Nicolas Courtois have been a PC member of the following program committees in international events in cryptography and information security:
- Financial Cryptography 2016, 22-26 Feb 2016, Accra Beach Hotel&Spa, Barbados.
- Inscrypt 2015, 11th China International Conference on Information Security and Cryptology,
Beijing, China,1-3 November 2015 - 15th IMA International Conference on Cryptography and Coding, Oxford UK, 15-17 December 2015.
- Member of the Editorial Board of Cryptologia
- P2PFISY2015, International Workshop:
P2P Financial Systems 2015,
29-30 January 2015, Frankfurt, Germany. - ACISP 2014,
19th Australasian Conference on Information Security and Privacy,
Wollongong, Australia on July 7-9, 2014. - CSS 2014 (3rd International Conference on Cryptography and Security Systems),
Lublin, Poland 22-24 September 2014. - CECC 2014, Central European Conference on Cryptology,
21-23 May 2013, Budapest, Hungary. - IWCC 2013, International Workshop on Cyber Crime,
co-located with the 34th IEEE Symposium on Security and Privacy (IEEE S$\&$P 2013)
held in San Francisco, CA in May 2013. - IWCC 2012,
First International Workshop on Cyber Crime 2012,
October 3-5, 2012, St. Petersburg, Russia. - CANS 2012,
The 11th International Conference on Cryptology and Network Security,
Darmstadt, Germany, December 12-14, 2012. - 17th
Australasian Conference on Information Security and Privacy
(ACISP 2012), Wollongong, Australia, 9-11 July 2012. - 18th International Multi-Conference On Advanced Computer Systems, ACS 2012,
Miedzyzdroje, Poland, May 30 – June 1, 2012, - 13th IMA International Conference on Cryptography and Coding (IMACC 2011),
University of Oxford, UK, December 12 – 15, 2011. - First International Workshop on Digital Forensics (IWDF),
in Shanghai, China, 4-6 November, 2011, in conjunction
with the International Conference
on Multimedia Information Networking and Security (MINES 2011). - Workshop on Cryptography and Security Systems,
organized by Warsaw Technical University, Poland and Marie Curie University Lublin, Poland,
26-28 September 2011. - ACISP’11,
- The 16th Australasian Conference on Information Security and Privacy,
11-13 July 2010, Melbourne, Australia. - IWNS’10,
Second International Workshop on Network Steganography,
in Nanjing, China, 4-6 November 2010. - 4th International Workshop on Secure Information Systems (SIS)
in Wisla, Poland, 18-20 October 2010. - ACISP’10,
The 15th Australasian Conference on Information Security and Privacy,
5-7 July 2010, Sydney, Australia. - 1st Workshop on Security in Business Information Systems (SBIS 2010)
%(http://bis.kie.ae.poznan.pl/13th_bis/ws.php)
in Berlin, Germany, May 4-5, 2010.
ACS 2010,
Seventeenth International Conference on Advanced Computer Systems,
Miedzyzdroje , Poland, October 13-15. - 2nd International Conference on Information Technology, IEE ICIT,
28-30 June 2010, Gdansk University of Technology, Poland - Member of the Honorary Committe of Cyberspace 2009 – Threats and Challenges
conference organized by the Military University of Technology, Warsaw, Poland.
15 October 2009. - First International Workshop on Network Steganography (IWNS),
in Wuhan, Hubei, China, 18-20 November 2009. - Information Technology Security track,
in 16th International Multi-Conference on Advanced Computer Systems,
Miedzyzdroje, Poland, 16-18 October 2009. - 12th Annual International Conference on
Information Security and Cryptology (ICISC 2009).
In Seoul, Korea, 2-4 December 2009 - WEIS 2009,
Workshop on Economics of Information Security,
London, UK. - Asiacrypt 2008,
December 7 – 11, 2008, Melbourne, Australia - 11th Annual International Conference on
Information Security and Cryptology (ICISC 2008).
Seoul, Korea, 3-5 December 2008. - Information Technology Security track,
in International Multi-Conference on Advanced Computer Systems,
Miedzyzdroje, Poland, 15-17 October 2008, - 3rd International Workshop on Secure Information Systems (SIS’08),
October 20-22, 2008, Wisla, Poland. - International Cryptologic Conference
dedicated to 75th anniversary of breaking the ENIGMA code,
10 December 2007, Military University of Technology, Warsaw, Poland. - 2nd International Workshop on Secure Information Systems (SIS’07),
October 15-17, 2007, Wisla, Poland. - Special Workshop, “Tools for Cryptanalysis”,
- hosted by the ECRYPT Network of Excellence, Krakow (Poland), September 24–25, 2007.
- TatraCrypt 2007, The 7th Central European Conference on Cryptology,
June 22-24, 2007, Smolenice, Slovakia. - 12th Australasian Conference on Information Security and Privacy
2-6 July 2007. Townsville, Queensland Australia. - Applied Cryptography and Network Security, ACNS 2007, Zhuhai, China June 5-8, 2007.
- Fast Software Encryption, FSE 2007, City of Luxembourg, March 26-28 2007.
- 1st International Workshop on Secure Information Systems (SIS’06)
Wisla, Poland, November 6-10, 2006 - Cryptographic Hardware and Embedded Systems Conference (CHES 2006).
In Yokohama (Japan), October 10-13, 2006. - SAC 2006, 13th Annual Workshop on Selected Areas in Cryptography,
August 17-18, 2006 – Concordia University, Montreal, Quebec, Canada - 11th Australasian Conference
on Information Security and Privacy, ACISP 2006,
July 2006, Melbourne, Australia. - Program Chair of Quo-Vadis Cryptology 4 –
“The Future of Financial and Critical Data Security” .
In Warsaw, Poland, 26 May 2006. - SASC 2006 – Stream Ciphers Revisited,
Special Workshop hosted by the ECRYPT Network of Excellence,
Leuven, Belgium, February 2-3, 2006. - Scientific Session Dedicated to
the Centenary of the Marian Rejewski’s Birth,
26 of September 2005,
Military University of Technology, Warsaw, Poland. - Asiacrypt 2005, December 1-4, Chennai (Madras), India.
AMC’05, The Workshop of Algebraic Methods in Cryptography,
July 23-24, Academy of Mathematics and System Science, CAS, Beijing, China,
a satellite conference to ISSAC 2005. - ECRYPT Conference on Hash Functions,
June 23-24, 2005, Przegorza{\l}y (Krak\'{o}w), Poland - AES 4 Conference, Bonn May 10-12 2004
- ACISP’04, The 9th Australasian Conference on Information Security and Privacy,
July 13-15 2004, Sydney, Australia.