Talks (most recent first):

  1. Side-channel attacks on public-key cryptosystems. Invited talk at "Kayaks & Dreadnoughts in a sea of crypto", Workshop on secure communications and computation for very small and very big IT systems, ULB, September 15-16, 2016, Bruxelles, Belgium.

  2. Side-channel attacks and countermeasures for Public-key cryptography: an overview. Invited talk at Lecture at Summer school on "Real-world crypto and privacy", June 1-5, 2016, Croatia.

  3. Physical attacks. Invited lecturer at IIT Kanpur, India, February, 2016.

  4. Side-channel analysis for embedded devices: challenges and pitfalls. Invited talk at Linkoping University, Sweden, October, 2015.

  5. Embedded security: a hardware-oriented overview. Invited talk at University of Padua, Italy, October, 2015.

  6. Game of metrics: How to evaluate SCA resistance at the design stage? Keynote at Cryptarchy workshop, Leuven, Belgium, July, 2016.

  7. Security and privacy in embedded systems. Invited talk at Deakin University, Australia, February 2015.

  8. Security and privacy in the Internet of things. Invited talk at University of Wollongong, Australia, February 2015.

  9. Designing S-boxes with improved side-channel resistance. Invited talk at Queensland University of Technology, Australia, December 2014.

  10. Near field privacy. Keynote at International Conference on Applications and Techniques in Information Security - ATIS, Melbourne, Australia, November 2014.

  11. Machine learning and evolutionary computation in side-channel cryptanalysis. Invited talk at Kaist, Korea, September, 2014.

  12. How light is lightweight crypto?, invited talk at Cyber Security center, University of Oxford, UK, March 2014.

  13. Machine learning and Evolutionary computation in side-channel cryptanalysis, invited talk at TU Graz, October 2013, Graz, Austria.

  14. How light is lightweight crypto?, invited talk at RFIDSec 13 , July 9-11, Graz, Austria.

  15. Near field privacy, invited talk at WISTP, May 28-30, 2013, Heraklion, Greece.

  16. Hardware implementations of public-key cryptography, COSIC course, June 3-6, 2013, Leuven, Belgium.

  17. Introduction to side-channel analysis, Ice Break 2013, summer school on symmetric cryptography, June 6-12, 2013, Iceland.

  18. Introduction to side-channel attacks, Summer school on Design and Security of Cryptographic Functions, Algorithms and Devices, July 1-5, 2013, Albena, Bulgaria. 

  19. Side-channel distinguishers, ECRYPT2 workshop on Physical attacks, November 27-28, 2012, Graz, Austria, talk given with Carolyn Whitnall.
  20. Challenges in lighweight cryptography, ECRYPT2 Summerschool: Challenges in security engineering, September 3-7, 2012, Bochum, Germany.
  21. Ligtweight cryptography. CrossFyre 2012 , 2nd workshop on Cryptography, Robustness and Provably Secure Schemes for Female Young Researchers, June 15-16, 2012, Eindhoven
  22. Lightweight cryptography: opportunities and challenges, National Taiwan University, March 27, 2012.
  23. Secure hardware and side-channel attacks, COSIC International Course on Computer Security and Cryptography , June 14-17, 2011, Leuven, Belgium.
  24. Introduction to implementation attacks, ECRYPT II School on Block Ciphers and Physical Security of Crypto Devices, May 29-June 3, 2011, Albena, Bulgaria
  25. MIA: state of affairs, Eipsi seminar, TU/e, Eindhoven, February 09, 2011.
  26. Wide-weak privacy-preserving RFID authentication protocols, International Conference on Mobile Lightweight Wireless Systems - MOBILIGHT, May 10-12, 2010, Barcelona, Spain.
  27. Low-cost untraceable authentication protocols for RFID, BCRYPT event on RFID security, Feb. 2, 2010, Leuven, Belgium. slides
  28. Security in embedded systems: PKC in embedded devices and side-channel attacks, CS Colloquium, Dec. 14, 2009, Nijmegen, The Netherlands.
  29. Differential cluster analysis, Crypto working group, Dec. 4, 2009, Utrecht, The Netherlands. slides
  30. Leight-weight implementation options for curve-based cryptography: HECC is also ready for RFID, The first international workshop on RFID Security and Cryptography RISC'09, November 10, 2009, London, UK.
  31. Privacy challenges in RFID systems, 20th Tyrrhenian International Workshop on Digital Communications - a CNIT Conference, September 2-4, 2009, - Pula, Sardinia, Italy.
  32. Secure hardware and side-channel attacks, International course on Computer Security and Cryptography (COSIC course) 2009, July 7-10, 2009, Leuven, Belgium.
  33. Challenges for RFID systems, Dagstuhl seminar on Foundations for Forgery-Resilient Cryptographic Hardware, July 5-8, 2009, Schloss Dagstuhl, Germany. slides
  34. Some recent advances in side-channel attacks, Istrice lunch, University of Twente, June 5, 2009, The Netherlands.
  35. Recent developments in side-channel attacks, Crypto Working Group, Feb. 20, 2009, Utrecht, The Netherlands.
  36. Implementation challenges for Public-key Cryptography, Workshop on Coding and Cryptography, May 19-20, Cork, Ireland.
  37. Pervasive security: Driver and Example of QoE, IBBT-QoE workshop, December 11, 2007, Gent. slides
  38. Secure hardware implementations for embedded systems, State of the Art and Evolution of Computer Security and Industrial Cryptography (COSIC course) 2007, July 10-13, 2007, Leuven.
  39. Compact implementations for RFID and sensor nodes, DATE 2007, Workshop on Secure Embedded Implementations, April 20, 2007, Nice, France. slides
  40. An Elliptic Curve Processor suitable for RFID tags, 1st Benelux Workshop on Information and System Security (WISSec 2006), November 8-9, 2006, Antwerpen, Belgium. slides
  41. Low-cost Elliptic Curve Cryptography for wireless sensor networks, Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2006), September 20-21, 2006, Hamburg. slides
  42. Secure hardware for cryptography, IPICS summer course, July 17-28, 2006, Leuven, Belgium. slides
  43. Small-footprint ALU for public-key processors for pervasive security, Workshop on RFID security, July 12-14, 2006, Graz, Austria. slides
  44. Flexible hardware architectures for curve-based cryptography, ISCAS, May 21-24, 2006, Island of Kos, Greece. slides
  45. Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051uP, CHES conference, Aug. 29-Sept. 01, 2005, Edinburgh, Scotland. slides
  46. Side-channel aware design: Algorithms and architectures for Elliptic Curve Cryptography over GF(2n), IEEE 16th International Conference on Application-specific Systems, Architectures and Processors ASAP 2005, July 23-25, 2005, Samos, Greece.
  47. Implementation issues for secure integrated circuits and FPGAs, Workshop on FPGAs as cryptographic platforms, CryptArchi, Dijon, France, June 2004.
  48. Flexible hardware design for RSA and ECC, Cryptographers Track of RSA conference, February 13-17, 2004, San Francisco. slides
  49. FPGA implementations and side-channel attacks on cryptographic algorithms, invited talk at REASON summer school on FPGA-based and Re-configurable Systems, Ljubljana, Slovenia, August, 2003. slides part Islides part II