Post-Quantum


Posted on in Presentations

This Cryptography session will cover the following topics: Topic 1) SoK: How (not) to Design and Implement Post-Quantum Cryptography; Topic 2) Dual lattice attacks for closest vector problems (with preprocessing); and Topic 3) On the Hardness of Module-LWE with Binary Secrets.

Participants
James Howe

Speaker

Cryptography Engineer, PQShield

Corentin Jeudy

Speaker

Research Intern, Univ Rennes, CNRS, IRISA

Thijs Laarhoven

Speaker

Postdoctoral Researcher, Eindhoven University of Technology

Thomas Prest

Speaker

Senior Cryptography Researcher, PQShield

cryptography quantum computing


Subtopic


Share With Your Community