from Theory to Practice: A Personal Perspective"

CHES

  • Ivan Damgård and David Naccache "Is Theoretical Cryptography Any Good in Practice?" (Joint with CRYPTO)
  • Hovav Shacham "Cars and Voting Machines: Embedded Systems in the Field"

PKC

  • Jacques Stern "Mathematics, Cryptography, Security"
  • Daniele Micciancio "Duality in Lattice Based Cryptography"

FSE

  • Xiaoyun Wang "The Survey of Cryptanalysis on Hash Functions"
  • Thomas Shrimpton "A Provable-Security Perspective on the Development of Hash Functions"

INDOCRYPT

  • Neal Koblitz "Getting a Few Things Right and Many Things Wrong"
  • Bart Preneel "Cryptographic Hash Functions: Theory and Practice"

LATINCRYPT

  • David Grawrock "Trusting your computing device"
  • Amit Sahai "Rethinking Encryption"
  • Orr Dunkelman "The Hitchhiker's Guide to the SHA-3 Competition"
  • Eike Kiltz "A brief history of OAEP and its roller-coaster ride"

ACISP

  • Stephan Overbeek "Precious"
  • Craig Gentry "How the cloud can process data without seeing it"

SAC

  • Alexandra Boldyreva "Search on Encrypted Data in the Symmetric-Key Setting"
  • Keith Martin "The Rise and Fall and Rise of Combinatorial Key Predistribution"

PAIRING

  • Jens Groth "Pairing-Based Non-Interactive Zero-Knowledge Proofs"
  • Joseph H. Silverman "A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties"
  • Gene Tsudik "Some Security Topics with Possible Applications for Pairing-Based Cryptography"

AFRICACRYPT

  • Gideon Kühn "Two Locally Designed Ciphers: Protex and Keeloq"
  • Mitsuru Matsui "Linear Cryptanalysis: History and recent topics"
  • Kenny Paterson "SSH: A Case Study of Cryptography in Theory and Practice"

2009

CRYPTO

  • Ed Felton "Alice and Bob go to Washington: A Cryptographic Theory of Politics and Policy"
  • Ueli Maurer "Abstraction in Cryptography"

EUROCRYPT

  • Shafi Goldwasser "Cryptography without (Hardly any) Secrets?"
  • Phil Rogaway "Practice-Oriented Provable-Security and the Social Construction of Cryptography"

ASIACRYPT

  • Tatsuaki Okamoto (IACR Distinguished Lecturer) "A New Approach on Bilinear Pairings and Its Applications"

TCC

  • Chris Peikert "Some Recent Progress in Lattice-Based Cryptography"
  • Cynthia Dwork "The Differential Privacy Frontier"

PKC

  • Anna Lysyanskaya "From Signatures to Anonymous Credentials and Anonymous Delegation"
  • Amit Sahai "A New Paradigm for Secure Protocols"

FSE

  • Shay Gueron "Intel's New AES Instructions for Enhanced Performance and Security"
  • Matt Robshaw "Looking back at the eSTREAM Project "

CHES

  • Srini Devadas "Physical Unclonable Functions and Secure Processors"
  • Christof Paar "Crypto Engineering: Some History and Some Case Studies"
  • Randy Torrance "The State-of-the-Art in IC Reverse Engineering"

IMA Cryptography and Coding

  • Ronald Cramer "Torsion-Limits for Towers of Algebraic Function Fields and Special Codes in Secure Computation and Complexity"
  • Frank R. Kschischang "Subspace Codes"
  • Alexander Pott "(Almost) perfect nonlinear functions in cryptography and geometry"

INDOCRYPT

  • Daniel J. Bernstein "Breaking ECC2K-130"
  • Marc Girault "Cryptography and Elliptic Curves : a 25 year love (?) Story"
  • Thomas Johansson "Coding Theory as a Tool in Cryptography"

PAIRING

2008

CRYPTO

  • Adi Shamir "How to Solve it: New Techniques in Algebraic Cryptanalysis"
  • Ron Rivest "The MD6 Hash Function"
  • Gilles Brassard (IACR Distinguished Lecturer) "Vingt-cinq ans apres, with apologies to Alexandre Dumas"

EUROCRYPT

  • Andy Clark "From Gamekeeping to Poaching - Information Forensics and Associated Challenges"
  • Clifford Cocks "The Growth and Development of Public Key Cryptography"

ASIACRYPT

  • John Cannon "Computer Algebra and Cryptography"
  • Andy Yao "Some Perspectives on Complexity-Based Cryptography"

FSE

PKC

  • Victor Shoup "The Role of Discrete Logarithms in Designing Secure CryptoSystems"
  • David Naccache "Cryptographic Test Correction"
  • Jean-Jacques Quisquater "How to Secretly Extract Hidden Secret Keys: A State of the Attacks"

CHES

  • Ernie Brickell "A Vision for Platform Security"
  • Adi Shamir "RSA - Past, Present, Future"

INDOCRYPT

  • Josef Pieprzyk "Multi-Party Computations via Graph Coloring"
  • Palash Sarkar "Modes of Operations for Wide-Block Encryption"
  • Tanja Lange "Post-Quantum Cryptography"

SAC

PAIRING

  • Xavier Boyen "The Uber-Assumption Family: A Unified Complexity Framework for Bilinear Groups"
  • Florian Hess "Pairing Lattices"
  • Nigel Smart "Pairings In Trusted Computing"

2007

CRYPTO

  • Ross J. Anderson "Information Security Economics -- and Beyond"
  • Paul Kocher "Leaking Secrets: Exploring the Chasm Between Strong Algorithms and Strong Systems"

EUROCRYPT

PKC

  • Rafail Ostrovsky "Single Server PIR and its applications"

FSE

ASIACRYPT

  • Ran Canetti "Obtaining Universally Composable Security: Towards the Bare Bones of Trust"
  • Tatsuaki Okamoto "Authenticated Key Exchange and Key Encapsulation in the Standard Model"

IMA Cryptography and Coding

  • Whitfield Diffie "Directions in Signals Intelligence"
  • Jonathan Katz "Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise"
  • Patrick Solé "Galois Rings and Pseudo-random Sequences"

PAIRING

  • Dan Boneh "Bilinear Groups of Composite Order"
  • Steven Galbraith "Hyperelliptic Pairings"
  • Alfred Menezes "Supersingular Elliptic Curves in Cryptography"
  • Takakazu Satoh "On Pairing Inversion Problems"
  • Michael Scott "Implementing Cryptographic Pairings"

2006

CRYPTO

  • Oded Regev "Lattice-Based Cryptography"
  • David A. Wagner "Cryptographic Protocols for Electronic Voting"

EUROCRYPT

  • David Naccache "Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt"
  • Kevin McCurley "Language Modeling and Encryption on Packet Switched Networks"

ASIACRYPT

  • Adi Shamir "Random Graphs in Cryptography"
  • Ivan Damgård (IACR Distinguished Lecturer) "The Past, Present and Future of Multiparty Computation"

FSE

  • Eli Biham "How to Make a Difference: Early History of Differential Cryptanalysis"

INDOCRYPT

2005

CRYPTO

  • Dan Boneh "Bilinear Maps in Cryptography"
  • Ralph Merkle (IACR Distinguished Lecturer) "The Development of Public Key Cryptography: a Personal View; and Thoughts on Nanotechnology"

EUROCRYPT

  • Joe Kilian "Confusion, Quagmire and Irrelevancy: An Optimist's View of the Future of Cryptographic Research"
  • René Schoof "Counting points on elliptic curves: past, present and future"

ASIACRYPT

FSE

  • Xuejia Lai "Attacks and Protection of Hash Functions"

IMA Cryptography and Coding

  • Tuvi Etzion "Correction of two-dimensional cluster errors"
  • Ueli Maurer "Abstract models of computation in cryptography"
  • Alfred Menezes "Pairing-based cryptography at high security levels"
  • Amin Shokrollahi "Improved decoding of interleaved AG codes"

2004

CRYPTO

  • Victor Shoup "A survey on chosen ciphertext security in public-key encryption" (exact title unknown)
  • Susan Landau "Security, Liberty, and Electronic Communications"

EUROCRYPT

  • Whitfield Diffie (IACR Distinguished Lecturer) "Information Security at 100: Looking Back -- Looking Forward"
  • Ivan Damgård "Paradigms for Multiparty Computation"

ASIACRYPT

  • Adi Shamir "Stream Ciphers: Dead or Alive?"
  • Ho-Ick Suk "Information Security in Korea IT839 Strategy"

FSE

  • Adi Shamir "New Cryptographic Primitives Based on Multiword T-functions"
  • David A. Wagner "Towards a unifying view of block cipher cryptanalysis"

2003

CRYPTO

  • Moni Naor "Cryptographic Assumptions and Challenges"
  • Hugo Krawczyk "The Cryptography of the IPSec and IKE Protocols"

EUROCRYPT

  • Arkadiusz Orlowski and Kris Gaj "Facts and Myths of Enigma: Breaking Stereotypes"
  • Jacques Stern "Why Provable Security Matters?"

ASIACRYPT

  • Don Coppersmith (IACR Distinguished Lecturer) "Solving low degree polynomials"
  • Adi Shamir "Cryptography: State of the Science"
  • Hong-Sen Yan "The Secret and Beauty of Ancient Chinese Locks"

FSE

2002

CRYPTO

  • David Chaum (IACR Distinguished Lecturer) "Privacy Technology: A survey of security without identification"
  • Andrew Yao "New Directions in Quantum Cryptographic Protocols"

EUROCRYPT

  • Joan Daemen and Vincent Rijmen "AES and the wide trail design strategy"
  • Stephen Kent "Rethinking PKI: What's Trust Got to do with It?"

ASIACRYPT

  • Moti Yung "Crypto-integrity"
  • Tsutomu Matsumoto "Gummy and Conductive Silicone Rubber Fingers"

2001

CRYPTO

  • Mark Sherwin "Quantum information processing in semiconductors: an experimentalist's view"
  • Daniel Weitzner "Privacy, Authentication & Identity: A recent history of cryptographic struggles for freedom"

EUROCRYPT

ASIACRYPT

  • Arjen Lenstra "Unbelievable Security (Matching AES Security Using Public Key Systems)"

FSE

  • Bart Preneel "NESSIE: A European Approach to Evaluate Cryptographic Algorithms"

2000

CRYPTO

  • Martin Abadi "Taming the Adversary"
  • Don Coppersmith "The Development of DES"

EUROCRYPT

  • Mike Walker "On the Security of 3GPP Networks"
  • Tony Sale "Colossus and the German Lorenz Cipher"

ASIACRYPT

  • Tom Berson (IACR Distinguished Lecturer) "Cryptography Everywhere"

INDOCRYPT

  • Eli Biham "On the Selection of the Advanced Encryption Standard"
  • Adi Shamir "Cryptographic Protocols and Their Complexities"

1999

CRYPTO

1998

CRYPTO

ASIACRYPT

  • Burton S. Kaliski Jr. "ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families"

1997

CRYPTO

EUROCRYPT

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.