I wrote a blog post on “How to Make Cryptography Services Work for Your Organization” which was published on the IBM Security Intelligence website. Check it out for some real-world lessons learned.
I completed the Level 2 certification as IBM and Open Group Architect in October 2019. This certification is not a one-time sit-down learn-stuff-by-heart and forget-all-again. Instead, I earned the certification by working continuously as architect for multiple years and by demonstrating my achievements to an internal review board at IBM.
I have led several large projects as security architect. My reference projects concerned architectures for smart metering security, cryptography services for financial services, and enterprise security architectures. I followed a series of trainings on architecture, design thinking, consulting and project management. I also specialized not only in security architecture, but also learned how IT is managed for a specific industry: in my case I focused on banks. Further I earned this certification by giving presentations at international conferences and summer schools, by creating reusable assets, and last but not least by mentoring others.
Classic McEliece Submission to NIST‘s Post-Quantum Standardization together with Daniel J. Bernstein, Tung Chou, Tanja Lange, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Edoardo Persichetti, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, and Wen Wang.
Great to see that my Ph.D. research is relevant for the next crypto standardization, i.e., the parameters in the 2008 paper Attacking and defending the McEliece cryptosystem are still holding up.
Now included as the IND-CCA2 KEM parameters for mceliece6960119:
m = 13, n = 6960, t = 119, l = 256.
Moreover, more PQCrypto code-based crypto submissions also used my complexity computations to determine the security level of their proposals.
I gave a lecture at the ECRYPT winter school in Zurich, Switzerland on how large enterprises manage cryptographic keys and public-key certificates.
I published an IBM Blog post: What to expect from the GDPR readiness assessment.
Together with my IBM Belgium colleagues I organized a crypto workshop for 10-14 year old girls at the Digital Muse Girl Tech Fest in Brussels on Saturday April 30, 2016. We ran 4 workshops where the girls learned how to make and break ciphers – all toy examples of course. Still, lots of fun and great to see that girls enjoy math and crypto!