International Conference on
Applied Cryptography and Network Security

List of Invited/Keynote Speakers (2003 - 2022)

Raluca Ada Popa (2022)

Secure Computation in Practice
Ross Anderson (2021)
Cryptography and the Changing Landscape of Payment Fraud
Giuseppe Ateniese (2020)
Is AI taking over the world? No, but it’s making it less private.
Gilles Barthe (2018)
Formal Verification of Side-Channel Resistance
Karthikeyan Bhargavan (2017)
Towards High-Assurance Cryptographic Software
Srdjan Capkun (2016)
Securing Positioning: From GPS to IoT
Ed Dawson (2011)
Authorisation Models for Dynamic Environments
Robert Deng (2006)
Inference Control and Private Information Retrieval - Two Sides of One Tapestry
Srini Devadas (2019)
Toward Secure High-Performance Computer Architectures
Juan Garay (2019)
Foundational Aspects of Blockchain Protocols
Craig Gentry (2009)
Fully Homomorphic Encryption Using Ideal Lattices
Matthew Green (2015)
From Strong Mathematics to Weak Cryptography
Nadia Heninger (2014)
How not to Generate Random Numbers?
Susan Hohenberger (2022)
Chosen Ciphertext Security from Injective Trapdoor Functions
Antoine Joux (2009)
Can We Settle Cryptography’s Hash?
Angelos Keromytis (2009)
Voice over IP: Risks, Threats and Vulnerabilities
Hugo Krawzcyk (2008)
Getting Serious about Key Derivation Functions
Anja Lehmann (2021)
Privacy-Preserving Authentication: Concepts, Applications, and New Advances
Refik Molva (2011)
Privacy in Social Networks: Can P2P Help?
Wenbo Mao (2007)
Grid Security from Two Levels of Virtualization
Victor Miller (2008)
Elliptic Curves and Cryptography: A 23 Year Perspective
David Naccache (2004)
Exploiting Side Information
Peng Ning (2012)
Cloud Computing Infrastructure Security
Bryan Parno (2013)
Bootstrapping Cloud Security
Adrian Perrig (2020)
Global Communication Guarantees in the Presence of Adversaries
Mike Reiter (2009)
Better Architectures and New Applications for Coarse Network Monitoring
Phillip Rogaway (2014)
The Emergence of Authenticated Encryption
Avi Rubin (2005)
Security and Privacy Issues in RFID Technologies
Ahmad-Reza Sadeghi (2013)
Selected Topics in Mobile Security and Trusted Computing
Nat Sakimura (2021)
Digital Being
George Sherman (2005)
Information Security Technologies as Enablers of Banking Systems
Vitaly Shmatikov (2015)
All Your SSL are Belong to Us
Victor Shoup (2005)
Sequence of Games: A Technique for Taming Complexity in Security Proofs
Haya Shulman (2018)
On RPKI’s Deployment and Security of BGP
Sal Stolfo (2008)
Insider Threat Detection: Host and Network Monitoring Techniques
Francois Theberge (2013)
Ensemble Clustering for Graphs-Based Data
Doug Tygar (2017)
Adversarial Machine Learning
Bogdan Warinschi (2016)
Foundations of Hardware-Based Attested Computation and Applications of SGX
Hongjun Wu (2012)
JH in the NIST Hash Function Competition
Yiqun Lisa Yin (2005)
Recent Advances in Hash Function Research
Moti Yung (2003)
Key-Insulated Public Key Cryptosystems
Moti Yung (2012) Applied Cryptography and Network Security - 10 years in the past and 10 years in the future
Jianying Zhou (2003)
Non-repudiation in e-Commerce and e-Government

Maintained by Jianying Zhou
Last updated in July 2022