LZI - Schloss Dagstuhl - Talks + Materials of Seminar 11381

Seminar 11381
Quantum Cryptanalysis

Serge Fehr (CWI - Amsterdam, NL), Michele Mosca (University of Waterloo, CA), Martin Rötteler (NEC Laboratories America, Inc. - Princeton, US), Rainer Steinwandt (Florida Atlantic University - Boca Raton, US)

Caveat: Due to caching problems of dynamic webpages, sometimes newly
uploaded files are not shown. Please reload the page accordingly.


Seminar Wide Materials

Daniel J. Bernstein , University of Chicago

Anne Broadbent , University of Waterloo
 Quantum Computing on Encrypted Data
Abstracts: txt


Harry Buhrman , CWI - Amsterdam

Andrew Childs , University of Waterloo
 Constructing elliptic curve isogenies in quantum subexponential time
Abstracts: txt


Matthias Christandl , ETH Zürich
 A quasipolynomial-time algorithm for the quantum separability problem
Abstracts: txt


Roger Colbeck , Perimeter Institute - Waterloo
 Private Randomness Expansion
Abstracts: txt


Serge Fehr , CWI - Amsterdam

Dmitry Gavinsky , NEC Laboratories America, Inc. - Princeton
 Quantum Money with Classical Verification
Abstracts: txt


Sean Hallgren , Penn State University

Aram W. Harrow , University of Washington

Avinathan Hassidim , MIT - Cambridge
 Quantum money from knots
Abstracts: txt


Peter Hoyer , University of Calgary
 Schemes for establishing keys with quantum eavesdroppers
Abstracts: txt Paper: pdf


Tsuyoshi Ito , University of Waterloo
 Quantum Fingerprints that Keep Secrets
Abstracts: txt


Stacey Jeffery , University of Waterloo

Stephen P. Jordan , NIST - Gaithersburg

Robert Koenig , IBM TJ Watson Research Center
 Simplified instantaneous non-local quantum computation with applications to position-based cryptography
Abstracts: txt


Tanja Lange , TU Eindhoven

Frederic Magniez , University Paris-Diderot

Loïck Magnin , University Paris-Diderot

Dmitri Maslov , NSF - Arlington
 Techniques for Quantum Circuit Optimization
Abstracts: txt


Alexander May , Ruhr-Universität Bochum
 Decoding Random Linear Codes in O(2^0.054n)
Abstracts: txt


Cris Moore , University of New Mexico - Albuquerque
 The McEliece cryptosystem resists quantum Fourier sampling attacks
Abstracts: txt


Kirill Morozov , Kyushu University
 Proof of Plaintext Knowledge for Code-Based Cryptosystems
Abstracts: txt


Michele Mosca , University of Waterloo

Daniel Nagaj , Slovak Academy of Sciences - Bratislava
 What can you hide in qutrit chains?
Abstracts: txt


Maris Ozols , University of Waterloo
 Quantum algorithms for the hidden shift problem of Boolean functions
Abstracts: txt


Anupam Prakash , University of California - Berkeley

Ben Reichardt , University of Waterloo

Martin Roetteler , NEC Laboratories America, Inc. - Princeton

Jeremie Roland , Université Libre de Bruxelles
 Quantum adversary lower bounds by polynomials
Abstracts: txt


Alexander Russell , University of Connecticut - Storrs

Leonard J. Schulman , CalTech - Pasadena

Igor A. Semaev , University of Bergen
 Improvements on Circuit Lattices
Abstracts: txt Slides: pdf


Igor Shparlinski , Macquarie University - Sydney
 Hidden Shifted Power Problem
Abstracts: txt


Rolando Somma , Los Alamos National Lab.

Florian Speelman , CWI - Amsterdam
 The garden-hose game and applications to position-based cryptography
Abstracts: txt


Rainer Steinwandt , Florida Atlantic University - Boca Raton

Barbara Terhal , RWTH Aachen

Thomas Vidick , University of California - Berkeley

Arne Winterhof , RICAM - Linz

Wim van Dam , University of California - Santa Barbara


Creative Commons License
This webpage and the material that is made available on this webpage is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License.

The CC by-nc-nd license allows you to copy, distribute and transmit the work under the following conditions: