Invited Talks

Following is a selection of invited talks by Prof. Dr. Kenny Paterson:

  • Cryptography in the Wild. external pageCYRENZH, Zurich, Switzerland, 28.11.2023.
  • On the unreasonable effectiveness of key overwriting. external pageWAC6, Crypto 2023, Santa Barbara, USA, 20.8.2023.
  • Cryptography in the Wild. external pageVienna Cyber Security and Privacy Research Cluster, Vienna, Austria, 28.6.2023.
  • Cryptography for the Quantum Era. external pageSWICO, Zurich, Switzerland, 23.1.2023.
  • Is Secure Messaging Secure? ETH VIScon, Zurich, Switzerland, 14.-16.10.2022.
  • Secure Messaging: The Good, the Bad and the Ugly. external pageKAIST Graduate School of Information Security, virtual and South Korea, 11.10.2022.
  • Secure Messaging. external pageFOSAD Summer School, Bertinoro, Italy, 31.8.-2.9.2022.
  • MEGA – Malleable Encryption Goes Awry (keynote). external pageWorkshop on Attacks in Cryptography (WAC5), virtual and Santa Barbara, USA, 13.-18.8.2022.
  • Deployment Challenges for Quantum Key Distribution. HP Laboratories, Bristol, UK, 20.7.2022.
  • Post-Quantum Cryptography and the IoT. external pageIexternal pageEMTRONICS 2022, virtual and Canada, 1.-4.6.2022.
  • Probabilistic Data Structures in Adversarial Environments. external pageUK-SPS, virtual, 11.5.2022.
  • PQC or QKD? external pageSymposium on Post Quantum Cryptography, CWI Amsterdam and TNO, virtual, 3.11.2021.
  • Applied Cryptography (Inaugural Lecture). ETH Zurich, 18.10.2021.
  • external pageCybersecurity - the real challenges. 25th Symposium on Privacy and Security, Zurich, Switzerland, 2.9.2021.
  • external pageThe Impending Transition to Post-​Quantum Cryptography: Risks and Opportunities. ETH Risk Center, virtual, 11.5.2021.
  • Probabilistic Data Structures in Adversarial Settings. CANS 2020, virtual, 16.12.2020.
  • Building a Contact Tracing App for Switzerland. VIScon 2020, Zurich, 8.10.2020.
  • Analysing Leakage from Encrypted Database Systems. ESORICS 2018, Barcelona, Spain, 3.-7.9.2018.
  • A Range of Attacks on Encrypted Databases. Workshop on Attacks (WAC), Santa Barbara, California, USA, 18.8.2018.
  • Secure Storage in the Cloud using Bespoke Encryption Schemes. ISPEC 2017, Melbourne, Australia, 13.-15.12.2017.
  • Post Quantum Cryptography. Security Area Advisory Group, IETF99, Prague, Czech Republic, 20.7.2017.
  • SSH: Beyond Confidentiality and Integrity in Practice. RuhrSec 2017, Bochum, Germany, 5.5.2017.
  • Backdoors in PRGs and PRNGs. ECRYPT-CSA wr0ng 2017 (Random Number Generation Done Right), Paris, France, 30.4.2017.
  • The Evolution of Public Key Cryptography in SSL/TLS. Public Key Cryptography (PKC) 2017, Amsterdam, the Netherlands, 29.3.2017.
  • CFRG: What it is, how it works, and how to get involved. ECRYPT-CSA AWACS (A Workshop on Cryptographic Standardisation), Vienna, Austria, 8.5.2016.
  • An Academic’s View of Working with SDOs. Security Standardisation Research (SSR) 2015, Tokyo, Japan, 15.-16.12.2015.
  • The History – and Future – of Secure Channels. CYSEC Launch “Festvortrag”, TU Darmstadt, Darmstadt, Germany, 7.12.2015.
  • Authenticated Encryption and Secure Channels – There and Back Again. ISC 2015, Trondheim, Norway, 9.-11.9.2015.
  • Big Bias Hunting in Amazonia: Large- scale Computation and Exploitation of RC4 BiasesASIACRYPT 2014, Kaoshiung, Taiwan, 7.-11.12.2014.
  • Lucky 13, BEAST, CRIME,... Is TLS Dead or Just Resting? Applied Networking Research Prize talk at Internet Research Task Force plenary meeting, London, UK, 5.3.2014.
  • Cryptographic Aspects of TLS. INDOCRYPT 2013, Mumbai, India, 7.-10.12.2013.
  • Key Reuse in Public Key Cryptography. EuroPKI 2012, Pisa, Italy, 13.-14.9.2012.
  • TLS and DTLS: A Tale of Two Protocols. Distinguished invited lecture at T.U. Darmstadt, Germany, 5.6.2012.
  • SSH: A Case Study of Cryptography in Theory and Practice. Africacrypt 2010, Stellenbosch, South Africa, 3.-6.5.2010.
  • Cryptography and Secure Channels. Cryptographer's Track, RSA Conference, San Francisco, USA, 20.-24.4.2009.
  • Non-Interactive Key Distribution and Identity-Based Encryption: An Historical Perspective. ProvSec2008, Shanghai, China, 30.10.-1.11.2008.
  • From Fish to Phishing. Professorial Inaugural Lecture, Royal Holloway, University of London, 2/2008.
  • Certificateless Cryptography I and Certificateless Cryptography II. ICE-EM RNSA 2007 Workshop on Pairing Based Cryptography, Queensland University of Technology, Brisbane, Australia, 6/2007.
  • What can quantum cryptographers learn from history? Workshop on Quantum Cryptography and Computing, Fields Institute, University of Toronto, Toronto, Canada, 10/2006.
  • Identity-based cryptography - Panacea or Pandemonium? 9th Workshop on Elliptic Curve Cryptography (ECC 2005), Technical University of Denmark, Copenhagen, Denmark, 9/2005 .
JavaScript has been disabled in your browser