Invited Talks
Following is a selection of invited talks by Prof. Dr. Kenny Paterson:
- Cryptography in the Wild. external page EUROCRYPT 2024, Zurich, Switzerland, 28.5.2024.
- Cryptography in the Wild. external page CYRENZH, Zurich, Switzerland, 28.11.2023.
- On the unreasonable effectiveness of key overwriting. external page WAC6, Crypto 2023, Santa Barbara, USA, 20.8.2023.
- Cryptography in the Wild. external page Vienna Cyber Security and Privacy Research Cluster, Vienna, Austria, 28.6.2023.
- Cryptography for the Quantum Era. external page SWICO, Zurich, Switzerland, 23.1.2023.
- Is Secure Messaging Secure? ETH VIScon, Zurich, Switzerland, 14.-16.10.2022.
- Secure Messaging: The Good, the Bad and the Ugly. external page KAIST Graduate School of Information Security, virtual and South Korea, 11.10.2022.
- Secure Messaging. external page FOSAD Summer School, Bertinoro, Italy, 31.8.-2.9.2022.
- MEGA – Malleable Encryption Goes Awry (keynote). external page Workshop on Attacks in Cryptography (WAC5), virtual and Santa Barbara, USA, 13.-18.8.2022.
- Deployment Challenges for Quantum Key Distribution. HP Laboratories, Bristol, UK, 20.7.2022.
- Post-Quantum Cryptography and the IoT. external page Iexternal page EMTRONICS 2022, virtual and Canada, 1.-4.6.2022.
- Probabilistic Data Structures in Adversarial Environments. external page UK-SPS, virtual, 11.5.2022.
- PQC or QKD? external page Symposium on Post Quantum Cryptography, CWI Amsterdam and TNO, virtual, 3.11.2021.
- Applied Cryptography (Inaugural Lecture). ETH Zurich, 18.10.2021.
- external page Cybersecurity - the real challenges. 25th Symposium on Privacy and Security, Zurich, Switzerland, 2.9.2021.
- external page The Impending Transition to Post-Quantum Cryptography: Risks and Opportunities. ETH Risk Center, virtual, 11.5.2021.
- Probabilistic Data Structures in Adversarial Settings. CANS 2020, virtual, 16.12.2020.
- Building a Contact Tracing App for Switzerland. VIScon 2020, Zurich, 8.10.2020.
- Analysing Leakage from Encrypted Database Systems. ESORICS 2018, Barcelona, Spain, 3.-7.9.2018.
- A Range of Attacks on Encrypted Databases. Workshop on Attacks (WAC), Santa Barbara, California, USA, 18.8.2018.
- Secure Storage in the Cloud using Bespoke Encryption Schemes. ISPEC 2017, Melbourne, Australia, 13.-15.12.2017.
- Post Quantum Cryptography. Security Area Advisory Group, IETF99, Prague, Czech Republic, 20.7.2017.
- SSH: Beyond Confidentiality and Integrity in Practice. RuhrSec 2017, Bochum, Germany, 5.5.2017.
- Backdoors in PRGs and PRNGs. ECRYPT-CSA wr0ng 2017 (Random Number Generation Done Right), Paris, France, 30.4.2017.
- The Evolution of Public Key Cryptography in SSL/TLS. Public Key Cryptography (PKC) 2017, Amsterdam, the Netherlands, 29.3.2017.
- CFRG: What it is, how it works, and how to get involved. ECRYPT-CSA AWACS (A Workshop on Cryptographic Standardisation), Vienna, Austria, 8.5.2016.
- An Academic’s View of Working with SDOs. Security Standardisation Research (SSR) 2015, Tokyo, Japan, 15.-16.12.2015.
- The History – and Future – of Secure Channels. CYSEC Launch “Festvortrag”, TU Darmstadt, Darmstadt, Germany, 7.12.2015.
- Authenticated Encryption and Secure Channels – There and Back Again. ISC 2015, Trondheim, Norway, 9.-11.9.2015.
- Big Bias Hunting in Amazonia: Large- scale Computation and Exploitation of RC4 Biases. ASIACRYPT 2014, Kaoshiung, Taiwan, 7.-11.12.2014.
- Lucky 13, BEAST, CRIME,... Is TLS Dead or Just Resting? Applied Networking Research Prize talk at Internet Research Task Force plenary meeting, London, UK, 5.3.2014.
- Cryptographic Aspects of TLS. INDOCRYPT 2013, Mumbai, India, 7.-10.12.2013.
- Key Reuse in Public Key Cryptography. EuroPKI 2012, Pisa, Italy, 13.-14.9.2012.
- TLS and DTLS: A Tale of Two Protocols. Distinguished invited lecture at T.U. Darmstadt, Germany, 5.6.2012.
- SSH: A Case Study of Cryptography in Theory and Practice. Africacrypt 2010, Stellenbosch, South Africa, 3.-6.5.2010.
- Cryptography and Secure Channels. Cryptographer's Track, RSA Conference, San Francisco, USA, 20.-24.4.2009.
- Non-Interactive Key Distribution and Identity-Based Encryption: An Historical Perspective. ProvSec2008, Shanghai, China, 30.10.-1.11.2008.
- From Fish to Phishing. Professorial Inaugural Lecture, Royal Holloway, University of London, 2/2008.
- Certificateless Cryptography I and Certificateless Cryptography II. ICE-EM RNSA 2007 Workshop on Pairing Based Cryptography, Queensland University of Technology, Brisbane, Australia, 6/2007.
- What can quantum cryptographers learn from history? Workshop on Quantum Cryptography and Computing, Fields Institute, University of Toronto, Toronto, Canada, 10/2006.
- Identity-based cryptography - Panacea or Pandemonium? 9th Workshop on Elliptic Curve Cryptography (ECC 2005), Technical University of Denmark, Copenhagen, Denmark, 9/2005 .