This page contains the list of (invited) talks I gave on different occasions.

Talks

  1. Asynchronous Remote Key Generation (ARKG) and its Applications.
    Invited talk. SKECH 2024: Secure Key Exchange and Channel Protocols, Bertinoro, Italy, 05.06.2024

  2. Selected Topics in Private Data Processing.
    Invited lectures. Privacy Computing Course @ Graduate Summer School, Shandong University, Virtual/ China, 18.07.2023

  3. Asynchronous Remote Key Generation and its Applications.
    Invited talk. ASSURED Scientific Workshop, TU Darmstadt, Germany, 26.04.2023

  4. Asynchronous Remote Key Generation for Account Recovery and Delegation in WebAuthn.
    Invited talk. Codes and Cryptography Seminar, Paderborn University, Germany, 16.12.2022

  5. On Account Recovery and Delegation in WebAuthn.
    Future of Personal Identification (FoPI) 2021 @ IEEE EuroS&P 2021, Virtual / Vienna, Austria, 06.09.2021

  6. Security Challenges for Satellite Constellations and Communications.
    Invited speaker and panelist. CYSAT 2021, Virtual / Davos, CH, 18.03.2021 [YouTube]

  7. Security in Future Technologies: Core Capabilities and Threats.
    Invited panelist. EIT Digital Tech Networking Event, London, UK, 03.10.2019

  8. Reputation and Privacy in Gig.
    Invited talk. NCSC Annual ACE-CSR Conference, Stratford-upon-Avon, UK, 26.06.2019

  9. Authentication with Privacy for Connected Cars: A research perspective.
    Invited talk. Cyber Security Focus Day @ Connected Cars'16, London, UK, 27.06.2016

  10. Blind Password Registration for Verifier-based PAKE.
    ACM AsiaPKC 2016 @ ACM ASIACCS 2016, Xian, China, 30.05.2016

  11. A Modular Framework for Multi-Factor Authentication and Key Exchange.
    1st International Conference on Research in Security Standardisation (SSR 2014), Egham, UK, 17.12.2014

  12. Secure Modular Password Authentication for the Web using Channel Bindings.
    1st International Conference on Research in Security Standardisation (SSR 2014), Egham, UK, 17.12.2014

  13. Cryptography and Passwords.
    Invited talk. SafeNet Crypto Club, London, UK, 05.12.2014

  14. Cryptographic Password Authentication with TLS Channel Bindings.
    Invited talk. SnT research seminar, University of Luxembourg, 20.11.2014

  15. Zero-Knowledge Policy Checks for Passwords and Verifier-Based PAKE.
    Invited talk. SKECH@BiCi: Secure Key Exchange and Channel Protocols, Bertinoro, Italy, 05.06.2014

  16. Oblivious Password Authentication for the Web.
    Invited talk. Number Theory and Cryptography, Darmstadt, Germany, 22.11.2013

  17. A Framework for Multi-Factor Authentication.
    CryptoForma Network, 9th Meeting, Guildford, UK, 29.11.2012

  18. Relationships among Privacy Notions for Signatures.
    Dagstuhl-Seminar "Privacy-Oriented Cryptography", Dagstuhl, Germany, 20.09.2012

  19. Publicly Verifiable Ciphertexts.
    8th International Conference on Security and Cryptography for Networks (SCN 2012), Amalfi, Italy, 06.09.2012

  20. Forward-Secure Hierarchical Predicate Encryption.
    5th International Conference on Pairing-Based Cryptography (Pairing 2012), Cologne, Germany, 17.05.2012

  21. Pseudorandom Signatures.
    CryptoForma Network, 7th Meeting, Edinburgh, UK, 01.03.2012

  22. Group Signature with Constant Revocation Costs for Signers and Verifiers.
    10th International Conference on Cryptology and Network Security 2011, Sanya, China, 11.12.2011

  23. Non-Interactive and Re-Usable UC String Commitments with Adaptive Security.
    ASIACRYPT 2011, Seoul, Korea, 07.12.2011 [PDF]
    Invited talk. Crypto Seminar, IBM Research T.J. Watson, NY, USA, 01.12.2011

  24. Social Authentication with Privacy.
    Invited talk. Royal Holloway, University of London, UK, 23.06.2011

  25. Privacy-Oriented Cryptography for Social Clouds.
    Invited talk. LACS Seminar, University of Luxembourg, 19.05.2011

  26. Cryptographic Approach to Private Social Clouds.
    Invited talk. Séminaire de Cryptographie, CELAR/Université de Rennes 1, Rennes, France, 06.05.2011

  27. Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation.
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), Hong Kong, 24.03.2011 [PDF]

  28. Cryptographic Treatment of Private User Profiles.
    15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, St. Lucia, 04.03.2011 [PDF]

  29. Affiliation-Hiding Authentication.
    Invited talk. Royal Holloway, University of London, UK 21.10.2010

  30. Privacy via Group Authentication.
    Invited talk. Goethe University of Frankfurt, Germany 01.09.2010

  31. Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
    8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, 23.06.2010 [PDF]

  32. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
    AFRICACRYPT 2010, Stellenbosch, South Africa, 05.05.2010 [PDF]

  33. Privacy-Preserving Admission to Mobile Peer-to-Peer Groups.
    8th IEEE Intl. Conference on Pervasive Computing and Communications, MP2P Workshop, Mannheim, Germany, 02.04.2010 [PDF]

  34. Fully Robust Tree-Diffie-Hellman Group Key Exchange.
    8th International Conference on Cryptology and Network Security, Kanazawa, Ishikawa, Japan, 14.12.2009 [PDF]

  35. Parameterwahl für sichere zeitgemäße Verschlüsselung.
    Invited talk. CAST e.V. Workshop "Datenschutz", Darmstadt, Germany, 29.10.2009 [PDF]

  36. Securing Roaming Access Inside Wireless Mesh Networks.
    10th International Workshop on Information Security Applications, Busan, South Korea, 27.08.2009 [PDF]

  37. Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
    7th International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, France, 02.06.2009 [PDF]

  38. Non-Interactive Computation of Pairwise Keys in Group Diffie-Hellman Protocols.
    Invited talk. Workshop on Cryptographic Protocols and Public-Key Cryptography, BiCi, University Residential Center, Bertinoro (Forlì-Cesena), Italy, 26.05.2009

  39. Authenticated Wireless Roaming via Tunnels.
    Invited talk. GI/HGI Wireless Security 2009, Bochum, Germany, 13.03.2009 [PDF]

  40. The Concept of Wireless Roaming via Tunnels: Authentication and Key Establishment Issues.
    Invited talk. BCRYPT PhD Day, Leuven, Belgium, 13.10.2008

  41. Fully Robust Group Key Exchange in the Presence of Opening Attacks.
    Invited talk. ACAC Seminar, Centre for Advanced Computing - Algorithms and Cryptography, Macquarie University, Sydney, Australia, 11.07.2008

  42. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
    13th Australasian Conference on Information Security and Privacy, Wollongong, Australia, 07.07.2008

  43. Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
    ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 20.03.2008

  44. Securing Group Key Exchange against Strong Corruptions.
    ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 19.03.2008

  45. On Security Models and Compilers for Group Key Exchange Protocols.
    2nd International Workshop on Security, Nara, Japan, 30.10.2007

  46. Provably Secure Framework for Information Aggregation in Sensor Networks.
    7th International Conference on Computational Science and Applications, Kuala Lumpur, Malaysia, 27.08.2007

  47. Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
    4th International Conference on Autonomic and Trusted Computing, Hong Kong, China, 13.07.2007

  48. Browser-based Authentication Protocols for Naive Users.
    Western European Workshop on Research in Cryptology, Bochum, Germany, 06.07.2007

  49. Security-Enhancing Compilers for Group Key Exchange Protocols.
    Invited talk. UCL Crypto Group Seminar, Louvain-la-Neuve, Belgium, 20.06.2007

  50. Strong Corruptions in Group Key Exchange.
    Invited talk. Workshop on Cryptographic Protocols, BiCi, University Residential Center, Bertinoro (Forli-Cesena), Italy 08.03.2007

  51. Kryptographie und Datensicherheit.
    Invited tutorial. Im Rahmen des Weiterbildungsstudiums "IT-Sicherheit- Administration und Sicherheit von IT-Systemen und -Netzwerken", Ruhr-Universität Bochum, 10.02.2007

  52. A Security Model for Group Key Exchange.
    ECRYPT-PROVILAB Meeting, Horst Görtz Institute for IT Security, Bochum, Germany 05.10.2006

  53. Group Signatures for Federated Systems.
    Invited talk. Séminaire de Cryptographie, CELAR/Université de Rennes 1, Rennes, France 02.06.2006

  54. New Paradigms for Group Signatures in Federated Systems.
    4. Kryptotag, Horst Görtz Institute for IT Security, Bochum, Germany 11.05.2006 [PDF]

  55. Property-Based Taming of Lying Mobile Nodes.
    IEEE International Workshop on Trusted and Autonomic Computing Systems, Vienna, Austria, 19.04.2006

  56. Linkable Democratic Group Signatures.
    2nd Information Security Practice and Experience Conference, Hangzhou, China, 13.04.2006

  57. Democratic Group Signatures.
    ACM Symposium on Information, Computer and Communications Security, Taipei, Taiwan, 21.03.2006

  58. Kryptographie und Datensicherheit.
    Invited tutorial. Weiterbildungsstudium "IT-Sicherheit- Administration und Sicherheit von IT-Systemen und -Netzwerken", Ruhr-Universität Bochum, 17/02/2006

  59. CGKA Protocols, Revisited for Mobile Ad-Hoc Groups.
    International Workshop on Wireless and Sensor Networks Security, Washington, USA, 07.11.2005

  60. Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
    International Workshop on Security in Networks and Distributed Systems, Fukuoka, Japan, 21.07.2005

  61. Binary Trees in Group Communication Security.
    Invited talk. PG seminar "Algebra and Geometry", Chair for Algebra and Geometry, Ruhr University Bochum, Germany, 17.12.2005

  62. Pseudonym Generation Scheme for Ad-Hoc Group Communication.
    European Workshop on Security in Ad-Hoc and Sensor Networks, Heidelberg, Germany, 05.08.2004