talks‎ > ‎


  • Multiparty computation protocols [pdf]
    Warsaw 9.5.03 Quo vadis cryptography? tutorial

  • On Generating the Initial Key in the Bounded-Storage Model [pdf,ps]
    Interlaken, May 2004, Eurocrypt 04 (the paper is available here)

  • Multiparty computations, introduction [pdf]
    Warsaw, May 2004, IMPAN cryptology Seminar

  • Forward-Security in the Limited Communication Model [ppt]
    La Sapienza, Rome, May 2006

  • Intrusion Resilience via the Bounded-Storage Model [ppt]
    TCC 2006, New York, USA

  • On Forward-Secure Storage [ppt]
    Crypto 2006, Santa Barbara, USA

  • Introduction to the Bounded-Retrieval Model
    WCP 2007: Workshop on Cryptographic Protocols, Bertinoro, March 2007 [ppt]
    University of Salerno, March 2007 [ppt] -- extended version

  • Private Information Retrieval
    Sm@rt seminar, La Sapienza, May 2007 [ppt]

  • Leakage-Resilient Cryptography
    FOCS 2008 [pptx,pdf]
    WPK 2009, 2009 Workshop on Cryptographic Protocols and Public-Key Cryptography [pptx,pdf]

  • Cryptography on Non-Trusted Machines
    DYNAS 2009, International Workshop on DYnamic Networks: Algorithms and Security September 5, 2009, Wroclaw, Poland, invited talk [pptx,pdf]

  • A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
    The 4th International Conference on Information Theoretic Security, ICITS 2009, December 3 - 6, 2009. Shizuoka, Japan [ pptx, pdf, view]

  • On the only computation leaks information paradigm
    Provable Security against Physical Attacks Lorentz Center, the Netherlands, February 2010 [pptx, pdf, view ]