Home CV Publications Activities
 




Selected Invited Talks
  1. Tweakable Blockciphers and Beyond Birthday Bound Security. Asian Workshop on Symmetric Key Cryptography 2018. Kolkata, India
  2. Beyond Birthday-Bound Security. COST Training School on Symmetric Cryptography and Blockchain 2018. Torremolinos, Spain
  3. Security of Authenticated Encryption Modes. COST Training School on Symmetric Cryptography and Blockchain 2018. Torremolinos, Spain
  4. Beyond Birthday-Bound Security. Summer School on Real-World Crypto and Privacy 2017. Šibenik, Croatia
  5. Introduction to Tweakable Blockciphers. Summer School on Real-World Crypto and Privacy 2017. Šibenik, Croatia
  6. Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption. Dagstuhl 2016. Wadern, Germany
  7. Tweakable Blockciphers: Theory and Application. IACR School on Design and Security of Cryptographic Algorithms and Devices 2015. Sardinia, Italy
  8. Introduction to Provable Security. IACR School on Design and Security of Cryptographic Algorithms and Devices 2015. Sardinia, Italy
Selected Conference Talks
  1. Leakage Resilience of the Duplex Construction. ASIACRYPT 2019. Kobe, Japan
  2. Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus.
    NIST Lightweight Cryptography Competition Workshop 2019. Gaithersburg, MD, USA (from 0:38:00)
  3. Leakage Resilience of the ISAP Mode: A Vulgarized Summary. NIST Lightweight Cryptography Competition Workshop 2019. Gaithersburg, MD, USA (from 5:09:00)
  4. Key Prediction Security of Keyed Sponges. FSE 2019. Paris, France
  5. Towards Tight Security of Cascaded LRW2. TCC 2018. Panaji, India
  6. Full-State Keyed Duplex With Built-In Multi-User Support. ASIACRYPT 2017. Hong Kong, China
  7. Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory. CRYPTO 2017. Santa Barbara, CA, USA
  8. Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. CRYPTO 2017. Santa Barbara, CA, USA
  9. XOR of PRPs in a Quantum World. Conference on Post-Quantum Cryptography, PQCrypto 2017. Utrecht, The Netherlands
  10. Security Analysis of BLAKE2's Modes of Operation. FSE 2017. Tokyo, Japan
  11. XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees. CRYPTO 2016. Santa Barbara, CA, USA
  12. On the Impact of Known-Key Attacks on Permutation-Based Hashing. ASIACRYPT 2015. Auckland, New Zealand
  13. On the XOR of Multiple Random Permutations. Applied Cryptography and Network Security, ACNS 2015. New York City, NY, USA
  14. Optimally Secure Tweakable Blockciphers. FSE 2015. Istanbul, Turkey
  15. Security of Keyed Sponge Constructions Using a Modular Proof Approach. FSE 2015. Istanbul, Turkey
  16. Breaking and Fixing Cryptophia's Short Combiner. Cryptology and Network Security, CANS 2014. Heraklion, Greece
  17. Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes. Directions in Authenticated Ciphers 2014. Santa Barbara, CA, USA
  18. Indifferentiability of Double Length Compression Functions. IMA Cryptography and Coding 2013. Oxford, UK
  19. Optimal Collision Security in Double Block Length Hashing with Single Length Key. ASIACRYPT 2012. Beijing, China
  20. Hash Functions Based on Three Permutations: A Generic Security Analysis. CRYPTO 2012. Santa Barbara, CA, USA
  21. Provable Security of BLAKE with Non-Ideal Compression Function. Selected Areas in Cryptography, SAC 2012. Windsor, Ontario, Canada
  22. Provable Chosen-Target-Forced-Midfix Preimage Resistance. Selected Areas in Cryptography, SAC 2011. Toronto, Ontario, Canada
  23. The Parazoa Family: Generalizing the Sponge Hash Functions. ECRYPT II Hash Workshop 2011. Tallinn, Estonia
  24. Anonymous Credential Schemes with Encrypted Attributes. Cryptology and Network Security, CANS 2010. Kuala Lumpur, Malaysia
  25. Security Reductions of the Second Round SHA-3 Candidates. Information Security Conference, ISC 2010. Boca Raton, FL, USA
  26. On the Indifferentiability of the GrÝstl Hash Function. Security and Cryptography for Networks, SCN 2010. Amalfi, Italy
  27. Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis (extended abstract). Financial Cryptography and Data Security, FC 2010. Tenerife, Spain
Program Committees
  • ASIACRYPT 2018, 2017, 2015
  • EUROCRYPT 2020, 2019, 2018, 2017
  • CHES 2020, 2019
  • FSE 2020, 2019, 2018, 2017, 2016
  • ACISP 2020
  • ACNS 2018
  • ArcticCrypt 2016
  • Euro S&P 2019
  • ICMC 2019, 2018
  • Indocrypt 2018
  • IWSEC 2018, 2017, 2016
  • ProvSec 2019, 2018, 2017, 2016
  • SAC 2019
  • SECITC 2017, 2016
Editorial Boards
  • TCHES 2020, 2019
  • ToSC 2020, 2019, 2018, 2017
  • ToSC special issue on NIST Lightweight Submissions
Organization
Teaching
Supervision


(top) Last modified: March 24, 2020