Advanced Data-Centric Data Protection for AI and Machine Learning. Panel presentation at Leuven AI Law & Ethics Conference (LAILEC) 2021. Virtual Conference. 2020.11.18.
Crypto Agility in the Financial Sector – A Practitioner’s View. ISF World Congress 2020. Online Seminar. 2020.11.10.
Protecting Customer Data on Multi-Hybrid Cloud – Case Study. Thales EMEA Virtual Partner Summit 2020. Virtual Conference. 2020.10.12.
The Cost of a Data Breach : from cybersecurity attacks to security operations. Invited Lecture for “Telecommunications and Security Management” at KU Leuven. Leuven, Belgium. 2020.09.29.
Developing Crypto Agility : a practical view. ISF Francophone Chapter. Virtual Conference. 2020.01.09.
Implementing a Crypto Services Strategy at ABN AMRO Bank. (joint talk with Tiago Teles, ABN AMRO Bank). Real World Crypto 2020. New York, NY, United States. slides youtube (starts minute 0:56:00) 2019.11.05.
Cryptography Services 2020 and Beyond. 21st ISSE Conference 2019. Keynote. Brussels, Belgium. 2019.06.06.
Enterprise Security. COSIC Course – International Course on Cyber Security and Cryptography. Invited Lecture. Leuven, Belgium. 2019.05.21.
Transport Layer Security / Enterprise Key and Certificate Management. ISACA TLS Round Table. Lecture / training for ISACA. Brussels, Belgium. 2019.05.08.
Crypto Agility. Regional Conference GSE Belux. Elewijt, Belgium. 2018.11.06.
Cryptography for Enterprises & Quantum Risk Assessment. 20th ISSE Conference 2018. Keynote. Brussels, Belgium. 2018.01.08.
Enterprise Key and Certificate Management. ECRYPT-CSA School on Societal Aspects of Cryptology and on Business and Innovation in Crypto. Invited Talk. Zurich, Switzerland. 2016.12.19.
Risk-based Security Architecture for Data Protection. LSEC Event on GDPR. Brussels, Belgium. 2016.07.15.
Architectures for the IoT. IPICS Academic Summer School. (joint talk with Stefaan Van daele). Leuven, Belgium. 2015.05.18. Member of
3TU.NIRICT Panel: Cyber Security – Secure Information Sharing. Triple Helix. 3TU Innovation & Technology Conference 2015. Inspirations for the Research Agenda 2025. Rotterdam, The Netherlands.
Weaknesses in Smart Metering Cryptography. Cryptography Working Group. Utrecht, The Netherlands. 2013.12.17.
Cryptanalysis of Code-based Cryptography. Fourteenth IMA International Conference on Cryptography and Coding. Oxford, United Kingdom. Invited tutorial. slides 2013.06.19. Lectures on
Elliptic-Curve Cryptography and NTRU. Ph.D. course “Theoretical and Practical Topics in Resource-Efficient Cryptography.” Kongens Lyngby, Denmark. 2013.06.08.
The k-sum Problem. Lecture at Ice Break. Reykjavik, Iceland. slides 2013.04.09.
List Decoding. MSR Cryptography Group Seminar. Redmond, WA, United States. 2013.03.14.
Applications of Information-set Decoding in Cryptanalysis. MSR Talk Series. Redmond, WA, United States. (almost all) slides 2013.01.16.
Algebraic-Geometric Codes for Code-based Cryptography. HGI Colloquium. Bochum, Germany. Invited talk. slides 2012.11.01.
AG codes in code-based cryptography (or how to end a bad reputation). Trends in Coding Theory. Ascona, Switzerland. slides 2011.12.02.
Wild McEliece Incognito. PQCrypto 2011. Taipei, Taiwan. slides 2011.09.29.
Curves, Codes, and Cryptography. DTU crypto group seminar. Kgs. Lyngby, Denmark. 2011.09.20.
Code-based Cryptography. Elliptic Curve Cryptography conference (ECC 2011). Nancy, France. Invited talk. slides 2011.08.16.
Playing “Spot the Difference” with Springer. CRYPTO 2011 Rump Session. Santa Barbara, CA, United States. slides 2011.04.14.
An Introduction to Post-Quantum Cryptography/Code-based Cryptography. CrossFyre. Darmstadt, Germany. slides 2011.04.01.
Wild McEliece Incognito. Séminaire de Cryptographie. Rennes, France. Invited talk. slides 2010.11.18.
Ball-collision decoding. Oberseminar Cryptography and Computer Algebra. Darmstadt, Germany. Invited talk. slides 2010.11.05.
Wild McEliece. Discrete Mathematics Seminar. Kgs. Lyngby, Denmark. slides 2010.10.28.
Off-Shor. JQI/NIST Quantum Information Workshop. College Park, MD, United States. Invited talk. slides 2010.10.01.
Wild McEliece. EIDMA/DIAMANT Cryptography Working Group. Utrecht, the Netherlands. Same slides as for the Intercity Number Theory Seminar. 2010.09.17.
Wild McEliece. Intercity Number Theory Seminar. Eindhoven, the Netherlands. slides 2010.08.12.
Wild McEliece. Selected Areas in Cryptography (SAC) 2010. Waterloo, Canada. slides 2010.05.28.
Ball-collision decoding. Recent Results Session PQCrypto 2010. Darmstadt, Germany. slides 2010.05.26.
Information-set decoding for linear codes over F q. PQCrypto 2010. Darmstadt, Germany. slides 2010.04.19.
Algebraic construction of the Elkies factor. Workshop on Counting Points: Theory, Algorithms and Practice. Montréal, Canada. slides 2010.04.12.
Code-based Cryptography. Workshop on Computer Security and Cryptography. Montréal, Canada. Invited talk. slides 2009.09.10.
FSBday: Implementing Wagner’s generalized birthday attack against the SHA-3 round-1 candidate FSB. Joint talk by Peter Schwabe and me at SHARCS 2009. Lausanne, Switzerland. slides 2009.07.17.
A successful attack on the McEliece cryptosystem with original parameters. S. Soria, Spain. 3CM 2009 – Applied Computational Algebraic Geometric Modelling slides 2009.06.16.
FSBday: Implementing Wagner’s generalized birthday attack against the SHA-3 candidate FSB. Joint talk by Peter Schwabe and me at the Code-based crypto day at INRIA. Paris-Rocquencourt, France. slides 2009.06.12.
Attacking the McEliece cryptosystem. Google Europe Anita Borg Scholarship Retreat 2009. Zürich, Switzerland. poster 2009.05.12.
Explicit Bounds for Generic Decoding Algorithms for Code-Based Cryptography. WCC 2009. Ullensvang, Norway. slides 2009.04.28.
A brief look at the 56 SHA-3 submissions. Joint “talk” by Michael Naehrig, Peter Schwabe, and me during the rump session of Eurocrypt 2009. Cologne, Germany. slides lyrics and chords 2009.04.01.
Explicit Bounds for Generic Decoding Algorithms for Code-Based Cryptography. EIPSI seminar. Eindhoven, the Netherlands. slides 2009.02.20.
Advances in Information-Set Decoding. EIDMA/DIAMANT Cryptography Working Group. Utrecht, the Netherlands. slides 2008.10.18.
Attacking and defending the McEliece cryptosystem. PQCrypto 2008 ‒ 2nd Workshop on Post-Quantum Cryptography . Cincinnati, OH, United States. slides 2008.10.01.
Attacking and defending the McEliece cryptosystem. EIPSI seminar. Eindhoven, the Netherlands. slides 2008.09.17.
Counting points on elliptic curves over F q. DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography. Eindhoven, the Netherlands. slides 2008.07.10.
Edwards Curves. S. Soria, Spain. 3CM 2008 – Algebraic Coding Theory slides 2008.06.20.
Edwards Curves. Séminaire de Cryptographie. Rennes, France. Invited talk. slides 2007.12.11.
Optimizing double-base elliptic curve single-scalar multiplication. INDOCRYPT 2007 ‒ 8th International Conference on Cryptology in India. Chennai, India. slides 2007.11.29.
Optimizing double-base elliptic curve single-scalar multiplication. DIAMANT/EIDMA Symposium November 2007. Soesterberg, the Netherlands. slides 2007.11.23.
Edwards Curves. CACAO Seminar, LORIA institute. Nancy, France. slides