
Post-Quantum in 2017
Home page of PQCRYPTO EU-Project You might be looking for one of the following events.
Videos for Summer School on Post-Quantum Cryptography 2017
Tanja Lange: "Introduction to post-quantum cryptography" Download WebM (1280x720 VP8 video, Vorbis audio, 81994008 bytes) Download MP4 (1280x720 H.264 video, MP3 audio, …
PQCrypto 2017
The conference will be preceded by a Summer School on Post-Quantum Cryptography (organized by the H2020 project PQCRYPTO) which will run June 19–23, 2017 and an Executive School …
Cryptography Motivation #1: Communication channels are spying on our data. Motivation #2: Communication channels are modifying our data. Sender Untrustworthy network \Alice" \Eve" …
PQCrypto 2017
Home page of PQCRYPTO EU-Project Fast Lattice-Based Encryption: Stretching SPRING Charles Bouillaguet, Claire Delaplace, Pierre-Alain Fouque, and Paul Kirchner Revisiting …
Public key: P = S F T supposed to look like a random system Private key: S, F, T allows to invert the public key
Assuming that the knowledge of the linear expansion does not reveal the code structure: The linear expansion is public and anyone can encrypt The decoder is known to the legitimate user …
Attacker can log in remotely (ssh) Some attacks work by measuring network delays Attacker does not even need an account on the target machine
Many “advanced” primitives can be based on these hardness assumptions
Show a detailed how recover a fully functional private key for ZHFE from the public key. Estimate the complexity of this attack