Home CV Publications Activities
 




Selected Invited Talks
  1. Tweakable Blockciphers and Beyond Birthday Bound Security. Asian Workshop on Symmetric Key Cryptography 2018. Kolkata, India
  2. Beyond Birthday-Bound Security. COST Training School on Symmetric Cryptography and Blockchain 2018. Torremolinos, Spain
  3. Security of Authenticated Encryption Modes. COST Training School on Symmetric Cryptography and Blockchain 2018. Torremolinos, Spain
  4. Beyond Birthday-Bound Security. Summer School on Real-World Crypto and Privacy 2017. Šibenik, Croatia
  5. Introduction to Tweakable Blockciphers. Summer School on Real-World Crypto and Privacy 2017. Šibenik, Croatia
  6. Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption. Dagstuhl 2016. Wadern, Germany
  7. Tweakable Blockciphers: Theory and Application. IACR School on Design and Security of Cryptographic Algorithms and Devices 2015. Sardinia, Italy
  8. Introduction to Provable Security. IACR School on Design and Security of Cryptographic Algorithms and Devices 2015. Sardinia, Italy
Selected Conference Talks
  1. Key Prediction Security of Keyed Sponges. FSE 2019. Paris, France
  2. Towards Tight Security of Cascaded LRW2. TCC 2018. Panaji, India
  3. Full-State Keyed Duplex With Built-In Multi-User Support. ASIACRYPT 2017. Hong Kong, China
  4. Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory. CRYPTO 2017. Santa Barbara, CA, USA
  5. Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. CRYPTO 2017. Santa Barbara, CA, USA
  6. XOR of PRPs in a Quantum World. Conference on Post-Quantum Cryptography, PQCrypto 2017. Utrecht, The Netherlands
  7. Security Analysis of BLAKE2's Modes of Operation. FSE 2017. Tokyo, Japan
  8. XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees. CRYPTO 2016. Santa Barbara, CA, USA
  9. On the Impact of Known-Key Attacks on Permutation-Based Hashing. ASIACRYPT 2015. Auckland, New Zealand
  10. On the XOR of Multiple Random Permutations. Applied Cryptography and Network Security, ACNS 2015. New York City, NY, USA
  11. Optimally Secure Tweakable Blockciphers. FSE 2015. Istanbul, Turkey
  12. Security of Keyed Sponge Constructions Using a Modular Proof Approach. FSE 2015. Istanbul, Turkey
  13. Breaking and Fixing Cryptophia's Short Combiner. Cryptology and Network Security, CANS 2014. Heraklion, Greece
  14. Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes. Directions in Authenticated Ciphers 2014. Santa Barbara, CA, USA
  15. Indifferentiability of Double Length Compression Functions. IMA Cryptography and Coding 2013. Oxford, UK
  16. Optimal Collision Security in Double Block Length Hashing with Single Length Key. ASIACRYPT 2012. Beijing, China
  17. Hash Functions Based on Three Permutations: A Generic Security Analysis. CRYPTO 2012. Santa Barbara, CA, USA
  18. Provable Security of BLAKE with Non-Ideal Compression Function. Selected Areas in Cryptography, SAC 2012. Windsor, Ontario, Canada
  19. Provable Chosen-Target-Forced-Midfix Preimage Resistance. Selected Areas in Cryptography, SAC 2011. Toronto, Ontario, Canada
  20. The Parazoa Family: Generalizing the Sponge Hash Functions. ECRYPT II Hash Workshop 2011. Tallinn, Estonia
  21. Anonymous Credential Schemes with Encrypted Attributes. Cryptology and Network Security, CANS 2010. Kuala Lumpur, Malaysia
  22. Security Reductions of the Second Round SHA-3 Candidates. Information Security Conference, ISC 2010. Boca Raton, FL, USA
  23. On the Indifferentiability of the GrÝstl Hash Function. Security and Cryptography for Networks, SCN 2010. Amalfi, Italy
  24. Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis (extended abstract). Financial Cryptography and Data Security, FC 2010. Tenerife, Spain
Program Committees
  • ASIACRYPT 2018, 2017, 2015
  • EUROCRYPT 2019, 2018, 2017
  • CHES 2019
  • FSE 2020, 2019, 2018, 2017, 2016
  • ACNS 2018
  • ArcticCrypt 2016
  • Euro S&P 2019
  • ICMC 2019, 2018
  • Indocrypt 2018
  • IWSEC 2018, 2017, 2016
  • ProvSec 2019, 2018, 2017, 2016
  • SAC 2019
  • SECITC 2017, 2016
Editorial Boards
  • ToSC 2020, 2019, 2018, 2017
Organization
Teaching
Supervision


(top) Last modified: April 19, 2019