Home » News » Post-Quantum Cryptography Conference Schedule

Post-Quantum Cryptography Conference Schedule


University of Waterloo
Waterloo, Ontario

An online schedule (PDF) for the Post-Quantum Cryptography Conference is now available.


Wednesday, October 1

8 a.m. Registration and coffee

8:45 a.m. Opening remarks

9 a.m. Perlner
Optimizing Information Set Decoding Algorithms to Attach Cyclosymmetric MDPC Codes

9:30 a.m. Von Maurich, Guneysu
Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices

10 a.m. Heyse, Zimmermann, Parr
Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware

10:30 a.m. Break

11 a.m. Invited talk: Matteo Mariantoni
Building a superconducting quantum computer

12 p.m. Group Picture

12:15 p.m. Lunch

2 p.m. Hoffstein, Pipher, Schanck, Silverman, Whyte
Transcript Secure Signatures Based on Modular Lattices

2:30 p.m. Aguilar Melchor, Boyen, Deneuville, Gaborit
Sealing the Leak on Classical NTRU Signatures

3 p.m. Cabarcas, Weiden, Buchmann
On the Efficiency of Provably Secure NTRU

3:30 p.m. Break

4 p.m. Invited talk: Nicolas Gisin
Quantum Cryptography

5 p.m. Reception


Thursday, October 2

8:30 a.m. Coffee

9 a.m. Peikert
Lattice Cryptography for the Internet

9:30 a.m. Jao, Soukharev
Isogeny-Based Quantum- Resistant Undeniable Signatures

10 a.m. Song
A Note on Quantum Security for Post-Quantum Cryptography

10:30 a.m. Break

11 a.m. Invited talk: Vinod Vaikuntanathan
Lattices and Cryptography: A Match Made in Heaven

12 p.m. Lunch

2 p.m. Ding, Petzoldt, Wang
The Cubic Simple Matrix Encryption Scheme

2:30 p.m. Gaborit, Ruatta, Schrek, Zemor
RankSign: An Efficient Signature Algorithm Based on the Rank Metric

3:00 p.m. Cheng, Hashimoto, Miura, Takagi
A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics

3:30 p.m. Break

4 p.m. Invited talk: Lily Chen
Read the Crystal Ball – Quantum Resistant Cryptography Standards

5 p.m. Banquet


Friday October 3

8 a.m. Coffee

8:30 a.m. Porris, Baena, Ding
ZHFE, a New Multivariate Public Key Encryption Scheme

9 a.m. Daniels, Smith-Tone
Differential Properties of the H F E Cryptosystem

9:30 a.m. Hashimoto
Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCryptop 2013

10 a.m. Moody, Perlner, Smith-Tone
An Asymptotically Optimal Structure Attack on the ABC Multivariate Encryption Scheme

10:30 a.m. Break

11 a.m. Recent results

12 p.m. IQC lab tour



Recent results session

Albrecht Petzoldt, Technische Universität Darmstadt
White-Box Implementation of Multivariate Schemes

Denis Butin, Technische Universität Darmstadt
Practical hash-based signatures

Andreas Hülsing, The Eindhoven University of Technology
SPHINCS: Practical stateless hash-based signatures

Daniel Cabarcas Jaramillo, Universidad Nacional de Colombia
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms

Thijs Laarhoven, The Eindhoven University of Technology
Sieving for shortest vectors in lattices using angular locality-sensitive hashing and quantum search

Grégory Landais, Institut national de recherche en informatique et en automatique
As promised : CFS and ISD source code

Anirudh Sankar, University of Waterloo
A quantum algorithm for computing isogenies between supersingular elliptic curves

1 Comment

  1. […] Post-Quantum Cryptography Conference Schedule […]

Comments are closed.