Skip to main content

Abstracts for Conference on "The Mathematics of Post-Quantum Cryptography"

Alternatively have a look at the program.

Welcome and Introduction

Posted in
Datum: 
Mit, 04/12/2024 - 13:00 - 13:20
Location: 
MPIM Lecture Hall

tba

Posted in
Speaker: 
Wouter Castryck
Zugehörigkeit: 
KU Leuven
Datum: 
Mit, 04/12/2024 - 13:20 - 14:20
Location: 
MPIM Lecture Hall

tba

Lattices in Number Theory

Posted in
Speaker: 
Peter Stevenhagen
Zugehörigkeit: 
Leiden University
Datum: 
Mit, 04/12/2024 - 14:25 - 15:10
Location: 
MPIM Lecture Hall

tba

Principles of Lattice Cryptography, and cryptanalysis by lattice reduction

Posted in
Speaker: 
Leo Ducas
Zugehörigkeit: 
Centrum Wiskunde & Informatica, and Leiden University
Datum: 
Mit, 04/12/2024 - 15:15 - 16:00
Location: 
MPIM Lecture Hall

tba

Algebraic cryptanalysis applied to equivalence problems

Posted in
Speaker: 
Monika Trimoska
Zugehörigkeit: 
Eindhoven University of Technology
Datum: 
Mit, 04/12/2024 - 16:40 - 17:25
Location: 
MPIM Lecture Hall

tba

Problem Session

Posted in
Datum: 
Mit, 04/12/2024 - 17:30 - 18:30
Location: 
MPIM Lecture Hall

Dense and smooth lattices in any genus

Posted in
Speaker: 
Wessel van Woerden
Zugehörigkeit: 
University of Bordeaux
Datum: 
Don, 05/12/2024 - 09:00 - 09:45
Location: 
MPIM Lecture Hall

tba

Isogeny-based group actions in cryptography

Posted in
Speaker: 
Sabrina Kunzweiler
Zugehörigkeit: 
Inria Bordeaux and Université de Bordeaux
Datum: 
Don, 05/12/2024 - 09:45 - 10:30
Location: 
MPIM Lecture Hall

tba

Tea & Coffee break

Posted in
Datum: 
Don, 05/12/2024 - 10:30 - 11:00
Location: 
MPIM Tea Room

Hardness of isogeny problems and equidistribution

Posted in
Speaker: 
Aurel Page
Zugehörigkeit: 
Inria Bordeaux and Université de Bordeaux
Datum: 
Don, 05/12/2024 - 11:00 - 11:40
Location: 
MPIM Lecture Hall

When studying proposed isogeny-based cryptosystems, several computational problems naturally appear: some are upper bounds for the security of the system (if one can solve the problem, then one can break the cryptosystem), some are lower bounds (if one can break the cryptosystem, then one can solve the problem). We would therefore like to understand the relative difficulty of these problems, ideally showing that they are all equivalent.

© MPI f. Mathematik, Bonn Impressum & Datenschutz
-A A +A