Jolly Phi    
    University of Waterloo  
 
   

Selected presentations and lectures

  • Public lecture “Can we do better than Julius Caesar? Building unbreakable cryptography” given by V. Makarov at Science cafe in Turku, Finland, 2 September 2017: watch this 1 h 19 min lecture (plus 35 min Q&A); slides: PowerPoint (70.5 MiB, with animations) | PDF (4.3 MiB, static images only).
  • Talk “Can quantum physics break cryptography’s curse?” given by V. Makarov at SHA2017 camp in Zeewolde, Netherlands, 4–8 August 2017: watch this 1 h talk; slides: PowerPoint (119 MiB, with animations) | PDF (13.1 MiB, static images only).
  • Short talk “Insecurity of detector-device-independent quantum key distribution” given by A. Huang at QCrypt conference in Washington DC, USA, September 12–16, 2016: watch this 11 min talk on youtube.
  • Short talk “Laser damage creates backdoors in quantum communication” given by S. Sajeed at QCrypt conference in Washington DC, USA, September 12–16, 2016: watch this 12 min talk on youtube.
  • Tutorial “Challenges to physical security of today’s quantum technologies” given by V. Makarov at QCrypt conference in Washington DC, USA, September 12–16, 2016: watch this 1 h 31 min lecture on youtube; slides: PowerPoint (18.0 MiB, with animations) | PDF (9.4 MiB, static images only).
  • Lectures 3 and 4 in “Implementation of quantum communication” part of the course QIC 891, given by V. Makarov at IQC on August 3 and 12, 2016: PowerPoint (89.3 MiB, with animations) | PDF (15.6 MiB, static images only).
  • Talk “Challenges to physical security of today’s quantum technologies” given by V. Makarov at Trustworthy quantum information workshop (TyQI) in Shanghai, China, June 27–30, 2016: watch this 35 min talk on youtube.
  • Lecture “Quantum hacking” given by V. Makarov at ID Quantique 8th winter school on quantum cybersecurity, January 16–21, 2016 in Les Diablerets, Switzerland: PowerPoint (25.3 MiB, with animations) | PDF (13.1 MiB, static images only).
  • Lecture “Limits on physical security of quantum communications” given by V. Makarov and A. Huang at several seminars in South Korea and China, October 15 – November 2, 2015. These slides are a superset of all lectures; not all were shown at each place: PowerPoint (101 MiB, with animations) | PDF (10.8 MiB, static images only).
  • Talk “The future is quantum” given by V. Makarov at the Norwegian cryptographic seminar in Trondheim, Norway, September 8, 2015: PowerPoint (106 MiB, with animations) | PDF (11.0 MiB, static images only).
  • Lecture “Implementations of QKD and security challenges” given by V. Makarov at QKD graduate school at IQC, Waterloo, Canada, August 17–21, 2015: PowerPoint (133 MiB, with animations) | PDF (16.1 MiB, static images only).
  • Talk “Progress and challenges in quantum cryptography” given by V. Makarov at Telecom ParisTech, Paris, France, July 10, 2015: PowerPoint (77.8 MiB, with animations) | PDF (10.0 MiB, static images only).
  • Talk “Testing quantum crypto” given by V. Makarov at ETSI 2nd quantum-safe crypto workshop, Ottawa, Canada, October 6–7, 2014: PowerPoint (16 MiB, with animations) | PDF (4.2 MiB, static images only).
  • Lecture “Quantum cryptography” given by V. Makarov at Phys 10 undergraduate seminar at the University of Waterloo, Canada, September 30, 2014: watch this 50 min lecture on youtube; slides: PowerPoint (63 MiB, with videos and animations) | PDF (6.8 MiB, static images only).
  • Lecture series “Quantum cryptography and quantum hacking” given by V. Makarov as a part of summer course Implementation of quantum communication at the Institute for Quantum Computing, Waterloo, Canada, August 1, 2014: watch three parts introduction to quantum cryptography, quantum hacking part 1, quantum hacking part 2; slides: PowerPoint (95 MiB, with videos and animations) | PDF (14.8 MiB, static images only).
  • Lecture “Quantum cryptography and quantum hacking” given by V. Makarov at Quantum information and quantum technologies summer school, Bucharest, Romania, July 2–5, 2014: PowerPoint (293 MiB, with videos and animations) | PDF (14.5 MiB, static images only).
  • Debate “On the unconditional security of quantum key distribution” (1 h 24 min video) in which V. Makarov participated, at HotPI conference (November 11, 2013).
  • Lecture “Loopholes in implementations of quantum cryptography” given by V. Makarov at ID Quantique 5th winter school on practical quantum communications (January 2013): PowerPoint (27.7 MiB) | PDF (20.6 MiB).
  • Lecture “Quantum hacking” given by V. Makarov at Undergraduate school on experimental quantum information processing (USEQIP; June 2012): watch this 1 h 20 min lecture on youtube; slides: PowerPoint (17.4 MiB).
  • Lecture “Loopholes in implementations of quantum cryptography” given by V. Makarov at ID Quantique 4th winter school on practical quantum cryptography (January 2012): PowerPoint (15.9 MiB) | PDF (6.4 MiB).
  • Talk “Loopholes in implementations of quantum cryptography” given by V. Makarov at QCRYPT conference, Zurich (September 2011): watch this one-hour talk on the conference website or download MPEG-4 video (418 MiB); slides: PowerPoint (14.1 MiB).
  • Video abstract for our paper “After-gate attack on a quantum cryptosystem,” filmed by our German colleagues (January 2011): watch it on youtube or download full-quality HD video (67 MiB).
  • Lecture “Attacks on implementations of quantum cryptography” given by V. Makarov at ID Quantique 3rd winter school on practical quantum cryptography (January 2011): PowerPoint (24.2 MiB).
  • Lecture “Practical attacks on QKD implementations” given by V. Makarov at id Quantique 2nd winter school on practical quantum cryptography (February 2010): PowerPoint (20.3 MiB).
  • Presentations from the Quantum communication workshop 2010 in Oslo organized by our group.
  • Lecture “How you can build an eavesdropper for a quantum cryptosystem” given by S. Sauge and Q. Liu at 26th Chaos Communication Congress (2009): PowerPoint (4.4 MiB); you can watch the entire 52 min lecture on youtube or download MPEG-4 video (582 MiB).
  • Lecture “How we eavesdropped 100% of a quantum cryptographic key” given by V. Makarov and I. Gerhardt at Hacking at Random conference (2009): PowerPoint (16.1 MiB); you can watch the entire 52 min lecture on youtube.
  • Presentation “Eve strikes back: attacks exploiting component imperfections” (2008): PowerPoint (13.1 MiB) | PDF (7.2 MiB); handouts: PDF (4.5 MiB).
  • Poster “Faked states attack exploiting detector efficiency mismatch on BB84, phase-time, DPSK, and Ekert protocols(2006).
  • Presentation “Attacks via optical loopholes” given at the Quantum information theory workshop in Erlangen (2004).
  • Lecture “Quantum cryptography” given in the Fiber components course at NTNU (2003).
  • Presentation “Quantum cryptography” given at the Norwegian cryptographic seminar (2002).
 
 Eve :(