ASecuritySite Podcast
A fireside chat from the International Conference on Digital Trust, AI and the Future. Bruce has created a wide range of cryptographic methods including Skein (hash function), Helix (stream cipher), Fortuna (random number generator), and Blowfish/Twofish/Threefish (block ciphers). Bruce has published 14 books, including best-sellers such as Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. He has also published hundreds of articles, essays, and academic papers. Currently, Bruce is a fellow at the Berkman Center for Internet and Society at Harvard University.
info_outlineASecuritySite Podcast
Federico Charosky, CEO Quroum CyberFederico is a seasoned cybersecurity executive with over 25 years of distinguished experience across the Americas, Europe, and the Middle East. He specialises in cyber risk management, security operations, and incident response, Federico has dedicated his career to safeguarding organisations against the ever-evolving landscape of digital threats. In 2016, he founded Quorum Cyber, a premier cybersecurity firm backed by private equity, headquartered in Edinburgh with offices across the UK, North America, and the UAE. At Quorum Cyber, our mission is to...
info_outlineASecuritySite Podcast
info_outlineASecuritySite Podcast
Chair: Stephen Ingledew OBE, Chair, Fintech Scotland Nishant Govil: MD, Innovation Adoption, BlackRock Kara Kennedy: Head of Digital Assets, JP Morgan Nick Jones: CEO Zumo. Dia Banerji: Imagine Ventures.
info_outlineASecuritySite Podcast
Date: 24 June 2025 Chair: Peter Ferry, CEO, TRUST Centre of Excellence. Martin Doherty Hughes: Former MP, Chair of All Party Parliamentary Group on Blockchain. Martin Trotter: Regtech leader, BRS Grant Thornton Martin Halford: CTO SICCAR and Tech Steering Committee Accord Project Chris Tate: CEO Condatis.
info_outlineASecuritySite Podcast
Ralph is a co-inventor of public-key cryptography, the inventor of cryptographic hashing, created Merkle's Puzzles, the co-inventor of the Merkle–Hellman knapsack cryptosystem, and invented Merkle trees. He received his B.S. in computer science in 1974 from UC Berkeley and a PhD. in electrical engineering from Stanford University in 1979. More recently, he is a researcher and speaker on cryonics. Ralph was a research scientist at the famous Xerox PARC (Palo Alto Research Center), and a nanotechnology theorist at Zyvex. He has also been a Distinguished Professor at Georgia Tech, a senior...
info_outlineASecuritySite Podcast
Rosario Gennaro is a Professor of Computer Science at City University of New York (CUNY) and a Director for the Center for Algorithms and Interactive Scientific Software (CAISS). 1996, he received his PhD from MIT and was a researcher at the IBM T.J.Watson Research Center until 2012. Rosario's most recent work includes privacy and anonymity in electronic communication, along with proactive security to minimise the effects of system break-ins. He has received over 24,500 citations on his work and has an h-index of 72, and has published classic papers of “Non-interactive verifiable...
info_outlineASecuritySite Podcast
Tal is a Professor of Computer and Information Science at the University of Pennsylvania and a Manager at AWS. Previously, she was the head of research at the Algorand Foundation and head of the cryptography research at IBM's Thomas J Watson Research Centre. In 2014, she was defined as one of the 22 most powerful women engineers by Business Insider, and a Woman of Vision for innovation by the Anita Borg Institute. In 2018, she was defined by Forbes as one of the World's Top 50 women in Tech, and in 2019, she was awarded the RSA Award for Excellence in Mathematics. In 2023, she was...
info_outlineASecuritySite Podcast
Vinod is a professor of computer science at MIT and a principal investigator in the IT Computer Science and AI Lab. He completed his Bachelor's degree from the Indian Institute of Technology Madras in 2003, and his PhD in 2009 from MIT. His main supervisor was Shafi Goldwasser. Vinod is seen as a world leader in the area of cryptography, especially within fully homomorphic encryption. He has co-authored many classic papers and which are seen as third generation of homomorphic encryption, including on "Trapdoors for hard lattices and new cryptographic constructions", and "Fully...
info_outlineASecuritySite Podcast
Srini Devadas an Edwin Sibley Webster Professor of Electrical Engineering and Computer Science at MIT in the Computer Science and Artificial Intelligence Laboratory (CSAIL). His current research interests are in applied cryptography, computer security and computer architecture. Srini was awarded an a master's and a PhD degree in electrical engineering from the University of California at Berkeley - under the supervision of Arthur Richard Newton. He was an inventor of Physical Unclonable Functions (PUFs), and, In 2014, he received the IEEE Computer Society's Edward J....
info_outlinePlease excuse the poor quality of my microphone, as the wrong microphone was selected.
In research, we are all just building on the shoulders of true giants, and there are few larger giants than Leslie Lamport — the creator of LaTeX.
For me, every time I open up a LaTeX document, I think of the work he did on creating LaTeX, and which makes my research work so much more productive. If I was still stuck with Microsoft Office for research, I would spend half of my time in that horrible equation editor, or in trying to integrate the references into the required format, or in formatting Header 1 and Header 2 to have a six-point spacing underneath. So, for me, the contest between LaTeX and Microsoft Word is a knock-out in the first round.
And one of the great things about Leslie is that his work is strongly academic — and which provides foundations for others to build on. For this, he did a great deal on the ordering of task synchronisation, in state theory, cryptography signatures, and fault tolerance.
LaTeX
I really can say enough about how much LaTeX — created in 1984 — helps my work. I am writing a few books just now, and it allows me to lay out the books in the way that I want to deliver the content. There’s no need for a further mark-up, as I work on the output that the reader will see. But the true genius of LaTeX is the way that teams can work on a paper, and where there can be async to GitHub and where version control is then embedded.
Clocks
Many in the research community think that the quality measure of a paper is the impact factor of the journal that it is submitted to, or in the amount of maths that it contains. But, in the end, it is the impact of the paper, and how it changes thinking. For Leslie, in 1978, his paper on clocks changed our scientific world and is one of the most cited papers in computer science.
Byzantine Generals Problem
In 1981, Leslie B Lamport defined the Byzantine Generals Problem. And in a research world where you can have 100s of references in a paper, Leslie only used four (and which would probably not be accepted these days for having so few references). Within this paper, the generals of a Byzantine army have to agree to their battle plan, in the face of adversaries passing in order information. In the end, we aim to create a way of passing messages where if at least two out of three of the generals are honest, we will end up with the correct battle plan.
The Lamport Signature
Sometime soon, we perhaps need to wean ourselves of our existing public key methods and look to techniques that are more challenging for quantum computers. With the implementation of Shor’s algorithm [here] on quantum computers, we will see our RSA and Elliptic Curve methods being replaced by methods which are quantum robust. One method is the Lamport signature method and which was created by Leslie B. Lamport in 1979.