Post-Quantum Cryptography Trimester - Workshop 2 (original) (raw)
Emerging topics in design and cryptanalysis of post-quantum schemes
November 4th-8th, 2024
Ampithéâtre Charles Hermite, Borel Building, Institut Henri Poincaré
About the workshop
This workshop will serve as a forum for researchers to present current results and works in progress on standard and advanced algebraic cryptography in a post-quantum setting. Topics to be covered during the workshop include, but are not limited to, post-quantum:
- Digital Signatures
- Key-encapsulation Mechanisms
- Threshold Cryptography
- Privacy-enhancing cryptography
- Machine learning for cryptanalysis
- Hardness assumptions
Lip and Less.pdf
Ray Perlner
Code Permutation Equivalence as a special case of LIP
IHP_Presentation.pdf
Christopher Battarbee
A History of Semidirect Product Cryptography
ZK Group Actions.pdf
Edoardo Persichetti
On Digital Signatures from Cryptographic Group Actions
SAP-24-11.pdf
Joachim Rosenthal
Public key protocols using semigroup actions
LatticeZK_new.pptx
Vadim Lyubashevsky
Progress in Lattice-based Zero Knowledge
20241105.-.SIS.with.Hints.-.PQAC.pdf
Martin Albrecht
SIS with Hints Assumptions
2024 IHP SQIsign.pdf
Benjamin Wesolowski
SQISign and the HD Revolution
IHP_MRossi.pdf
Mélissa Rossi
Not so discrete samplers: side-channel assisted attacks on lattice-based signature schemes
threshold-ihp-2024.pdf
Thomas Prest
Lattice-Based Threshold Signatures
Alex_May_One_Bit_Dilithium.pdf
Alexander May
Side Channel Resistance of Dilithium
20241107-IHP-PQAC-Slides--PEC-Threshold-Crypto-PQC-Opportunities-a02.pdf
Luís Brandão
Exploring Post-Quantum Threshold Cryptography & NIST Threshold Project
BeyondCPA4FHE-20241107-PQACrypt-IHP-RSIRDEY.pptx
Renaut Sirdey
Beyond CPA Security for FHE
2024-11-08_IHP-PQC_piop-based-sigs.pdf
Thibauld Feneuil
The Polynomial -IOP Version of the Latest MPCitH Frameworks for Signature Schemes
IHP.pdf
Damien Stehlé
Efficient exact homomorphic computations using CKKS
F.Pintore - PQA-IHP-24.pdf
Federico Pintore
Hessians of elliptic curves: isogenies and graphs
Code_Equivalence_Biasse.pptx
Jean-Francois Biasse
The Code Equivalence Problem and its Applications to Cryptography
Isogeny Interpolation.pdf
David Jao
Isogeny interpolation and the computation of isogenies from HD representations
- Martin Albrecht (King's College London & SandboxAQ, London, UK)
- Luis Brandao (NIST/Strativia)
- Thibauld Feneuil (CryptoExperts)
- Kit Battarbee (Sorbonne Univeristy)
- Vadim Lyubashevsky (IBM Research Zurich)
- Alex May (Ruhr Universität Bochum)
- Chris Peikert (University of Michigan)
- Edoardo Persichetti (Florida Atlantic University)
- Federico Pintore (University of Trento)
- Thomas Prest (PQShield)
- Angela Robinson (NIST)
- Ray Perlner (NIST)
- Joachim Rosenthal (University of Zürich)
- Melissa Rossi (ANSSI)
- Damien Stehlé (CryptoLab Inc)
- Renaud Sirdey (CEA LIST)
- Benjamin Wesolowski (ENS Lyon)
- Javier Verbel (TII, UAE)
- David Jao (University of Waterloo)
- Jean-Francois Biasse (University of South Florida)
Ray Perlner : Code Permutation Equivalence as a special case of LIP
Kit Battarbee : A History of Semidirect Product Cryptography
Edoardo Persichetti : On Digital Signatures from Cryptographic Group Actions
Joachim Rosenthal : Public key protocols using semigroup actions
Vadim Lyubashevsky : Progress in Lattice-based Zero Knowledge
Martin Albrecht : SIS with Hints Assumptions
Angela Robinson : Towards Modeling the Decoding Failure Rate of BIKE (talk not recorded)
Benjamin Wesolowski : SQIsign and the HD revolution
Mélissa Rossi : Not so discrete samplers: side-channel assisted attacks on lattice-based signature schemes
Thomas Prest : Lattice-Based Threshold Signatures
Javier Verbel : Improved Attacks for SNOVA by Exploiting Stability under a Group Action
David Jao : Isogeny interpolation and the computation of isogenies from HD representations
Alexander May : Side Channel Resistance of Dilithium
Luís Brandão : Exploring Post-Quantum Threshold Cryptography & NIST Threshold Project
Renaud Sirdey : Beyond CPA security for FHE
Chris Peikert : Lattice-Based Timed Cryptography: Assumptions and Attacks
Thibauld Feneuil : The Polynomial-IOP Vision of the Latest MPCitH Frameworks for Signature Schemes
Damien Stehlé : Efficient exact homomorphic computations using CKKS
Federico Pintore : Hessians of elliptic curves: isogenies and graphs
Jean Francois-Biasse : The Code Equivalence Problem and its Applications to Cryptography
Workshop2
Cocktail Reception : November 5, 2024 (Tuesday) from 17h45 onwards.
Location: Cafeteria Space, ground floor IHP Borel Building (Main building)
Olive Chakraborty
CEA-LIST
Delaram Kahrobaei
CUNY QC, GC; University of York; NYU
Ludovic Perret
EPITA & Sorbonne University