# Invited Talks

__All__Differential Privacy Multilinear Maps Obfuscation Quantum Traitor Tracing

May 2019 |
Quantum Lightning Never Strikes The Same State TwiceNew York Area Theory Day MIT Cryptography and Information Security Seminar IBM Watson |

Feb 2017 |
The Magic of ELFsMIT Cryptography and Information Security Seminar TCS+ |

Dec 2016 |
Quantum Oracle Classification: The Case of Group StructurePrinceton PACM Seminar |

Nov 2016 |
Obfuscation and Weak Multilinear MapsDIMACS/CEF Workshop on Cryptography and Software Obfuscation New York Area CryptoDay |

Apr 2016 |
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13MIT Cryptography and Information Security Seminar |

Dec 2015 |
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a KeyUCLA Obfuscation Seminar UC Berkeley Theory Lunch |

Sep 2015 |
Cryptography in the Age of Quantum ComputersMaryland Cybersecurity Center |

Sep 2015 |
Quantum Query Solvability: A Refinement of Quantum Query Complexity and ApplicationsQuICS Frontiers Workshop |

May 2015 |
Order-Revealing Encryption and the Hardness of Private LearningMIT Cryptography and Information Security Seminar |

Sep 2014 |
Fully Secure Functional Encryption without ObfuscationDC Area Crypto Day MIT Cryptography and Information Security Seminar |

Jul 2014 |
How to Avoid Obfuscation Using Witness PRFsOberwolfach Workshop New York Area CryptoDay UCLA Obfuscation Seminar MIT Cryptography and Information Security Seminar |

Jun 2014 |
Multiparty Key Exchange from ObfuscationColumbia Seminar |

Apr 2014 |
Multiparty Key Exchange, Efficient Traitor Tracing, and More
from Indistinguishability ObfuscationUT Austin Algorithms and Computational Theory Seminar Princeton Theory Seminar Harvard Theory of Computation Seminar NYU Cryptography Seminar |

Apr 2014 |
Multiparty Key Exchange and Broadcast Encryption from Software ObfuscationStanford Security Workshop |

Nov 2013 |
Classical Cryptosystems in a Quantum WorldIBM Watson |

Oct 2013 |
Quantum Computers and CryptographyQuantum Computing Seminar at Hacker Dojo |

May 2013 |
The Rank Method and Applications to Post-Quantum CryptographyWaterloo IQC Colloquium |

Apr 2013 |
Beyond Post-Quantum CryptographyMIT Cryptography and Information Security Seminar New York Area CryptoDay |