Ruhr-Uni-Bochum
Cyber Security in the Age of Large-Scale Adversaries

CASA Distinguished Lectures

In our CASA Distinguished Lectures, we welcome selected international and national scientists at the HGI. The lectures of these influential and pioneering guest speakers, usually lasting one hour, are always followed by a discussion with the participants. Our goal is to encourage discussions and open up new perspectives within the field of cybersecurity research.

Due to COVID-19, the lectures will be held online - and will, therefore, be accessible to people all over the world. You will find the access link to the events below the speakers' information.

The events in this summer term will be held in cooperation with the project "DFG 2020 – Because research matters". Find out more about it here.

Stay informed about the Distinguished Lectures

Some of our Distinguished Lectures can also be viewed in full length on our YouTube channel at any time. To stay informed about the upcoming lectures, please subscribe to our newsletter.

 

Cyber Security in the Age of Large-Scale Adversaries

"Learning from the People: From Normative to Descriptive Solutions to Problems in Security, Privacy & Machine Learning"

Read more

"Extraction of Complex DNN Models: Real Threat or Boogeyman?"

Read more
Cyber Security in the Age of Large-Scale Adversaries

"We Need A Discipline of Cyber Public Health"

Read more

Understanding and Mitigating Technology-Enabled Misinformation: Present and Future

Read more

Attacks on ECDSA with nonce leakage: recent progress and perspectives

Read more

"Learning the Language of Failure"

Read more

Wild Patterns: Ten Years after the Rise of Adversarial Machine Learning

Read more

On deck functions

Read more
[Translate to Englisch:]

Security Testing Hard to Reach Code

Read more

Toward a Quantum-Safe Future

Read more

From hash-function security in a post-quantum world to SPHINCS+

Read more

Post-quantum crypto on embedded microcontrollers

Read more

Sorting integer arrays: security, speed, and verification

Read more

A human-centered approach to the secure application of cryptography

Read more
[Translate to Englisch:]

Trapdoor Hash Functions and their Applications

Read more
[Translate to Englisch:]

Transient Execution Attacks

Read more

Strong network anonymity with mixnets

Read more

Expressive, Robust and Accountable Machine Learning for Real-world Data

Read more

When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise

Read more

A User-Centric Approach to Securing the HTTPS Ecosystem

Read more

User login

Enter your username and password here in order to log in on the website
Login