Post-Quantum


Posted on in Presentations

This Cryptography session will cover the following topics: Topic 1) SoK: How (not) to Design and Implement Post-Quantum Cryptography; Topic 2) Dual lattice attacks for closest vector problems (with preprocessing); and Topic 3) On the Hardness of Module-LWE with Binary Secrets.


Participants
Corentin Jeudy

Speaker, Participant

Research Intern, Univ Rennes, CNRS, IRISA

James Howe

Speaker, Participant

Cryptography Engineer, PQShield

Thijs Laarhoven

Speaker, Participant

Postdoctoral Researcher, Eindhoven University of Technology

Thomas Prest

Speaker, Participant

Senior Cryptography Researcher, PQShield

cryptography quantum computing


Subtopic


Share With Your Community