Invited talks and lectures:


Guest lecturer at Amsterdam University College
Quantum Cryptography
Amsterdam University College, Netherlands, 19 March 2018
Available files:   60min presentation (pptx)

Invited Tutorial Speaker at QIP 2018
Quantum Cryptography beyond Key Distribution
Amsterdam, Netherlands, 13 January 2018
Available files:   presentation (pptx)     (without animations).
Mindmap: on Github

Invited Speaker at CWI in bedrijf 17
Quantum Cryptography
Amsterdam, Netherlands, 18 May 2017
Available files:   presentation (pptx)     (without animations).

Invited Speaker at Leve De Wiskunde 2017
Quantum Cryptografie -- een nieuwe oplossing voor relatieproblemen? ;-)
Amsterdam, Netherlands, 7 April 2017


Invited Speaker at ICT Open 2017
Quantum Cryptography
Amersfoort, Netherlands, 21 March 2017
Available files:   presentation (pptx)     (without animations).

Invited Speaker at QuICS seminar
Quantum Homomorphic Encryption for polynomial-sized circuits
QuICS, University of Maryland, USA, 7 March 2017
Available files:   presentation (pptx)     (without animations).

Invited Speaker at Winter'17 QuantumDay@Portland
Quantum Cryptography
Portland, OR, USA, 13 January 2017
Available files:   presentation (pptx)     (without animations).

Invited Speaker at Trustworthy Quantum Computation 2016
Quantum Homomorphic Encryption
Shanghai, China, 29 June 2016
Available files:   presentation (keynote)     (without animations).

Invited Speaker at AwesomeIT 2016
Quantum Cryptography
Amsterdam, 7 April 2016
Available files:   presentation (pptx)     (without animations).

Speaker at Symposium on the Work of Ivan Damgård, Aarhus 2016
Quantum homomorphic encryption for polynomial-sized circuits
University of Aarhus, Denmark, 1 April 2016
Available files:   presentation (pptx)     (without animations).

Invited speaker at Focus Session of Physics@FOM, Veldhoven 2016
Quantum Cryptography
Focus Session "The physics of quantum information", Veldhoven, 20 January 2016
Available files:   presentation (pptx)     (without animations).

Contributed talk at 32C3
Quantum Cryptography
32. Chaos Communication Congress, 28 December 2015
Available files:   presentation (pptx)     (without animations)

Guest lecture about quantum cryptography for the Master System & Network Engineering
Quantum Cryptography
University of Amsterdam, 16 November 2015
Available files:   presentation (pptx)     (without animations).

Invited speaker at Workshop on Quantum Cryptography and Quantum Information
Semantic Security and Indistinguishability in the Quantum World
University of Aarhus, Denmark, 19 October 2015
Available files:     (slides by Tommaso Gagliardoni)

Invited speaker at DESDA symposium 2015 about Quantum Information
Quantum Cryptography
University of Nijmegen, 5 June 2015
Available files:   presentation (pptx)     (without animations).

Invited speaker at Advances in Quantum Cryptography Workshop
Position-Based Quantum Cryptography
Institut Henri Poincare, Paris, France, March 23-24, 2015
Available files:   presentation (pptx)   .

Guest lecture at cryptografie for bachelor students
Quantum Cryptography
University of Amsterdam, 10 March 2015
Available files:   presentation (pptx)     (without animations).

Guest lecturer at Amsterdam University College
Quantum Cryptography
Amsterdam University College, Netherlands, 23 September 2013
Amsterdam University College, Netherlands, 24 February 2014
Available files:   60min presentation (pptx)

Invited speaker at Tsinghua-Aarhus CTIC Workshop on Quantum Information Science
Position-Based Quantum Cryptography
Tsinghua University, Beijing, China, May 21-24, 2012

Invited speaker at Workshop on Post-Quantum Security Models
Telecom ParisTech, Paris, France, October 11-12, 2010
Quantum Cryptography Beyond Key Distribution
covering the state of the art of the noisy-storage model and position-based quantum cryptography
Available files:   30min presentation (pptx)

Invited speaker at Workshop on Theory and Realisation of Practical Quantum Key Distribution
Institute for Quantum Computing, Unversity of Waterloo, June 14-17, 2010
Quantum Cryptography Beyond Key Distribution
Available files:   30min presentation (pptx)

Invited speaker at Workshop on Classical and Quantum Information Assurance
Schloss Dagstuhl, Germany, July 26-31, 2009
Limited-Quantum-Storage Cryptography: From Theory to Practice
Available files:   30min presentation (pptx)     30min presentation (pdf)   (without animations).

Invited speaker at Cryptography Workshop
Schloss Dagstuhl, Germany, September 17-21, 2007
A Tight High-Order Entropic Uncertainty Relation with Applications
Available files:   30min presentation (ppt)   (requires TeX4PPT plugin),     30min presentation (pdf)   (without animations).

Invited speaker at Tropical QKD, a workshop on Theory and Realisation of Practical Quantum Key Distribution
Institute for Quantum Computing, Waterloo, Canada, June 11-14, 2007
A Tight High-Order Entropic Uncertainty Relation with an Application to Quantum Key Distribution


Invited speaker at QIP 2006, the 9th workshop on Quantum Information Processing
Paris, January 16-20, 2006
Cryptography in the Bounded Quantum-Storage Model
Available files:   45min presentation (ppt)   (requires TexPoint plugin),     45min presentation (pdf)   (without animations).


Conference talks:

QCrypt 2016, 6th international conference on quantum cryptography
Washington DC, September 12-16, 2016
Computational Security of Quantum Encryption
20min presentation (Powerpoint)   20min presentation (pdf)   (without animations).

TQC 2014, 9th Conference on the Theory of Quantum Computation, Communication and Cryptography
Singapore, May 21-23, 2014
On the Parallel Repetition of Multi-Player Games: The No-Signaling Case
20min presentation (Keynote)   (zipped Keynote)

ASIACRYPT 2009, the 15th Annual International Conference on the Theory and Application of Cryptology and Information Security
Tokyo, Japan, December 6-10, 2009
On the Power of Two-Party Cryptography

TCC 2009, the 6th Theory of Cryptography Conference
San Francisco, CA, USA, March 15-17, 2009
Composing Quantum Protocols in a Classical Environment

QIP 2009, the 12th workshop on Quantum Information Processing
Santa Fe, New Mexico, January 12-16, 2009
The Operational Meaning of Min- and Max-Entropy

TCC 2008, the 5th Theory of Cryptography Conference
New York University, USA, March 19-21, 2008
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Adversary
Available file:   20min presentation (ppt)   (PowerPoint 2007)

QIP 2008, the 11th workshop on Quantum Information Processing
New Delhi, India, December 17-21, 2007
A Tight High-Order Entropic Uncertainty Relation with Applications
Secure Identification and QKD in the Bounded-Quantum-Storage Model
Available file:   40min presentation (ppt)

CRYPTO 2007, 27th Annual International Cryptology Conference
Santa Barbara, CA, USA, August 19-23, 2007
A Tight High-Order Entropic Uncertainty Relation with Applications


CRYPTO 2006, 26th Annual International Cryptology Conference
Santa Barbara, CA, USA, August 20-24, 2006
Oblivious Transfer and Linear Functions
Available files:   20min presentation (ppt)   (requires TeX4PPT plugin),     20min presentation (pdf)   (without animations).


FOCS 2005, 46th Annual IEEE Symposium on Foundations of Computer Science
Pittsburgh, October 22-25, 2005
Cryptography in the Bounded Quantum-Storage Model
Available files:   15min presentation (ppt)   (requires TexPoint plugin).




Workshop talks:

Workshop on Cryptography from Storage Imperfections
Caltech, Pasadena, USA, March 20-22, 2010
Cryptographic Primitives and the Noisy-Storage Model
Available file:   40min presentation (ppt)   (PowerPoint 2007)
Simple Protocols for Oblivious Transfer and Secure Identification in the Noisy-Storage Model
Available file:   10min presentation (ppt)   (PowerPoint 2007)

Workshop: Practical Applications of New Research in Cryptography
Sabanci University, Istanbul, Turkey, April 18, 2008
Secure Identification Using Quantum Communication
Available files:   45min presentation (ppt)     45min presentation (pdf)   (without animations).


McGill Workshop on Identification and Mutually Unbiased Bases
Bellairs Research Institute, Barbados, March 4-11, 2007
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker

ECRYPT Workshop on Models for Cryptographic Protocols
BRICS, University of Aarhus, July 31 - August 1, 2006
Information-Theoretic Conditions for Two-Party Secure Function Evaluation

McGill Workshop on Cryptography in the Bounded Storage Model
Bellairs Research Institute, Barbados, March 5-12, 2006
Cryptography in the Bounded Quantum-Storage Model



Seminar talks:

General math colloquium
Korteweg de Vries institute, University of Amsterdam. April 5, 2017
Homomorphic Encryption of Quantum Data
Available files:   60min presentation (pptx)   60min presentation (pdf)

QuSoft seminar
January 22, 2016
Quantum Cryptography
Available files:   60min presentation (pptx)   60min presentation (pdf)

Logic, Language and Computation Seminar
Institute for Logic, Language and Computation, University of Amsterdam, Netherlands, September 21, 2015
Quantum Cryptography
Available files:   60min presentation (pptx)   60min presentation (pdf)

Institute for Logic, Language and Computation, University of Amsterdam, Netherlands, 30 October, 2017
Quantum Cryptography
Available files:   105min presentation (pptx)   105min presentation (pdf)

ENS Crypto seminaire
Ecole Normale Supérieure, Paris, France, February 27, 2012
Random Oracles in a Quantum World
Available files:   60min presentation (keynote)   60min presentation (pdf)

Logic Tea
Institute for Logic, Language and Computation, University of Amsterdam, Netherlands, February 14, 2012
Position-Based Quantum Cryptography
Available files:   60min presentation (pptx)

Quantum Information Seminar
Physikzentrum der RWTH Aachen, Germany, December 16, 2010
Position-Based Quantum Cryptography: Impossibilities and Constructions

Computing Science Colloquium, AlGORITMe series
Center for Algorithmic Systems - Utrecht University, The Netherlands, November 19, 2010
Position-Based Quantum Cryptography: Impossibilities and Constructions

Crypto Seminar
University of Aarhus, November 11, 2010
Position-Based Quantum Cryptography: Impossibilities and Constructions

Eindhoven Institute for the Protection of Systems and Information
Eindhoven, The Netherlands, November 3, 2010
Position-Based Quantum Cryptography: Impossibilities and Constructions
Available files:   60min presentation (ppt)

Caltech IQI Seminar
Caltech, Pasadena, CA, USA, January 27, 2009
The Operational Meaning of Min- and Max-Entropy


Quantum Information Theory Seminar
LMU Munich, Munich, Germany, December 12, 2008
The Operational Meaning of Min- and Max-Entropy


Toronto Quantum Information Seminars
University of Toronto, August, 2008
The Operational Meaning of Min- and Max-Entropy
Available files:   50min presentation (ppt)

Crypto Seminar
BRICS, University of Aarhus, February, 2008
Cryptography from Noisy Storage
A Tight High-Order Entropic Uncertainty Relation with Applications Secure Identification
QKD in the Bounded-Quantum-Storage Model

CWI PNA6 Seminar
CWI Amsterdam, The Netherlands, November 29, 2006
A Tight High-Order Entropic Uncertainty Relation with an Application to Quantum Key Distribution

Theory Devision Seminar
Max-Planck Institute for Quantum Optics, Munich, Germany, Oct 11, 2006
A Tight High-Order Entropic Uncertainty Relation and Applications in the Bounded Quantum-Storage Model

Quantum Information and Crypto group seminar
ETH Zürich, Switzerland, Oct 3, 2006
A Tight High-Order Entropic Uncertainty Relation with Applications in the Bounded Quantum-Storage Model

Centre for Quantum Computing
University of Cambridge, UK, Sep 13, 2006
A Tight High-Order Entropic Uncertainty Relation with Applications in the Bounded Quantum-Storage Model

Crypto Seminar
BRICS, University of Aarhus, May 21, 2006
A Tight High-Order Entropic Uncertainty Relation with Applications in the Bounded Quantum-Storage Model

Crypto Seminar
BRICS, University of Aarhus, May 19, 2006
Oblivious Transfer and Linear Functions

Crypto Seminar
BRICS, University of Aarhus, May 10, 2006
Information-Theoretic Conditions for Two-Party Secure Function Evaluation

Laboratoire de Recherche en Informatique
Université Paris-Sud, Orsay, France, April 27, 2006
A Tight High-Order Entropic Uncertainty Relation and Applications in the Bounded Quantum-Storage Model

Université de Montréal, July 18, 2005
McGill University Montreal, June 29, 2005
BRICS, University of Aarhus, February 25, 2005
Cryptography in the Bounded Quantum-Storage Model

BRICS, University of Aarhus, April 15 & 18, 2005
The coin-flipping business



Other talks:

Quantum Cryptography
Visit of BSc Informatiewetenschappen, ILLC, University of Amsterdam, 2 November 2015
Available file:   10min presentation (pdf)   10min presentation (ppt)
Visit of BSc Informatiewetenschappen, ILLC, University of Amsterdam, 31 October 2017
Available file:   10min presentation (ppt)

Course Pitches: Information Theory and Crypto
Master of Logic, University of Amsterdam, 11 October 2015
Available file:   10min presentation (pdf)   10min presentation (pdf)
Master of Logic, University of Amsterdam, 1 September 2017
Available file:   10min presentation (pdf)

The Academic Mentor System In the Master of Logic
ILLC, University of Amsterdam, 28 August 2015
Available file:   10min presentation (pdf)
ILLC, University of Amsterdam, 2 September 2016
Available file:   10min presentation (pdf)
ILLC, University of Amsterdam, 1 September 2017
Available file:   10min presentation (pdf)

PhD defence
University of Aarhus, Denmark, April 27, 2007
Cryptography in the Bounded-Quantum-Storage Model
Available file:   50min presentation (ppt)

ECRYPT Autumn School on Unconditional Security in Cryptographic Protocols
Bertinoro, Italy, October 16-21, 2005
Cryptography in the Bounded Quantum-Storage Model

CS-QIC 2005, Canadian Grad Student Conference
University of Calgary, August 8-12, 2005
Cryptography in the Bounded Quantum-Storage Model

NAT-årsfest, yearly anniversary of the Natural Science Faculty of the University of Aarhus
Århus, June 3, 2005
Quantum Bit Commitment
Available files:   10min presentation (ppt)   (requires TexPoint plugin),     10min presentation (pdf)   (without animations).