
Presentations
2017
2016
 Kleptography, Dual EC,
lecture in Applied Cryptography course at TU/e.
Slides
 Cryptanalysis Course, Part V  Factorization,
invited lecture at
IACRSEAMS School "Cryptography: Foundations and New Directions"
Slides
 Cryptanalysis Course, Part IV  Factorization,
invited lecture at
IACRSEAMS School "Cryptography: Foundations and New Directions"
Slides
 Cryptanalysis Course, Part III  DLPs in intervals,
invited lecture at
IACRSEAMS School "Cryptography: Foundations and New Directions"
Slides
 Cryptanalysis Course, Part II  DLP,
invited lecture at
IACRSEAMS School "Cryptography: Foundations and New Directions"
Slides
 Cryptanalysis Course, Part I  ECC,
invited lecture at
IACRSEAMS School "Cryptography: Foundations and New Directions"
Slides
 Longterm security for cars,
keynote presentation given jointly with Daniel J. Bernstein at
escar 2016
Slides

Postquantum cryptography,
invited presentation given jointly with
Daniel J. Bernstein and
Peter Schwabe
Slides
 NTRU Prime,
invited presentation at
Mathematical Structures for Cryptography
Slides
 Postquantum crypto and sidechannel attacks 
getting ready for the real world,
invited presentation at
ArcticCrypt
Slides
 PQCRYPTO overview,
presentation at
1day workshop PQCRYPTO
Slides
 Publickey cryptography in Tor and pluggable transports,
invited presentation at
Summer school
on realworld crypto and privacy
Slides
 Standardization of postquantum cryptography,
invited presentation at
A Workshop About Cryptographic Standards (AWACS)
Slides
video
 You thought your communication was secure? Quantum computers are coming!,
Invited talk given jointly with Daniel J. Bernstein at the
Science and Cocktails
Slides
video
 PostQuantum Cryptography,
invited presentation at
BeNeLuxMC 2016 Amsterdam
Slides
 The cryptoapocalypse: cybersecurity in a postquantum world,
presentation at
Studium Generale
Slides
 Codebased cryptography,
invited presentation at
PostQuantum Cryptography Winter School
Slides
video
 Postquantum cryptography,
invited presentation at
8th Winter School on Quantum Cybersecurity
Slides
2015
 PQCHacks: a gentle introduction to postquantum cryptography.
Talk given jointly with Daniel J. Bernstein
at 32C3
Slides
video
 Failures in NIST's ECC standards,
Talk given jointly with Daniel J. Bernstein
at the SSR 2015 rump session
Slides
 How to manipulate curve standards: a white paper for the black hat,
Talk given jointly with Daniel J. Bernstein
at SSR 2015: Security Standardisation Research
Slides
 Kryptographie für Langzeitsicherheit (in German),
invited presentation at Bundesdruckerei Berlin
Slides
 Postquantum cryptography,
invited presentation at
Security, Privacy, and
Applied Cryptography Engineering (SPACE)
Slides
 Postquantum cryptography,
invited presentation at
Academy Contact Forum 'Coding Theory and Cryptography VI'
Slides
 Initial recommendations of longterm secure postquantum systems,
presentation at
Dagstuhl Workshop on Quantum Cryptanalysis
Slides
 Twisted Hessian Curves,
invited presentation at
SIAM Conference on Applied Algebraic Geometry 2015
Slides
 EdDSA for more curves,
Invited talk given jointly with Daniel J. Bernstein
at the CFRG during IETF 93
Slides
 Batch NFS,
invited presentation at
Summer school on realworld crypto and privacy
Slides
 Elliptic curves,
invited presentation at
Summer school on realworld crypto and privacy
Slides
 PQCRYPTO  PostQuantum Cryptography for Longterm Security,
invited presentation at
Intel Workshop: International View of the State of the Art in Cryptography and Security and its Use in Practice (VII)
Slides
 TLS alternatives – faster and more secure,
presentation at
CryptoAction meeting in Sofia
Slides
 Coppersmith in the wild,
invited presentation at
Mathematics of Lattices and Cybersecurity
Slides
 PQCRYPTO project in the EU,
presentation at
NIST Workshop on Cybersecurity in a PostQuantum World
Slides
 Batch NFS,
Talk given jointly with Daniel J. Bernstein
at the Crypto Working Group
Slides
 Sneaking key escrow in through the back door,
invited presentation at
MAPPING WP5 Round Table on Privacy, Personality and Business Models
Slides
 NaCl: a new crypto library,
Talk given jointly with Daniel J. Bernstein
at ShmooCon 2015
Slides
2014
 A gentle introduction to ellipticcurve cryptography,
Talk given jointly with Daniel J. Bernstein
at
31C3
Slides video
 Physically unclonable functions found in standard
PC components (PUFFIN),
invited presentation at
International View of the StateoftheArt of Cryptography and Security
and its Use in Practice (VI)
Slides
 The security impact of a new cryptographic library,
Invited talk given jointly with Daniel J. Bernstein
at the KPN Guest Hacker Program
Slides
 Quantum algorithms for subset sum problem,
invited presentation at
PostQuantum Cryptography: Recent Results and Trends
Slides
 Dual EC and what it taught us about
vulnerabilities of the standardization ecosystem,
presentation at
Dagstuhl Perspectives Workshop "Privacy and Security in an Age of Surveillance"
Slides
 EM key extraction from constanttime software on fast ARMs,
Talk given jointly with Daniel J. Bernstein
at
CHES 2014 rump session
Slides
 Batch NFS,
Talk given jointly with Daniel J. Bernstein
at
SAC 2014
Slides
 On the Practical Exploitability of Dual EC DRBG in TLS Implementations,
presentation at
Oberwolfach Workshop "Cryptography"
Slides
 Ellipticcurve cryptography,
invted presentation at
CFRG during IETF 90
Slides
 Pairings, index calculus, and hyperelliptic curves,
invited presentation at
The 9th annual AMSI Winter School
Slides
 Curves with endomorphisms and DLPs in intervals,
invited presentation at
The 9th annual AMSI Winter School
Slides
 Signatures and DLP,
invited presentation at
The 9th annual AMSI Winter School
Slides
 Publickey cryptography and the DiscreteLogarithm Problem,
invited presentation at
The 9th annual AMSI Winter School
Slides
 Crypto news and views,
Invited alk given jointly with Daniel J. Bernstein and Nadia Heninger at
NCSC ONE
Slides
 Randomness generation,
Inivited talk given jointly with Daniel J. Bernstein
at International State of the Art Cryptography Workshop
Slides
 Verifiably random secure curves,
Talk given jointly with Daniel J. Bernstein
at the Eurocrypt 2014 Rump session
Slides
 On the Practical Exploitability of Dual EC DRBG in TLS
Implementations,
Inivited talk at Theoretical and
Practical Aspects of the Discrete Logarithm Problem.
Slides
 SafeCurves: choosing safe curves for ellipticcurve cryptography,
Talk given jointly with Daniel J. Bernstein
at the ShmooCon 2014.
Slides
 A "Challenge in Finesse",
Talk given jointly with Matthew D. Green at the rump session of the Real World Cryptography Workshop.
Slides: censored.
 Randomness,
Talk given jointly with Daniel J. Bernstein
at the Dagstuhl
Seminar "Symmetric Cryptography".
Slides
Slides of recent (well..) talks
The talks come in chronological order.
 Fast arithmetic on hyperelliptic Koblitz curves ,
invited talk at the MAGiC conference in Urbana/Champaign
Abstract
M1.ps M2.ps M3.ps Slides (3 files, middle one containing picture of DiffieHellman keyexchange)
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
talk at UCL Crypto Group  Seminar Series
Slides
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
invited talk at 2003 International Symposium on Next Generation Cryptography and Related Mathematics, Japan
Slides
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
invited talk at Computational Aspects of Algebraic Curves, and Cryptography, Gainesville
Slides
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
talk at Cryptography Seminar in Rennes
Slides
 Improved Algorithms for Efficient Arithmetic on Elliptic Curve using
Fast Endomorphisms,
talk given by Francesco Sica at Eurocrypt 2003
Slides in pdf
 Efficient arithmetic on (hyper) elliptic curves over finite fields,
invited talk at ECC 2003
Slides
 Cryptographic Applications of Trace Zero Varieties,
invited talk at Mathematics of Discrete Logarithms, Essen
Slides
 Cryptographic Applications of Trace Zero Varieties,
talk at Dagsthul Seminar 
Algorithms and Number Theory
Slides
 Mathematical Countermeasures Against SideChannel Attacks on
ECC/HECC,
talk at YACC 2004 Slides
 Introduction to SideChannel Attacks on elliptic and
hyperelliptic curves,
talk at ANTS VI 2004 Slides
 Montgomery Addition for Genus Two Curves,
talk at ANTS VI 2004 Slides
 Mathematical Countermeasures against SideChannel Attacks on
Elliptic and Hyperelliptic Curves,
invited talk at WARTACRYPT
'04 Slides
 Pseudorandom Number Generators Based on Elliptic Curves,
invited talk at
Number Theoretic Algorithms and Related Topics Slides
 Hyperelliptic curves in cryptography,
talk at the
"Seminar on zeta functions'' at the Technical University Tokyo
Slides
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
talk at the "COSIC Seminar" KU Leuven
Slides
 Curve Cryptography  suitable primitives for embedded device
,
invited talk at Cryptologie et Algorithmique En Normandie (CAEN'05) Slides
 Pairings on ordinary hyperelliptic curves,
invited talk at Pairings in Cryptography Slides
 Arithmetic on Binary Genus 2 Curves Suitable for Small Devices,
talk at Workshop on RFID and Lightweight Crypto Slides
 Arithmetic of hyperelliptic curves over finite fields,
talk at
Discrete Mathematics Seminar, University of Calgary Slides
 Efficient computation of pairings on nonsupersingular
hyperelliptic curves,
talk at Number Theory Inspired by Cryptography, Banff Slides
 Efficient computation of pairings on nonsupersingular hyperelliptic curves,
invited talk at Algebraic Methods in Cryptography, Bochum Slides
 Cryptographic Applications of Trace Zero Varieties,
seminar talk at Cryptology Research Group at the Indian Statistical Institute, Kolkata Slides
 Pairings in Cryptography,
tutorial at ASIACRYPT 2005
Slides
 Distribution of Some Sequences of Points on Elliptic Curves,
invited talk at
AMS Sectional Meeting Program by Special Session, Special Session on Number Theory
Slides
 Arithmetic of hyperelliptic curves over finite fields, part of lecture at
Summer School on "Computational Number Theory and Applications to Cryptography"
Slides
 Pairing Based Cryptography, part of lecture at
Summer School on "Computational Number Theory and Applications to Cryptography"
Slides
 Analysis of pseudorandom number generators based on elliptic
curves,
talk at
31st Australasian Conference on Combinatorial Mathematics & Combinatorial Computing(ACCMCC)
Slides
 Fast bilinear maps from the TateLichtenbaum pairing on
hyperelliptic curves,
talk at
ANTS VII, Berlin
Slides
 Efficient arithmetic on (hyper)elliptic curves over finite fields,
invited talk at
2006 Workshop on Cryptography and Related Mathematics
Slides
 Hyperelliptic Curves,
talk at
Information Security Summer School (ISSS) 2006. Taiwan.
Slides
 Efficient arithmetic on hyperelliptic curves over finite fields,
talk at
Information Security Summer School (ISSS) 2006. Taiwan.
Slides
 Pairing Based Cryptography,
talk at
Information Security Summer School (ISSS) 2006. Taiwan.
Slides
 Public Key Cryptography  Performance Comparison and Benchmarking,
keynote at
Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBSeg)
Slides
 Index Calculus in Finite Fields & Hyperelliptic Curves,
tutorial at
WCAP 2006  III Workshop on Cryptographic Algorithms and Protocols
Slides
 Efficient arithmetic on hyperelliptic curves over finite fields
& Pairings,
tutorial at
WCAP 2006  III Workshop on Cryptographic Algorithms and Protocols
Slides
 Elliptic vs. hyperelliptic, part 2,
invited talk at ECC 2006
Slides and Slides in ps.gz
Part 1 of the fight was excecuted by Daniel J. Bernstein, his slides can be found here.
 Open Problems in Pairings,
invited talk at
Number Theory and Cryptography  Open Problems
Slides
 Tanja Lange,
on the occasion of presentating the new
employees of the faculty for mathematics and computer science of the Technische Universiteit
Eindhoven Slides
(pdf)
 Cryptographic applications of curves over finite fields,
invited talk at
General Mathematical Colloquium Utrecht Slides
 Unified addition formulae for elliptic curves,
invited talk
at
AMS Special Session on Mathematical Aspects of Cryptography, 2007
Spring AMS Eastern Section Meeting Slides
 Elliptic vs. hyperelliptic, part 2,
talk at EIDMA Seminar Combinatorial
Theory Slides
 Mathematical Background of Pairings,
talk at ECRYPT PhD Summer School on
Emerging Topics in Cryptographic Design and Cryptanalysis Slides
 Fast scalar multiplication on elliptic curves,
invited talk
at Conference on
Algorithmic Number Theory Slides
 Elliptic vs. hyperelliptic, part 3  Elliptic Strikes
Back,
talk at
Eurocrypt 07 Rump Session Slides
 Sidechannel attacks and countermeasures for curve based
cryptography,
invited talk at Quo vadis
cryptology ?  Threat of SideChannel Attacks Slides in ps Slides in pdf
 Fast scalar multiplication on elliptic curves,
talk
at 8th International Conference
on Finite Fields and Applications Slides
 Elliptic vs. Hyperelliptic, part 3: Elliptic strikes
back,
invited presentation at 11th Workshop
on Elliptic Curve Cryptography 2007 Slides for my half Slides for Dan
Bernstein's half
 The EFD thing,
presentation
at the rump session of CHES 2007 given jointly with Dan
Bernstein Slides
 Edwards Curves for Cyptography,
presentation at
EIDMA/DIAMANT Cryptography Working Group
Slides
 Edwards coordinates for elliptic curves, part 1,
invited presentation at
Explicit Methods in Number Theory
In honour of Henri Cohen
Slides
Part 2 was given by Dan
Bernstein
Dan's slides
 Edwards Coordinates for Elliptic Curves, part 1,
invited presentation at
SAGE Days 6: Cryptology, Number theory, and Arithmetic Geometry
Slides
Part 2 was given by Dan
Bernstein
Dan's slides
 Edwards Curves for Cryptography,
invited keynote presentation at
Kolloquium über Kombinatorik
Slides
 Faster Addition and Doubling on Elliptic Curves,
joint presentation with Dan Bernstein at
ASIACRYPT 2007
Slides
 Edwards Coordinates,
invited keynote presentation at
Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC17)
Slides
 The power of mathematics to protect data and to break data protection,
presentation at
Research day at TU/e
Slides
 Revisiting pairing based group key exchange,
presentation at
Financial Cryptography and Data Security 2008
Slides
 Binary Edwards Curves,
presentation at the
Eurocrypt 2008 Rump Session
Slides
 Faster arithmetic on elliptic curves  blessing to ECC, harm to RSA,
presentation at
EIPSI Grand Opening
Slides
 Binary Edwards Curves,
invited presentation at
Seminario Matematico, Universidad Autonoma Madrid
Slides
 Scalar Multiplication and Weierstrass Curves,
presentation at 3rd
ECRYPT PhD SUMMER SCHOOL Advanced Topics in Cryptography Slides
 Shapes of Elliptic Curves,
rumpsession presentation at
ANTS 2008
Slides
See also the
zoo pictures.
 Twisted Edwards Curves,
talk given by
Daniel J. Bernstein on our joint paper at
Africacrypt 2008
Slides
 Binary Edwards Curves,
invited presentation at
Séminaire de Cryptographie de Rennes
Slides
 Binary Edwards Curves,
presentation at
CHES 2008
Slides
 ECM on Graphics Cards,
presentation at
CADO workshop on integer factorization
Slides
 PostQuantum Cryptography,
invited presentation at
INDOCRYPT 2008
Slides in ps
Slides in pdf
 Elliptic Curve Cryptography,
invited presentation at
Malaviya National Institute of Technology, Jaipur, India (Department of Computer Engineering)
Slides
 Models of Elliptic Curves,
joint invited presentation with Dan Bernstein at
Curves, Coding Theory, And Cryptography, ESF Exploratory Workshop  PESC
Slides
 Pairings on Edwards Curves,
invited presentation at
Arithmétique, géométrie, cryptographie et théorie des codes
Slides
Preprint with more details
 Pairings on Edwards curves,
invited presentation at
Fields Cryptography Retrospective Meeting
Slides
 Pairings on Edwards Curves,
presentation at
Dagstuhl Seminar Algorithms and Number Theory
Slides
 PostQuantum Cryptography,
presentation at
Dagstuhl Seminar 09311Classical and Quantum Information Assurance Foundations and Practice
Slides
 Efficient Implementation of Pairings,
invited key note presentation at
Pairing 2009
Slides
 Applied cryptanalysis  or  how to win an iPhone,
rump session presentation at
ECC
Slides
 ECM using Edwards curves,
invited presentation at
Workshop on Factoring Large Integers
Slides
 ECM using Edwards curves,
invited presentation at
Workshop on Discovery and Experimentation in Number Theory
held at Fields Institute, Toronto and Simon Fraser University, Burnaby.
Slides
See also here for
audio recordings.
 What is a use case for quantum key exchange? Part I,
invited presentation at
Workshop on quantum information
Slides
PartII was given by Daniel J. Bernstein,
see his talks page.
 Coppersmith's factorization factory,
invited presentation at
General Colloquium Leiden
Slides
 PostQuantum Cryptography,
invited presentation at
ISI Seminar at QUT Brisbane
Slides
 Breaking ECC2K130,
presentation at
Early Symmetric Crypto (ESC) seminar
Slides
 Small highsecurity publickey encryption and signatures,
invited presentation at
The First Taiwanese Workshop on Security and SystemonChip
Slides
 ECC minicourse,
talk given jointly with Daniel J. Bernstein in a minicourse following Africacrypt 2010.
Slides
 Starsh on strike,
talk given jointly with Daniel J. Bernstein
at Latincrypt.
Slides
 Why CHES is better than CRYPTO,
talk given jointly with Daniel J. Bernstein
that the CHES 2010 Rump Session.
Slides
Movie
 Attacking Elliptic Curve Challenges,
presentation at
European Cryptography Day
Slides
 Breaking ECC2K130,
invited presentation at
Workshop on Elliptic Curves and Computation
Slides
 Elliptic Curve Cryptography,
key note presentation at
81. Arbeitstagung Allgemeine Algebra
Slides
 Codebased cryptography,
invited presentation at
Workshop on: Solving polynomial equations
Slides
 On the correct use of the negation map in the Pollard rho method,
talk given jointly with Daniel J. Bernstein at
PKC 2011
Slides
 Minicourse on the ECDLP,
given jointly with Daniel J. Bernstein at CSIT (Centre for Strategic Infocomm Technologies), Singapore
day 1
my part of day 2
my part of day 3
my part of day 4
 Breaking ECC2K130,
key note presentation at
CrossFyre
Slides
 Syndromebased hash functions,
invited presentation at
International Workshop on Coding & Cryptology (IWCC)
Slides
 Codebased cryptography,
key note presentation at
The 10th International Conference on Finite Fields and their Applications
Slides
 Codebased cryptography,
invited presentation at
Aspects of Coding Theory
Slides
 Advances in EllipticCurve Cryptography,
invited
presentation at International Conference on
Coding and Cryptography Slides
 Stateoftheart branchless techniques for elliptic curve scalar
multiplication,
talk at Dagstuhl seminar on Quantum Cryptanalysis
blackboard snapshots
 Advances in EllipticCurve Cryptography,
plenary talk
at SIAM
Conference on Applied Algebraic Geometry Slides
 Advances in EllipticCurve Cryptography,
invited talk at the General Mathematics Colloquium Slides
 Codebased cryptography,
invited talk at the
Spanish Cryptography Days
Slides
 Elliptic curves for applications,
tutorial at
Indocrypt 2011
Slides
 A battle of bits: building confidence in cryptography,
invited talk given jointly with Daniel J. Bernstein at
Mathematical and Statistical Aspects of Cryptography
Slides
 The new SHA3 software shootout,
Talk given jointly with Daniel J. Bernstein at the Third SHA3 Candidate Conference
Slides
 Two grumpy giants and a baby,
Talk given jointly with Daniel J. Bernstein at the Ei/PSI Cryptography Working Group
Slides
 Factorization (tutorial),
given jointly with Daniel J. Bernstein at
CSIT (Centre for Strategic Infocomm Technologies), Singapore.
 The security impact of a new cryptographic library.,
Talk given jointly with Daniel J. Bernstein at the ACNS 2012
Slides
 Never trust a bunny,
Talk given jointly with Daniel J. Bernstein at the RFIDsec 2012
Slides
 Two grumpy giants and a baby,
Talk given jointly with Daniel J. Bernstein at the ANTS 2012
Slides
 The security impact of a new cryptographic library.,
Invited talk given jointly with Daniel J. Bernstein at the "Short
Subjects in Security seminar" at Qualcomm, San Diego, Slides
 Two grumpy giants and a baby,
Talk given jointly with Daniel J. Bernstein at YACC 2012
Slides
 Postquantum cryptography  longterm confidentiality and integrity
for communication,
invited presentation at
This Week's Discoveries  science faculty Leiden
Slides
 Advances in EllipticCurve Cryptography,
invited presentation at
Academia Sinica, IIS seminar (Taiwan)
Slides
 Highspeed highsecurity cryptography on ARMs,
Talk given jointly with Daniel J. Bernstein at the escar 2012
Slides
Abstract:
Secure cryptography does not need to be big and slow. This talk
explains the cryptographic primitives behind the recordsetting
software in the NaCl library (http://nacl.cr.yp.to), reports
timings on a variety of CPUs, and then focuses on ARM processors, with
an emphasis on the popular ARM Cortex A8 CPU core.
 Computing small discrete logarithms faster,
Talk given jointly with Daniel J. Bernstein at Indocrypt 2012
Slides
 FactHacks  RSA factorization in the real world,
Talk given jointly with Daniel J. Bernstein and Nadia Heninger at
29C3
Slides
See also our related webpage http://facthacks.cr.yp.to/ and the video.
 The state of factoring algorithms and other cryptanalytic
threats to RSA ,
Talk given jointly with Daniel J. Bernstein and Nadia Heninger.
Slides See also our
related webpage http://facthacks.cr.yp.to/
 Nonuniform cracks in the concrete: the power of free
precomputation ,
Talk given jointly with Daniel J. Bernstein at ESC 2013 Slides
 PostQuantum Cryptography ,
presentation at Crypto for 2020
Slides
 Crypto for Security and Privacy,
panel at Crypto for 2020
Slides
 Modeling the Security of Cryptography, Part 2: PublicKey Cryptography,
invited presentation at
Modeling Intractability workshop
Slides
Part 1: secretkey cryptography. was given by Daniel J. Bernstein.
 Never trust a bunny,
rump session presentation at
Modeling Intractability workshop
Slides
 The security impact of a new cryptographic library.,
Inivited talk given jointly with Daniel J. Bernstein at the Security seminar at the University of Haifa and 2 days later at the
Theory Seminar at the Weizmann Institute of Science
Slides
 Security dangers of the NIST curves,
Invited talk given jointly with Daniel J. Bernstein at the International State of the Art in Cryptography  Security workshop in Athens.
Slides
 Publickey cryptography and the DiscreteLogarithm Problem,
first lecture in
Summer School  Number Theory for Cryptography
slides
 Signatures and DLPI,
second lecture in
Summer School  Number Theory for Cryptography
slides
 DLPII and curves with endomorphisms,
third lecture in
Summer School  Number Theory for Cryptography
slides
 Pairings and DLPIII,
fourth lecture in
Summer School  Number Theory for Cryptography
slides
 Factoring RSA keys from certified smart cards: Coppersmith in the wild,
invited presentation at
Number Theory, Geometry and Cryptography
Slides
 PostQuantum Cryptography,
presentation at
SIAM conference on Applied Algebraic Geometry
Slides
 Spyin' NSA,
song with several others at
Crypto 2013 Rump Session
Slides
YouTube recording.
 Under Surveillance,
song with several others at
Crypto 2013 Rump Session
Slides
YouTube recording.
 Factoring RSA keys from certified smart cards: Coppersmith in the wild,
presentation at
Cryptography Working Group, Sep 6, 2013
Slides
 Factoring RSA keys from certified smart cards: Coppersmith in the wild,
presentation at
ECC Rump session
Slides
 Benchmarking of postquantum cryptographyi,
invited presentation at
ETSI QuantumSafeCrypto Workshop
Slides
 Factoring RSA keys from certified smart cards: Coppersmith in the wild,
invited presentations at
Computer Science Colloquium (Macquarie University) and
Computational Algebra Seminar (Sydney University)
Slides
 Presentation at Department Dialog (TU/e)
Slides
 Some Elliptic CUrve REsults
presentation at the
Asiacrypt 2013 rump session
slides
 Nonuniform cracks in the concrete: the power of free precomputation,
Talk given jointly with Daniel J. Bernstein at Asiacrypt 2013
Slides
 Factoring RSA keys from certified smart cards: Coppersmith in
the wild
Talk given jointly with Nadia Heninger at Asiacrypt 2013
slides
 Cleaning up crypto,
Invited talk given jointly with Daniel J. Bernstein
at the
International View of the StateoftheArt of Cryptography and Security and its Use in Practice (IV) in Bangalore
Slides
 The year in crypto,
Talk given jointly with Daniel J. Bernstein
and Nadia Heninger at
30C3
Slides video
 (Tweet)NaCl,
Invited talk given jointly with Daniel J. Bernstein
and Peter Schwabe at
30C3 during the #youbroketheinternet
assembly.
Slides
Last modified: 2017.01.29
