This page contains the list of (invited) talks I gave on different occasions.

Talks

  1. Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility.
    ACM ASIACCS 2025, Hanoi, Vietnam, 27.08.2025 [PDF]

  2. Secure Cloud through Cryptography: Research Approaches to Encryption and Authentication.
    Invited talk. RI CODE Annual Conference, Munich, Germany, 09.07.2025 [YouTube (in German)]

  3. Asynchronous Remote Key Generation (ARKG) and its Applications.
    Invited talk. SKECH 2024: Secure Key Exchange and Channel Protocols, Bertinoro, Italy, 05.06.2024

  4. Selected Topics in Private Data Processing.
    Invited lectures. Privacy Computing Course @ Graduate Summer School, Shandong University, Virtual/ China, 18.07.2023

  5. Asynchronous Remote Key Generation and its Applications.
    Invited talk. ASSURED Scientific Workshop, TU Darmstadt, Germany, 26.04.2023

  6. Asynchronous Remote Key Generation for Account Recovery and Delegation in WebAuthn.
    Invited talk. Codes and Cryptography Seminar, Paderborn University, Germany, 16.12.2022

  7. On Account Recovery and Delegation in WebAuthn.
    Future of Personal Identification (FoPI) 2021 @ IEEE EuroS&P 2021, Virtual / Vienna, Austria, 06.09.2021

  8. Security Challenges for Satellite Constellations and Communications.
    Invited speaker and panelist. CYSAT 2021, Virtual / Davos, CH, 18.03.2021 [YouTube]

  9. Security in Future Technologies: Core Capabilities and Threats.
    Invited panelist. EIT Digital Tech Networking Event, London, UK, 03.10.2019

  10. Reputation and Privacy in Gig.
    Invited talk. NCSC Annual ACE-CSR Conference, Stratford-upon-Avon, UK, 26.06.2019

  11. Authentication with Privacy for Connected Cars: A research perspective.
    Invited talk. Cyber Security Focus Day @ Connected Cars'16, London, UK, 27.06.2016

  12. Blind Password Registration for Verifier-based PAKE.
    ACM AsiaPKC 2016 @ ACM ASIACCS 2016, Xian, China, 30.05.2016

  13. A Modular Framework for Multi-Factor Authentication and Key Exchange.
    1st International Conference on Research in Security Standardisation (SSR 2014), Egham, UK, 17.12.2014

  14. Secure Modular Password Authentication for the Web using Channel Bindings.
    1st International Conference on Research in Security Standardisation (SSR 2014), Egham, UK, 17.12.2014

  15. Cryptography and Passwords.
    Invited talk. SafeNet Crypto Club, London, UK, 05.12.2014

  16. Cryptographic Password Authentication with TLS Channel Bindings.
    Invited talk. SnT research seminar, University of Luxembourg, 20.11.2014

  17. Zero-Knowledge Policy Checks for Passwords and Verifier-Based PAKE.
    Invited talk. SKECH@BiCi: Secure Key Exchange and Channel Protocols, Bertinoro, Italy, 05.06.2014

  18. Oblivious Password Authentication for the Web.
    Invited talk. Number Theory and Cryptography, Darmstadt, Germany, 22.11.2013

  19. A Framework for Multi-Factor Authentication.
    CryptoForma Network, 9th Meeting, Guildford, UK, 29.11.2012

  20. Relationships among Privacy Notions for Signatures.
    Dagstuhl-Seminar "Privacy-Oriented Cryptography", Dagstuhl, Germany, 20.09.2012

  21. Publicly Verifiable Ciphertexts.
    8th International Conference on Security and Cryptography for Networks (SCN 2012), Amalfi, Italy, 06.09.2012

  22. Forward-Secure Hierarchical Predicate Encryption.
    5th International Conference on Pairing-Based Cryptography (Pairing 2012), Cologne, Germany, 17.05.2012

  23. Pseudorandom Signatures.
    CryptoForma Network, 7th Meeting, Edinburgh, UK, 01.03.2012

  24. Group Signature with Constant Revocation Costs for Signers and Verifiers.
    10th International Conference on Cryptology and Network Security 2011, Sanya, China, 11.12.2011

  25. Non-Interactive and Re-Usable UC String Commitments with Adaptive Security.
    ASIACRYPT 2011, Seoul, Korea, 07.12.2011 [PDF]
    Invited talk. Crypto Seminar, IBM Research T.J. Watson, NY, USA, 01.12.2011

  26. Social Authentication with Privacy.
    Invited talk. Royal Holloway, University of London, UK, 23.06.2011

  27. Privacy-Oriented Cryptography for Social Clouds.
    Invited talk. LACS Seminar, University of Luxembourg, 19.05.2011

  28. Cryptographic Approach to Private Social Clouds.
    Invited talk. Séminaire de Cryptographie, CELAR/Université de Rennes 1, Rennes, France, 06.05.2011

  29. Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation.
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), Hong Kong, 24.03.2011 [PDF]

  30. Cryptographic Treatment of Private User Profiles.
    15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, St. Lucia, 04.03.2011 [PDF]

  31. Affiliation-Hiding Authentication.
    Invited talk. Royal Holloway, University of London, UK 21.10.2010

  32. Privacy via Group Authentication.
    Invited talk. Goethe University of Frankfurt, Germany 01.09.2010

  33. Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
    8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, 23.06.2010 [PDF]

  34. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
    AFRICACRYPT 2010, Stellenbosch, South Africa, 05.05.2010 [PDF]

  35. Privacy-Preserving Admission to Mobile Peer-to-Peer Groups.
    8th IEEE Intl. Conference on Pervasive Computing and Communications, MP2P Workshop, Mannheim, Germany, 02.04.2010 [PDF]

  36. Fully Robust Tree-Diffie-Hellman Group Key Exchange.
    8th International Conference on Cryptology and Network Security, Kanazawa, Ishikawa, Japan, 14.12.2009 [PDF]

  37. Parameterwahl für sichere zeitgemäße Verschlüsselung.
    Invited talk. CAST e.V. Workshop "Datenschutz", Darmstadt, Germany, 29.10.2009 [PDF]

  38. Securing Roaming Access Inside Wireless Mesh Networks.
    10th International Workshop on Information Security Applications, Busan, South Korea, 27.08.2009 [PDF]

  39. Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
    7th International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, France, 02.06.2009 [PDF]

  40. Non-Interactive Computation of Pairwise Keys in Group Diffie-Hellman Protocols.
    Invited talk. Workshop on Cryptographic Protocols and Public-Key Cryptography, BiCi, University Residential Center, Bertinoro (Forlì-Cesena), Italy, 26.05.2009

  41. Authenticated Wireless Roaming via Tunnels.
    Invited talk. GI/HGI Wireless Security 2009, Bochum, Germany, 13.03.2009 [PDF]

  42. The Concept of Wireless Roaming via Tunnels: Authentication and Key Establishment Issues.
    Invited talk. BCRYPT PhD Day, Leuven, Belgium, 13.10.2008

  43. Fully Robust Group Key Exchange in the Presence of Opening Attacks.
    Invited talk. ACAC Seminar, Centre for Advanced Computing - Algorithms and Cryptography, Macquarie University, Sydney, Australia, 11.07.2008

  44. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
    13th Australasian Conference on Information Security and Privacy, Wollongong, Australia, 07.07.2008

  45. Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
    ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 20.03.2008

  46. Securing Group Key Exchange against Strong Corruptions.
    ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 19.03.2008

  47. On Security Models and Compilers for Group Key Exchange Protocols.
    2nd International Workshop on Security, Nara, Japan, 30.10.2007

  48. Provably Secure Framework for Information Aggregation in Sensor Networks.
    7th International Conference on Computational Science and Applications, Kuala Lumpur, Malaysia, 27.08.2007

  49. Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
    4th International Conference on Autonomic and Trusted Computing, Hong Kong, China, 13.07.2007

  50. Browser-based Authentication Protocols for Naive Users.
    Western European Workshop on Research in Cryptology, Bochum, Germany, 06.07.2007

  51. Security-Enhancing Compilers for Group Key Exchange Protocols.
    Invited talk. UCL Crypto Group Seminar, Louvain-la-Neuve, Belgium, 20.06.2007

  52. Strong Corruptions in Group Key Exchange.
    Invited talk. Workshop on Cryptographic Protocols, BiCi, University Residential Center, Bertinoro (Forli-Cesena), Italy 08.03.2007

  53. Kryptographie und Datensicherheit.
    Invited tutorial. Im Rahmen des Weiterbildungsstudiums "IT-Sicherheit- Administration und Sicherheit von IT-Systemen und -Netzwerken", Ruhr-Universität Bochum, 10.02.2007

  54. A Security Model for Group Key Exchange.
    ECRYPT-PROVILAB Meeting, Horst Görtz Institute for IT Security, Bochum, Germany 05.10.2006

  55. Group Signatures for Federated Systems.
    Invited talk. Séminaire de Cryptographie, CELAR/Université de Rennes 1, Rennes, France 02.06.2006

  56. New Paradigms for Group Signatures in Federated Systems.
    4. Kryptotag, Horst Görtz Institute for IT Security, Bochum, Germany 11.05.2006 [PDF]

  57. Property-Based Taming of Lying Mobile Nodes.
    IEEE International Workshop on Trusted and Autonomic Computing Systems, Vienna, Austria, 19.04.2006

  58. Linkable Democratic Group Signatures.
    2nd Information Security Practice and Experience Conference, Hangzhou, China, 13.04.2006

  59. Democratic Group Signatures.
    ACM Symposium on Information, Computer and Communications Security, Taipei, Taiwan, 21.03.2006

  60. Kryptographie und Datensicherheit.
    Invited tutorial. Weiterbildungsstudium "IT-Sicherheit- Administration und Sicherheit von IT-Systemen und -Netzwerken", Ruhr-Universität Bochum, 17/02/2006

  61. CGKA Protocols, Revisited for Mobile Ad-Hoc Groups.
    International Workshop on Wireless and Sensor Networks Security, Washington, USA, 07.11.2005

  62. Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
    International Workshop on Security in Networks and Distributed Systems, Fukuoka, Japan, 21.07.2005

  63. Binary Trees in Group Communication Security.
    Invited talk. PG seminar "Algebra and Geometry", Chair for Algebra and Geometry, Ruhr University Bochum, Germany, 17.12.2005

  64. Pseudonym Generation Scheme for Ad-Hoc Group Communication.
    European Workshop on Security in Ad-Hoc and Sensor Networks, Heidelberg, Germany, 05.08.2004