LZI - Schloss Dagstuhl - Talks + Materials of Seminar 13371
 Functions: 

Seminar 13371
Quantum Cryptanalysis

Serge Fehr (CWI - Amsterdam, NL), Michele Mosca (University of Waterloo, CA), Martin Rötteler (NEC Laboratories America, Inc. - Princeton, US), Rainer Steinwandt (Florida Atlantic University - Boca Raton, US)

Caveat: Due to caching problems of dynamic webpages, sometimes newly
uploaded files are not shown. Please reload the page accordingly.

 

Seminar Wide Materials
 
 Wednesday afternoon hike
Other: kmz

 


Aleksandrs Belovs , University of Latvia
 

Daniel J. Bernstein , University of Illinois - Chicago
 Quantum algorithms for the subset-sum problem
Abstracts: txt

 

Johannes A. Buchmann , TU Darmstadt
 

Andrew Childs , University of Waterloo
 

Frederic Dupont-Dupuis , Aarhus University
 A new definition for the quantum conditional Rényi entropy
Abstracts: txt

 

Serge Fehr , CWI - Amsterdam
 

Katalin Friedl , Budapest University of Technology & Economics
 

Markus Grassl , National University of Singapore
 On quantum versions of the McEliece cryptosystem
Abstracts: txt Slides: pdf

 

Nadia Heninger , University of Pennsylvania
 Lattice-based cryptography
Abstracts: txt Slides: pdf

 

Peter Hoyer , University of Calgary
 

Gabor Ivanyos , Hungarian Academy of Sciences - Budapest
 Hidden subgroup problems in quantum-resistant cryptography?
Abstracts: txt Slides: pdf Other: txt

 

Stacey Jeffery , University of Waterloo
 

Stephen P. Jordan , NIST - Gaithersburg
 

Thijs Laarhoven , TU Eindhoven
 Quantum Lattice Cryptanalysis, Part 1
Abstracts: txt Slides: pdf Paper: pdf

 

Bradley Lackey , National Security Agency - Fort Meade
 

Tanja Lange , TU Eindhoven
 

Yi-Kai Liu , NIST - Gaithersburg
 

Alexander May , Ruhr-Universität Bochum
 Recent advances in decoding random binary linear codes
Abstracts: txt

 

Kirill Morozov , Kyushu University
 Code-Based Verifiable Encryption
Abstracts: txt Slides: pdf

 

Michele Mosca , University of Waterloo
 

Maris Ozols , IBM TJ Watson Research Center - Yorktown Heights
 Easy and hard functions for the Boolean hidden shift problem
Abstracts: txt

 

Youming Qiao , National University of Singapore
 On group isomorphism problem when Cayley tables are given
Abstracts: txt Slides: pdf

 

Martin Roetteler , Microsoft Research - Redmond
 

Louis Salvail , University of Montreal
 

Miklos Santha , University Paris-Diderot
 

Christian Schaffner , University of Amsterdam
 Complete Insecurity of Quantum Protocols for Classical Two-Party Computation
Abstracts: txt Slides: keypdf

 

John M. Schanck , University of Waterloo
 Practical Signatures from the Partial-DFT Recovery Problem
Abstracts: txt

 

Nicolas Sendrier , INRIA - Le Chesnay
 Classical algorithm techniques for decoding generic linear codes
Abstracts: txt Slides: pdf

 

Daniel Smith , NIST - Gaithersburg
 Quantum-Resistant Multivariate Public Key Cryptography
Abstracts: txt Slides: pdf

 

Rolando Somma , Los Alamos National Lab.
 Exponential improvement in precision for Hamiltonian-evolution simulation
Abstracts: txt Slides: pdf

 

Fang Song , Penn State University
 

Rainer Steinwandt , Florida Atlantic University - Boca Raton
 

Krysta Svore , Microsoft Research - Redmond
 Single-qubit circuit decomposition
Abstracts: txt

 

Frank Wilhelm-Mauch , Universität des Saarlandes
 

Wim van Dam , University of California - Santa Barbara
 

Joop van de Pol , University of Bristol
 Quantum Lattice Cryptanalysis, Part 2
Abstracts: txt Slides: pdf

 

Maarten van den Nest , MPI für Quantenoptik
 Simulating quantum circuits with sparse output distributions
Abstracts: txt

 



License

Creative Commons License
This webpage and the material that is made available on this webpage is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License.

The CC by-nc-nd license allows you to copy, distribute and transmit the work under the following conditions: