List of invited speakers at cryptology conferences

This is a list of invited speakers at selected cryptography conferences.

2012

CRYPTO

  • Jonathan Zittrain "The End of Crypto"
  • Ernie Brickell "Recent Advances and Existing Research Questions in Platform Security"

EUROCRYPT

  • Antoine Joux "A Tutorial on High Performance Computing applied to Cryptanalysis"
  • Alfred Menezes "Another Look at Provable Security"

ASIACRYPT

  • Dan Boneh "Pairing-based Cryptography: Past, Present, and Future"
  • Chuanming Zong "Some Mathematical Mysteries in Lattices"

PKC

  • David Pointcheval "Password-Based Authenticated Key Exchange"

TCC

  • Jens Groth "Non-Interactive Zero-Knowledge"
  • Sergey Yekhanin "Locally Decodable Codes"

CHES

  • Steven Murdoch "Banking security: attacks and defences"
  • Christof Tarnovsky "(In)security of commonly found smart cards"

FSE

  • Kaisa Nyberg ""Provable" security against differential and linear cryptanalysis"
  • Mitsuru Matsui "The history of linear cryptanalysis"

ACISP

  • Mihir Bellare "A Cryptographic Treatment of the Wiretap Channel"
  • Jorge Munilla "Operating Principles of RFID Systems and Attacks Related to the Location"

Indocrypt

  • Orr Dunkelman "From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems"
  • Nigel Smart "Using the Cloud to Determine Key Strengths"
  • Vinod Vaikuntanathan "How to Compute on Encrypted Data"

LATINCRYPT

  • Manoj M. Prabhakaran "A Theory of Cryptographic Complexity"
  • Victor Miller "Elliptic Curves and Cryptography: a 27 year perspective"
  • Gregor Leander "Past and Future of Lightweight Cryptography"
  • Zvika Brakerski "Fully Homomorphic Encryption: The Swiss-Army Knife of Cryptography"

AFRICACRYPT

  • Willi Meier "Stream Ciphers, a Perspective"
  • Craig Gentry "Fully Homomorphic Encryption: Current State of the Art"
  • Marc Fischlin "Black-Box Reductions and Separations in Cryptography"

SAC

  • Vincent Rijmen "Extracts from the SHA-3 competition"
  • Ian Goldberg "Privacy Enhancing Technologies for the Internet"

PAIRING

  • Jean-Luc Beuchat "Hardware Architectures for the Cryptographic Tate Pairing"
  • Jung-Hee Cheon "Discrete Logarithm in Pairing Groups"
  • Dennis Hofheinz "Structure-preserving cryptography"
  • Hovav Shacham "Alternative Structure for Bilinear Groups"

2011

CRYPTO

  • Ron Rivest (IACR Distinguished Lecture) "Illegitimi Non Carborundum"
  • Roger Dingledine "Tor and Circumvention: Lessons Learned"

EUROCRYPT

  • Phong Nguyen "Lattice Reduction Algorithms: Theory and Practice"
  • Ronald Cramer "The Arithmetic Codex: Theory and Applications"

ASIACRYPT

  • Joan Daemen "15 years of Rijndael"
  • Úlfar Erlingsson "Secure Cloud Computing Services"

PKC

  • Vinod Vaikuntanathan "New Developments in Leakage-Resilient Cryptography"

TCC

  • Luca Trevisan "Dense Model Theorems and Their Applications"
  • Rafael Pass "Concurrent Security and Non-Malleability"

CHES

  • Ernie Brickell "Technologies to Improve Platform Security"
  • Tetsuya Tominaga "Standardization Works for Security regarding the Electromagnetic Environment"

FSE

  • Ivan Damgård "The past, present and future of hash functions – a rehash of some old and new results"
  • Willy Meier "Fast correlation attacks: Methods and countermeasures"

INDOCRYPT

  • Christof Paar: The Yin and Yang Sides of Embedded Security
  • Ross J. Anderson: Cryptology: where is the new frontier?
  • Eric Rescorla: Stone Knives and Bear Skins: Why does the Internet run on pre-historic cryptography?

AFRICACRYPT

  • Bart Preneel "The NIST SHA-3 Competition: A Perspective on the Final Year"
  • Tatsuaki Okamoto "Some Key Techniques on Pairing Vector Spaces"
  • Jens Groth "Efficient Zero-Knowledge Proofs"

ACISP

  • Claude Carlet "On Known and New Differentially Uniform Functions"
  • Nick Ellsmore "The Cyber-Security Landscape, 2011-2015, and the Need to Innovate"

SAC

  • Alfred Menezes "Another Look at Tightness"
  • Kristin Lauter "Cryptographic Techniques for Securing the Cloud"

IMA Cryptography and Coding

  • Ivan Damgård "Using unconditionally secure authentication in multiparty computation with dishonest majority"
  • Paddy Farrell "Non-Statistical Soft-in, Soft-out Decoding with the Euclidean Metric"
  • Jonathan Jedwab "Emerging methods in the analysis of aperiodic autocorrelations"
  • David Naccache "Can a Program Reverse-Engineer Itself?"

2010

CRYPTO

  • Shafi Goldwasser, Silvio Micali, and Charles Rackoff "Zero Knowledge -- 25 Years"
  • Ivan Damgård and David Naccache "Is Theoretical Cryptography Any Good in Practice?" (Joint with CHES)

EUROCRYPT

  • Moti Yung (IACR Distinguished Lecturer) "Cryptography between Wonderland and Underland"

ASIACRYPT

  • Bart Preneel "Cryptographic Hash Functions and the SHA-3 Competition"
  • Hugo Krawczyk "Cryptography, from Theory to Practice: A Personal Perspective"

CHES

  • Ivan Damgård and David Naccache "Is Theoretical Cryptography Any Good in Practice?" (Joint with CRYPTO)
  • Hovav Shacham "Cars and Voting Machines: Embedded Systems in the Field"

PKC

  • Jacques Stern "Mathematics, Cryptography, Security"
  • Daniele Micciancio "Duality in Lattice Based Cryptography"

FSE

  • Xiaoyun Wang "The Survey of Cryptanalysis on Hash Functions"
  • Thomas Shrimpton "A Provable-Security Perspective on the Development of Hash Functions"

INDOCRYPT

  • Neal Koblitz "Getting a Few Things Right and Many Things Wrong"
  • Bart Preneel "Cryptographic Hash Functions: Theory and Practice"

LATINCRYPT

  • David Grawrock "Trusting your computing device"
  • Amit Sahai "Rethinking Encryption"
  • Orr Dunkelman "The Hitchhiker's Guide to the SHA-3 Competition"
  • Eike Kiltz "A brief history of OAEP and its roller-coaster ride"

ACISP

  • Stephan Overbeek "Precious"
  • Craig Gentry "How the cloud can process data without seeing it"

SAC

  • Alexandra Boldyreva "Search on Encrypted Data in the Symmetric-Key Setting"
  • Keith Martin "The Rise and Fall and Rise of Combinatorial Key Predistribution"

PAIRING

  • Jens Groth "Pairing-Based Non-Interactive Zero-Knowledge Proofs"
  • Joseph H. Silverman "A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties"
  • Gene Tsudik "Some Security Topics with Possible Applications for Pairing-Based Cryptography"

AFRICACRYPT

  • Gideon Kühn "Two Locally Designed Ciphers: Protex and Keeloq"
  • Mitsuru Matsui "Linear Cryptanalysis: History and recent topics"
  • Kenny Paterson "SSH: A Case Study of Cryptography in Theory and Practice"

2009

CRYPTO

  • Ed Felton "Alice and Bob go to Washington: A Cryptographic Theory of Politics and Policy"
  • Ueli Maurer "Abstraction in Cryptography"

EUROCRYPT

  • Shafi Goldwasser "Cryptography without (Hardly any) Secrets?"
  • Phil Rogaway "Practice-Oriented Provable-Security and the Social Construction of Cryptography"

ASIACRYPT

  • Tatsuaki Okamoto (IACR Distinguished Lecturer) "A New Approach on Bilinear Pairings and Its Applications"

TCC

  • Chris Peikert "Some Recent Progress in Lattice-Based Cryptography"

PKC

  • Anna Lysyanskaya "From Signatures to Anonymous Credentials and Anonymous Delegation"
  • Amit Sahai "A New Paradigm for Secure Protocols"

FSE

  • Shay Gueron "Intel's New AES Instructions for Enhanced Performance and Security"
  • Matt Robshaw "Looking back at the eSTREAM Project "

CHES

  • Srini Devadas "Physical Unclonable Functions and Secure Processors"
  • Christof Paar "Crypto Engineering: Some History and Some Case Studies"
  • Randy Torrance "The State-of-the-Art in IC Reverse Engineering"

INDOCRYPT

  • Daniel J. Bernstein "Breaking ECC2K-130"
  • Marc Girault "Cryptography and Elliptic Curves : a 25 year love (?) Story"
  • Thomas Johansson "Coding Theory as a Tool in Cryptography"

PAIRING

  • Victor S. Miller
  • Amit Sahai
  • Tanja Lange "Efficient Implementation of Pairings"

2008

CRYPTO

  • Adi Shamir "How to Solve it: New Techniques in Algebraic Cryptanalysis"
  • Ron Rivest "The MD6 Hash Function"
  • Gilles Brassard (IACR Distinguished Lecturer) "Vingt-cinq ans apres, with apologies to Alexandre Dumas"

EUROCRYPT

  • Andy Clark "From Gamekeeping to Poaching - Information Forensics and Associated Challenges"
  • Clifford Cocks "The Growth and Development of Public Key Cryptography"

ASIACRYPT

  • John Cannon "Computer Algebra and Cryptography"
  • Andy Yao "Some Perspectives on Complexity-Based Cryptography"

FSE

  • Lars Knudsen "Hash functions and SHA-3"

PKC

  • Victor Shoup "The Role of Discrete Logarithms in Designing Secure CryptoSystems"
  • David Naccache "Cryptographic Test Correction"
  • Jean-Jacques Quisquater "How to Secretly Extract Hidden Secret Keys: A State of the Attacks"

CHES

  • Ernie Brickell "A Vision for Platform Security"
  • Adi Shamir "RSA - Past, Present, Future"

INDOCRYPT

  • Josef Pieprzyk "Multi-Party Computations via Graph Coloring"
  • Palash Sarkar "Modes of Operations for Wide-Block Encryption"
  • Tanja Lange "Post-Quantum Cryptography"

SAC

  • Joseph Silverman: "Lifting and the Elliptic Curve DLP"
  • Jacques Patarin: "The 'coefficients H' Technique"

PAIRING

  • Xavier Boyen "The Uber-Assumption Family: A Unified Complexity Framework for Bilinear Groups"
  • Florian Hess "Pairing Lattices"
  • Nigel Smart "Pairings In Trusted Computing"

2007

CRYPTO

  • Ross J. Anderson "Information Security Economics -- and Beyond"
  • Paul Kocher "Leaking Secrets: Exploring the Chasm Between Strong Algorithms and Strong Systems"

EUROCRYPT

  • Victor S. Miller "Elliptic Curves and Cryptography: Invention and Impact"
  • Jacques Stern (IACR Distinguished Lecturer) "Cryptography from A to Z"

PKC

  • Rafail Ostrovsky "Single Server PIR and its applications"

FSE

  • Jean-Charles Faugere "Groebner bases. Applications in cryptology"

ASIACRYPT

  • Ran Canetti "Obtaining Universally Composable Security: Towards the Bare Bones of Trust"
  • Tatsuaki Okamoto "Authenticated Key Exchange and Key Encapsulation in the Standard Model"

PAIRING

  • Dan Boneh "Bilinear Groups of Composite Order"
  • Steven Galbraith "Hyperelliptic Pairings"
  • Alfred Menezes "Supersingular Elliptic Curves in Cryptography"
  • Takakazu Satoh "On Pairing Inversion Problems"
  • Michael Scott "Implementing Cryptographic Pairings"

2006

CRYPTO

  • Oded Regev "Lattice-Based Cryptography"
  • David A. Wagner "Cryptographic Protocols for Electronic Voting"

EUROCRYPT

  • David Naccache "Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt"
  • Kevin McCurley "Language Modeling and Encryption on Packet Switched Networks"

ASIACRYPT

  • Adi Shamir "Random Graphs in Cryptography"
  • Ivan Damgard (IACR Distinguished Lecturer) "The Past, Present and Future of Multiparty Computation"

FSE

  • Eli Biham "How to Make a Difference: Early History of Differential Cryptanalysis"

INDOCRYPT

  • James Massey "Whither Cryptography?"
  • Alfred Menezes "Another Look at ``Provable Security''. II"

2005

CRYPTO

  • Dan Boneh "Bilinear Maps in Cryptography"
  • Ralph Merkle (IACR Distinguished Lecturer) "The Development of Public Key Cryptography: a Personal View; and Thoughts on Nanotechnology"

EUROCRYPT

  • Joe Kilian "Confusion, Quagmire and Irrelevancy: An Optimist's View of the Future of Cryptographic Research"
  • René Schoof "Counting points on elliptic curves: past, present and future"

ASIACRYPT

  • Bart Preneel "Hash Functions: Past, Present, and Future"

FSE

  • Xuejia Lai "Attacks and Protection of Hash Functions"

2004

CRYPTO

  • Victor Shoup "A survey on chosen ciphertext security in public-key encryption" (exact title unknown)
  • Susan Landau "Security, Liberty, and Electronic Communications"

EUROCRYPT

  • Whitfield Diffie (IACR Distinguished Lecturer) "Information Security at 100: Looking Back -- Looking Forward"
  • Ivan Damgard "Paradigms for Multiparty Computation"

ASIACRYPT

  • Adi Shamir "Stream Ciphers: Dead or Alive?"
  • Ho-Ick Suk "Information Security in Korea IT839 Strategy"

FSE

  • Adi Shamir "New Cryptographic Primitives Based on Multiword T-functions"
  • David A. Wagner "Towards a unifying view of block cipher cryptanalysis"

2003

CRYPTO

  • Moni Naor "Cryptographic Assumptions and Challenges"
  • Hugo Krawczyk "The Cryptography of the IPSec and IKE Protocols"

EUROCRYPT

  • Arkadiusz Orlowski and Kris Gaj "Facts and Myths of Enigma: Breaking Stereotypes"
  • Jacques Stern "Why Provable Security Matters?"

ASIACRYPT

  • Don Coppersmith (IACR Distinguished Lecturer) "Solving low degree polynomials"
  • Adi Shamir "Cryptography: State of the Science"
  • Hong-Sen Yan "The Secret and Beauty of Ancient Chinese Locks"

FSE

  • James L. Massey "Interplay between Coding and Cryptography"

2002

CRYPTO

  • David Chaum (IACR Distinguished Lecturer) "Privacy Technology: A survey of security without identification"
  • Andrew Yao "New Directions in Quantum Cryptographic Protocols"

EUROCRYPT

  • Joan Daemen and Vincent Rijmen "AES and the wide trail design strategy"
  • Stephen Kent "Rethinking PKI: What's Trust Got to do with It?"

ASIACRYPT

  • Moti Yung "Crypto-integrity"
  • Tsutomu Matsumoto "Gummy and Conductive Silicone Rubber Fingers"

2001

CRYPTO

  • Mark Sherwin "Quantum information processing in semiconductors: an experimentalist's view"
  • Daniel Weitzner "Privacy, Authentication & Identity: A recent history of cryptographic struggles for freedom"

EUROCRYPT

  • Andrew Odlyzko (IACR Distinguished Lecturer) "Economics and Cryptography"
  • Silvio Micali "Zero Knowledge Has Come of Age"

ASIACRYPT

  • Arjen Lenstra "Unbelievable Security (Matching AES Security Using Public Key Systems)"

FSE

  • Bart Preneel "NESSIE: A European Approach to Evaluate Cryptographic Algorithms"

2000

CRYPTO

  • Martin Abadi "Taming the Adversary"
  • Don Coppersmith "The Development of DES"

EUROCRYPT

  • Mike Walker "On the Security of 3GPP Networks"
  • Tony Sale "Colossus and the German Lorenz Cipher"

ASIACRYPT

  • Tom Berson (IACR Distinguished Lecturer) "Cryptography Everywhere"

1999

CRYPTO

  • Ueli Maurer "Information-Theoretic Cryptography"
  • Martin Hellman "The Evolution of Public-Key Cryptography"

ASIACRYPT

1998

CRYPTO

  • Michael O. Rabin (IACR Distinguished Lecturer) "Authentication"
  • Steve Bellovin "Cryptography and the Internet"

ASIACRYPT

1997

CRYPTO

  • Gilles Brassard "Quantum Information Processing: The Good, the Bad, and the Ugly"
  • Oded Goldreich "On the Foundations of Modern Cryptography"

EUROCRYPT

  • Ernst Bovelander
  • Gerhard Frey