Ruhr-Uni-Bochum
Cyber Security in the Age of Large-Scale Adversaries

Copyright: CASA

CASA Distinguished Lectures


In our CASA Distinguished Lectures, we welcome selected international and national scientists at the HGI. The lectures of these influential and pioneering guest speakers, usually lasting one hour, are always followed by a discussion with the participants. Our goal is to encourage discussions and open up new perspectives within the field of cybersecurity research.

The lectures usually take place in presence at Ruhr-Universität Bochum. It is also possible to participate digitally in the lectures - they are thus still accessible to interested parties around the world. The access link to the respective event is shared under the information about the speakers.

Stay informed about the Distinguished Lectures

Some of our Distinguished Lectures can also be viewed in full length on our YouTube channel at any time. To stay informed about the upcoming lectures, please subscribe to our newsletter.

 

"How do quantum computers break crypto and what are we doing about it?"

Read more
Cyber Security in the Age of Large-Scale Adversaries

“Experiencing a new Internet Architecture“

Read more

“Threshold Implementations - provably secure countermeasure against physical attacks“

Read more

"When the Rubbish Meets the Road – A Lesson About Data"

Read more

"Engaging Software Developers: Approaches to Research with Professional Teams"

Read more

"Fast Communication Efficient Secure Multi-Party Computation"

Read more

Keeping Secrets at a Distance: New Approaches to Nuclear Monitoring and Verification

Read more

"Model-based security: Connecting models and code"

Read more

"Lightweight Cryptography"

Read more

"Johnny’s Journey Toward Usable Secure E-Mail"

Read more

"Privacy-friendly presence and proximity tracing"

Read more

"In Hardware We Trust? The Struggle, Challenges and Future of Trusted Computing"

 

Read more

"Building Secure Key Exchange Protocols From Passwords"

Read more

"Usable Verifiable Electronic Voting"

Read more

"On the Security of (UWB) Distance Measurement"

Read more

"Differentially Oblivious Protocols for Differential Privacy"

Read more

"Measuring and Enhancing the Security of Machine Learning"

Read more

"Learning from the People: From Normative to Descriptive Solutions to Problems in Security, Privacy & Machine Learning"

Read more

"Who's Calling? Characterizing and Addressing Telephone Network Abuse"

Read more

"Intriguing Properties of Adversarial ML Attacks in the Problem Space"

Read more

“SNARKs for Blockchains”

Read more

"Property Driven Hardware Security"

Read more

"Extraction of Complex DNN Models: Real Threat or Boogeyman?"

Read more

"We Need A Discipline of Cyber Public Health"

Read more

Understanding and Mitigating Technology-Enabled Misinformation: Present and Future

Read more

"Deep Learning Under Resource Constraints"

Read more

"Attacks on ECDSA with nonce leakage: recent progress and perspectives"

Read more

"Learning the Language of Failure"

Read more

"Wild Patterns: Ten Years after the Rise of Adversarial Machine Learning"

Read more

"On Deck Functions"

Read more

"Security Testing Hard to Reach Code"

Read more

"Toward a Quantum-Safe Future"

Read more

"From hash-function security in a post-quantum world to SPHINCS+"

Read more

"Post-quantum crypto on embedded microcontrollers"

Read more

"Sorting integer arrays: security, speed, and verification"

Read more

"A human-centered approach to the secure application of cryptography"

Read more

"Trapdoor Hash Functions and their Applications"

Read more

"Transient Execution Attacks"

Read more

"Strong network anonymity with mixnets"

Read more

"Expressive, Robust and Accountable Machine Learning for Real-world Data"

Read more

"When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise"

Read more

"A User-Centric Approach to Securing the HTTPS Ecosystem"

Read more