I actively contributed to the architecture patterns in the Key Management in Cloud Services Guidance document published by the Cloud Security Alliance Key Management Working group.
I actively contributed to the organization and / or program committees of the following events:
- Selected Areas in Cryptography (SAC) 2020 ‒ Cyberweb ‒ Oct 19-23, 2020 [PC member].
- WEWoRC 2015 ‒ Cottbus, Germany, October 2015 [PC member]. (Update: workshop canceled)
- Indocrypt 2014 ‒ New Delhi, India, December 2014 [PC member].
- Selected Areas in Cryptography (SAC) 2014 ‒ Montreal, QC, Canada, August 2014 [PC member].
- MoCrySEn 2013 ‒ Regensburg, Germany, September 2013 [PC member].
- Selected Areas in Cryptography (SAC) 2013 ‒ Vancouver, BC, Canada, August 2013 [PC member].
- CrossFyre 2013 ‒ Leuven, Belgium, June 2013 [Co-organizer].
- Code-based Cryptography Workshop 2013 ‒ Paris-Rocquencourt, France, June 2013 [PC member].
- YACC 2012 ‒ Porquerolles Island, France, September 2012 [PC member].
- CrossFyre 2012 ‒ Eindhoven, the Netherlands, June 2012 [Co-organizer].
- Code-based Cryptography Workshop ‒ Kgs. Lyngby, Denmark, May 2012 [Organizer].
- PKC 2012 ‒ Darmstadt, Germany, May 2012 [PC member].
- PQCrypto 2011 ‒ Taipei, Taiwan, December 2011 [PC member].
- ECRYPT-II Code-based Cryptography Workshop ‒ Eindhoven, the Netherlands, May 2011 [Co-organizer].
- CrossFyre 2011 ‒ Darmstadt, Germany, April 2011 [Co-organizer].
“As such, NIST selected Classic McEliece as a finalist and believes it could be ready for standardization (should NIST choose to select it) at the end of the third round.”
The full report by NIST can be found here.
The Classic McEliece submission in Round 3 is a merger of the Classic McEliece and NTS-KEM submissions to the previous rounds. The submission builds on code-based cryptography with binary Goppa codes, a proposal that has not been broken for more than 40 years.
I wrote a blog post on “How to Make Cryptography Services Work for Your Organization” which was published on the IBM Security Intelligence website. Check it out for some real-world lessons learned.
I completed the Level 2 certification as IBM and Open Group Architect in October 2019. This certification is not a one-time sit-down learn-stuff-by-heart and forget-all-again. Instead, I earned the certification by working continuously as architect for multiple years and by demonstrating my achievements to an internal review board at IBM.
I have led several large projects as security architect. My reference projects concerned architectures for smart metering security, cryptography services for financial services, and enterprise security architectures. I followed a series of trainings on architecture, design thinking, consulting and project management. I also specialized not only in security architecture, but also learned how IT is managed for a specific industry: in my case I focused on banks. Further I earned this certification by giving presentations at international conferences and summer schools, by creating reusable assets, and last but not least by mentoring others.
Classic McEliece Submission to NIST‘s Post-Quantum Standardization together with Daniel J. Bernstein, Tung Chou, Tanja Lange, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Edoardo Persichetti, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, and Wen Wang.
Great to see that my Ph.D. research is relevant for the next crypto standardization, i.e., the parameters in the 2008 paper Attacking and defending the McEliece cryptosystem are still holding up.
Now included as the IND-CCA2 KEM parameters for mceliece6960119:
m = 13, n = 6960, t = 119, l = 256.
Moreover, more PQCrypto code-based crypto submissions also used my complexity computations to determine the security level of their proposals.
I gave a lecture at the ECRYPT winter school in Zurich, Switzerland on how large enterprises manage cryptographic keys and public-key certificates.
I published an IBM Blog post: What to expect from the GDPR readiness assessment.
Together with my IBM Belgium colleagues I organized a crypto workshop for 10-14 year old girls at the Digital Muse Girl Tech Fest in Brussels on Saturday April 30, 2016. We ran 4 workshops where the girls learned how to make and break ciphers – all toy examples of course. Still, lots of fun and great to see that girls enjoy math and crypto!