7. SCN 2010:
: Heuristics and Rigor in Lattice-Based Cryptography - (Invited Talk).
Side Channel Attacks and Leakage Resilience
Cryptographic Protocols I
Authentication and Key Agreement
Cryptographic Primitives and Schemes
: Adaptively Secure Identity-Based Identification from Lattices without Random Oracles.
Groups Signatures and Authentication
Cryptographic Protocols II