DIMACS Workshop on The Mathematics of Post-Quantum Cryptography
January 12 - 16, 2015
DIMACS Center, CoRE Building, Rutgers University
- Organizers:
- Nigel Boston, University of Wisconsin-Madison, boston at math.wisc.edu
- Elisa Gorla, University of Neuchatel, elisa.gorla at unine.ch
- Tanja Lange, Technische Universiteit Eindhoven, tanja at hyperelliptic.org
- Joachim Rosenthal, University of Zürich, rosenthal at math.uzh.ch
Presented under the auspices of the DIMACS Special
Focus on Cybersecurity.
Workshop Program:
Monday, January 12, 2015
9:00 - 9:30 Breakfast and Registration
9:30 - 10:30 Post-quantum cryptography
Johannes Buchmann, Technische Universität Darmstadt
10:30 - 11:00 Coffee break
11:00 - 12:00 Introduction to quantum algorithms
Daniel Bernstein, Technische Universiteit Eindhoven
12:00 - 1:00 Moving towards a quantum-safe cryptographic infrastructure
Michele Mosca, University of Waterloo
1:00 - 1:50 Lunch break
1:50 - 2:00 DIMACS Director's Welcome
Rebecca Wright
2:00 - 3:00 Tweaking code-based cryptography for embedded systems
Tim Gueneysu, Ruhr Univ. Bochum
3:00 - 3:30 Coffee break
3:30 - 4:00 Vectorized implementations of post-quantum crypto
Peter Schwabe, Radboud U.Nijmegen
4:00 - 4:30 Properties of symmetric primes with implications for primality testing for extremely large numbers
Brad Clardy, Xalgos
Tuesday, January 13, 2015
9:00 - 9:30 Breakfast and Registration
9:30 - 10:30 NTRU and lattice-based crypto: past, present, and future
Joseph Silverman, Brown University
10:30 - 11:00 Coffee break
11:00 - 11:30 Sieving for shortest lattice vectors using fast search algorithms
Thijs Laarhoven, Technische Universiteit Eindhoven
11:30 - 12:00 Efficient zero-knowledge proofs of knowledge for ideal lattices
Stephan Krenn, IBM Zurich
12:00 - 1:00 SPHINCS: practical stateless hash-based signatures
Andreas Huelsing, Technische Universiteit Eindhoven
1:00 - 2:00 Lunch break
2:00 - 3:00 Multivariate Cryptosystems and Their Security: Current Estimates
Bo-Yin Yang, Acad. Sinica
3:00 - 3:30 coffee break
3:30 - 4:00 MQ challenge: hardness evaluation of solving multivariate quadratic problems
Tsuyoshi Takagi, Kyushu U.
4:00 - 4:30 Hidden field knapsack problems
Giacomo Micheli, University of Zürich
Wednesday, January 14, 2015
9:00 - 9:30 Breakfast and Registration
9:30 - 10:30 Best known attacks on code-based cryptosystems: state of the art and perspectives
Nicolas Sendrier, INRIA
10:30 - 11:00 Coffee break
11:00 - 12:00 How to solve coding based problems used in crypto
Anja Becker, EPFL
12:00 - 1:00 Constructive aspects of code-based cryptography
Marco Baldi, Università Politecnica delle Marche
1:00 - 2:00 Lunch break
Free afternoon
Thursday, January 15, 2015
9:00 - 9:30 Breakfast and Registration
9:30 - 10:30 Modern multivariate quantum-resistant cryptography
Daniel Smith-Tone, University of Louisville
10:30 - 11:00 Coffee break
11:00 - 11:30 The simple matrix encryption scheme
Albrecht Petzoldt, Technische Universität Darmstadt
11:30 - 12:00 On the existence of semi-regular sequences
Sergio Molina, University of Cincinnati
12:00 - 1:00 Mathematical problems arising in multivariate cryptography
Timothy Hodges, University of Cincinnati
1:00 - 2:00 Lunch break
2:00 - 3:00 Attacking binary elliptic curves on a quantum computer: on
quantum arithmetic and space-time trade-offs
Martin Roetteler, Microsoft
3:00 - 3:30 Coffee break
3:30 - 4:00 A quantum algorithm for computing the unit group of an arbitrary degree number field
Sean Hallgren, Penn State
4:00 - 4:30 Bounding HFE with SRA
Christophe Petit, UCL Crypto Group
5:00 - 7:00 Dinner at DIMACS (Lounge)
Friday, January 16, 2015
9:00 - 9:30 Breakfast and Registration
9:30 - 10:30 SVP in 2^n time using discrete Gaussian sampling
Oded Regev, Courant Institute of Mathematical Sciences
10:30 - 11:00 Coffee break
11:00 - 11:30 Authenticated key exchange from ring learning with errors
Michael Snook, University of Cincinnati
11:30 - 12:00 RLWE-based homomorphic encryption schemes
Kim Laine, UC Berkeley
Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on January 20, 2015.