LZI - Schloss Dagstuhl - Talks + Materials of Seminar 11381
 Functions: 

Seminar 11381
Quantum Cryptanalysis

Serge Fehr (CWI - Amsterdam, NL), Michele Mosca (University of Waterloo, CA), Martin Rötteler (NEC Laboratories America, Inc. - Princeton, US), Rainer Steinwandt (Florida Atlantic University - Boca Raton, US)

Caveat: Due to caching problems of dynamic webpages, sometimes newly
uploaded files are not shown. Please reload the page accordingly.

 

Seminar Wide Materials
 
 


Daniel J. Bernstein , University of Chicago
 

Anne Broadbent , University of Waterloo
 Quantum Computing on Encrypted Data
Abstracts: txt

 

Harry Buhrman , CWI - Amsterdam
 

Andrew Childs , University of Waterloo
 Constructing elliptic curve isogenies in quantum subexponential time
Abstracts: txt

 

Matthias Christandl , ETH Zürich
 A quasipolynomial-time algorithm for the quantum separability problem
Abstracts: txt

 

Roger Colbeck , Perimeter Institute - Waterloo
 Private Randomness Expansion
Abstracts: txt

 

Serge Fehr , CWI - Amsterdam
 

Dmitry Gavinsky , NEC Laboratories America, Inc. - Princeton
 Quantum Money with Classical Verification
Abstracts: txt

 

Sean Hallgren , Penn State University
 

Aram W. Harrow , University of Washington
 

Avinathan Hassidim , MIT - Cambridge
 Quantum money from knots
Abstracts: txt

 

Peter Hoyer , University of Calgary
 Schemes for establishing keys with quantum eavesdroppers
Abstracts: txt Paper: pdf

 

Tsuyoshi Ito , University of Waterloo
 Quantum Fingerprints that Keep Secrets
Abstracts: txt

 

Stacey Jeffery , University of Waterloo
 

Stephen P. Jordan , NIST - Gaithersburg
 

Robert Koenig , IBM TJ Watson Research Center
 Simplified instantaneous non-local quantum computation with applications to position-based cryptography
Abstracts: txt

 

Tanja Lange , TU Eindhoven
 

Frederic Magniez , University Paris-Diderot
 

Loïck Magnin , University Paris-Diderot
 

Dmitri Maslov , NSF - Arlington
 Techniques for Quantum Circuit Optimization
Abstracts: txt

 

Alexander May , Ruhr-Universität Bochum
 Decoding Random Linear Codes in O(2^0.054n)
Abstracts: txt

 

Cris Moore , University of New Mexico - Albuquerque
 The McEliece cryptosystem resists quantum Fourier sampling attacks
Abstracts: txt

 

Kirill Morozov , Kyushu University
 Proof of Plaintext Knowledge for Code-Based Cryptosystems
Abstracts: txt

 

Michele Mosca , University of Waterloo
 

Daniel Nagaj , Slovak Academy of Sciences - Bratislava
 What can you hide in qutrit chains?
Abstracts: txt

 

Maris Ozols , University of Waterloo
 Quantum algorithms for the hidden shift problem of Boolean functions
Abstracts: txt

 

Anupam Prakash , University of California - Berkeley
 

Ben Reichardt , University of Waterloo
 

Martin Roetteler , NEC Laboratories America, Inc. - Princeton
 

Jeremie Roland , Université Libre de Bruxelles
 Quantum adversary lower bounds by polynomials
Abstracts: txt

 

Alexander Russell , University of Connecticut - Storrs
 

Leonard J. Schulman , CalTech - Pasadena
 

Igor A. Semaev , University of Bergen
 Improvements on Circuit Lattices
Abstracts: txt Slides: pdf

 

Igor Shparlinski , Macquarie University - Sydney
 Hidden Shifted Power Problem
Abstracts: txt

 

Rolando Somma , Los Alamos National Lab.
 

Florian Speelman , CWI - Amsterdam
 The garden-hose game and applications to position-based cryptography
Abstracts: txt

 

Rainer Steinwandt , Florida Atlantic University - Boca Raton
 

Barbara Terhal , RWTH Aachen
 

Thomas Vidick , University of California - Berkeley
 

Arne Winterhof , RICAM - Linz
 

Wim van Dam , University of California - Santa Barbara
 



License

Creative Commons License
This webpage and the material that is made available on this webpage is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License.

The CC by-nc-nd license allows you to copy, distribute and transmit the work under the following conditions: