Ruhr-Uni-Bochum
Cyber Security in the Age of Large-Scale Adversaries

CASA Distinguished Lectures

In our CASA Distinguished Lectures, we welcome selected international and national scientists at the HGI. The lectures of these influential and pioneering guest speakers, usually lasting one hour, are always followed by a discussion with the participants. Our goal is to encourage discussions and open up new perspectives within the field of cybersecurity research.

Due to COVID-19, the lectures will be held online - and will, therefore, be accessible to people all over the world. You will find the access link to the events below the speakers' information.

Stay informed about the Distinguished Lectures

Some of our Distinguished Lectures can also be viewed in full length on our YouTube channel at any time. To stay informed about the upcoming lectures, please subscribe to our newsletter.

 

"Johnny’s Journey Toward Usable Secure E-Mail"

Read more
Cyber Security in the Age of Large-Scale Adversaries

"Privacy-friendly presence and proximity tracing"

Read more

"In Hardware We Trust? The Struggle, Challenges and Future of Trusted Computing"

 

Read more
[Translate to Englisch:]

"Building Secure Key Exchange Protocols From Passwords"

Read more

"Usable Verifiable Electronic Voting"

Read more

"On the Security of (UWB) Distance Measurement"

Read more

"Differentially Oblivious Protocols for Differential Privacy"

Read more

"Learning from the People: From Normative to Descriptive Solutions to Problems in Security, Privacy & Machine Learning"

Read more

"Who's Calling? Characterizing and Addressing Telephone Network Abuse"

Read more

"Intriguing Properties of Adversarial ML Attacks in the Problem Space"

Read more

"Property Driven Hardware Security"

Read more

"Extraction of Complex DNN Models: Real Threat or Boogeyman?"

Read more

"We Need A Discipline of Cyber Public Health"

Read more

Understanding and Mitigating Technology-Enabled Misinformation: Present and Future

Read more

"Deep Learning Under Resource Constraints"

Read more

"Attacks on ECDSA with nonce leakage: recent progress and perspectives"

Read more

"Learning the Language of Failure"

Read more

"Wild Patterns: Ten Years after the Rise of Adversarial Machine Learning"

Read more

"On Deck Functions"

Read more

"Security Testing Hard to Reach Code"

Read more

"Toward a Quantum-Safe Future"

Read more

"From hash-function security in a post-quantum world to SPHINCS+"

Read more

"Post-quantum crypto on embedded microcontrollers"

Read more

"Sorting integer arrays: security, speed, and verification"

Read more

"A human-centered approach to the secure application of cryptography"

Read more

"Trapdoor Hash Functions and their Applications"

Read more

"Transient Execution Attacks"

Read more

"Strong network anonymity with mixnets"

Read more

"Expressive, Robust and Accountable Machine Learning for Real-world Data"

Read more

"When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise"

Read more

"A User-Centric Approach to Securing the HTTPS Ecosystem"

Read more