Home CV Publications Activities PhD
 




Selected Invited Talks
  1. Security of Encryption Modes and an Exposition of Proof Techniques. Workshop on Coding and Cryptography 2024. Perugia, Italy
  2. Security of Permutation-Based Modes and Its Application to Ascon. NIST Lightweight Cryptography Competition Workshop 2023. Online (select Day2_Part1)
  3. Understanding the Duplex and Its Security. Permutation-Based Crypto 2023. Lyon, France
  4. Tweakable Blockciphers and Beyond Birthday Bound Security. Asian Workshop on Symmetric Key Cryptography 2018. Kolkata, India
  5. Beyond Birthday-Bound Security. COST Training School on Symmetric Cryptography and Blockchain 2018. Torremolinos, Spain
  6. Security of Authenticated Encryption Modes. COST Training School on Symmetric Cryptography and Blockchain 2018. Torremolinos, Spain
  7. Beyond Birthday-Bound Security. Summer School on Real-World Crypto and Privacy 2017. Šibenik, Croatia
  8. Introduction to Tweakable Blockciphers. Summer School on Real-World Crypto and Privacy 2017. Šibenik, Croatia
  9. Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption. Dagstuhl 2016. Wadern, Germany
  10. Tweakable Blockciphers: Theory and Application. IACR School on Design and Security of Cryptographic Algorithms and Devices 2015. Sardinia, Italy
  11. Introduction to Provable Security. IACR School on Design and Security of Cryptographic Algorithms and Devices 2015. Sardinia, Italy
Selected Conference Talks
  1. Deck-Based Wide Block Cipher Modes. NIST Workshop on Block Cipher Modes of Operation 2023. Gaithersburg, MD, USA (from 2:57:00)
  2. Leakage Resilient Value Comparison With Application to Message Authentication. EUROCRYPT 2021. Virtual
  3. Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption. ASIACRYPT 2020. Virtual
  4. Security of the Suffix Keyed Sponge. FSE 2020. Virtual
  5. Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus FSE 2020. Virtual
  6. Leakage Resilience of the Duplex Construction. ASIACRYPT 2019. Kobe, Japan
  7. Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus. NIST Lightweight Cryptography Competition Workshop 2019. Gaithersburg, MD, USA (from 0:38:00)
  8. Leakage Resilience of the ISAP Mode: A Vulgarized Summary. NIST Lightweight Cryptography Competition Workshop 2019. Gaithersburg, MD, USA (from 5:09:00)
  9. Key Prediction Security of Keyed Sponges. FSE 2019. Paris, France
  10. Towards Tight Security of Cascaded LRW2. TCC 2018. Panaji, India
  11. Full-State Keyed Duplex With Built-In Multi-User Support. ASIACRYPT 2017. Hong Kong, China
  12. Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory. CRYPTO 2017. Santa Barbara, CA, USA
  13. Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. CRYPTO 2017. Santa Barbara, CA, USA
  14. XOR of PRPs in a Quantum World. Conference on Post-Quantum Cryptography, PQCrypto 2017. Utrecht, The Netherlands
  15. Security Analysis of BLAKE2's Modes of Operation. FSE 2017. Tokyo, Japan
  16. XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees. CRYPTO 2016. Santa Barbara, CA, USA
  17. On the Impact of Known-Key Attacks on Permutation-Based Hashing. ASIACRYPT 2015. Auckland, New Zealand
  18. On the XOR of Multiple Random Permutations. Applied Cryptography and Network Security, ACNS 2015. New York City, NY, USA
  19. Optimally Secure Tweakable Blockciphers. FSE 2015. Istanbul, Turkey
  20. Security of Keyed Sponge Constructions Using a Modular Proof Approach. FSE 2015. Istanbul, Turkey
  21. Breaking and Fixing Cryptophia's Short Combiner. Cryptology and Network Security, CANS 2014. Heraklion, Greece
  22. Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes. Directions in Authenticated Ciphers 2014. Santa Barbara, CA, USA
  23. Indifferentiability of Double Length Compression Functions. IMA Cryptography and Coding 2013. Oxford, UK
  24. Optimal Collision Security in Double Block Length Hashing with Single Length Key. ASIACRYPT 2012. Beijing, China
  25. Hash Functions Based on Three Permutations: A Generic Security Analysis. CRYPTO 2012. Santa Barbara, CA, USA
  26. Provable Security of BLAKE with Non-Ideal Compression Function. Selected Areas in Cryptography, SAC 2012. Windsor, Ontario, Canada
  27. Provable Chosen-Target-Forced-Midfix Preimage Resistance. Selected Areas in Cryptography, SAC 2011. Toronto, Ontario, Canada
  28. The Parazoa Family: Generalizing the Sponge Hash Functions. ECRYPT II Hash Workshop 2011. Tallinn, Estonia
  29. Anonymous Credential Schemes with Encrypted Attributes. Cryptology and Network Security, CANS 2010. Kuala Lumpur, Malaysia
  30. Security Reductions of the Second Round SHA-3 Candidates. Information Security Conference, ISC 2010. Boca Raton, FL, USA
Steering Committees
  • FSE since 2021
  • ISC since 2023
  • SAC since 2024
Program Chair / (Co-)Editor-in-Chief
  • FSE 2022, 2023
  • ToSC 2021/22, 2022/23
  • ISC 2023
  • IET Information Security (deputy) since 2023
Program Committees
  • ASIACRYPT 2015, 2017, 2018, 2022
  • CRYPTO 2022, 2023, 2024, 2025
  • EUROCRYPT 2017, 2018, 2019, 2020, 2021, 2024
  • CHES 2019, 2020
  • FSE 2016, 2017, 2018, 2019, 2020, 2024, 2025
  • ACISP 2020
  • ACM CCS 2023
  • ACNS 2018
  • ArcticCrypt 2016, 2025
  • CT-RSA 2023
  • Euro S&P 2019
  • ICMC 2018, 2019
  • Indocrypt 2018, 2020
  • Inscrypt 2024
  • IWSEC 2016, 2017, 2018
  • LLE 2024
  • ProvSec 2016, 2017, 2018, 2019
  • SAC 2019, 2023, 2024
  • SECITC 2016, 2017
Editorial Boards
  • IET Information Security 2020-2023
  • TCHES 2018/19, 2019/20
  • ToSC 2016/17, 2017/18, 2018/19, 2019/20, 2023/24, 2024/25
  • ToSC special issue on NIST Lightweight Submissions 2020
Grants and Prizes
  • NWO Vidi 2023
  • Adviescommissie Outreach Beta 2021, 2022, 2023, 2024
  • Best Cybersecurity Master Thesis 2019, 2021, 2022, 2023
Organization
Teaching
Postdocs
PhD Students


back to top Last modified: Oct 20, 2024