CINXE.COM
Program | PQCrypto 2016
<!DOCTYPE html> <html lang="ja"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=1020"> <title>Program | PQCrypto 2016</title> <meta name="description" content="The 7th International Conference on Post-Quantum Cryptography PQCrypto 2016. Fukuoka, Japan, February 24-26, 2016. Preceded by the winter school on February 22-23."> <meta name="keywords" content="ポスト量子暗号,符号暗号,格子暗号,多変数多項式暗号,ハッシュ署名,量子暗号方式,量子攻撃,量子計算,post-quantum cryptography,code-based cryptosystems,lattice-based cryptosystems,hash-based signatures,multivariate cryptosystems,quantum cryptographic schemes,quantum cryptanalysis,quantum computing"> <link rel="shortcut icon" href="../favicon.ico"> <link rel="stylesheet" href="../css/common.css"> <link rel="stylesheet" href="../css/base.css"> <script src="../js/jquery-1.11.1.min.js"></script> <script src="../js/module.manager.js"></script> <script src="../js/html5shiv.min.js"></script> </head> <body> <div id="header_block"> <header class="clearfix"> <div id="logo"><a href="/"><img src="../img/common/logo.png" alt="PQCrypto 2016" width="282" height="82"></a></div> </header> </div> <div id="wrapper"> <div id="mainimg_box"> <h1><img src="../img/program/main.png" alt="Program" width="720" height="80"></h1> </div> <div id="contents_block" class="clearfix"> <main id="main_contents_block"> <div class="txtarea"> <p style="font-size:140%;margin-bottom:30px;color:blue;">The conference is preceded by the <a href="/winter/">Winter School</a> on February 22-23.</p> <p style="font-size:200%;margin-bottom:20px;color:red;"><b>Program</b></p> <p style="font-size:110%;margin-bottom:20px;color:red;"><a href="/data/pqc2016-program.pdf" target="_blank">(Printable PDF version: both the winter school and the conference)</a></p> <p style="font-size:140%;margin-bottom:5px;color:blue;"><b>February 24 (Wednesday)</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>8:30-9:15 Registration</b> (Venue opens at 8:30)</p> <p style="font-size:110%;margin-bottom:5px;"><b>9:15-9:30 Opening Remark</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>9:30-10:00 NIST Announcement</b><br /> <i>Post-Quantum Cryptography: NIST's Plan for the Future</i> [<a href="/data/pqc2016_nist_announcement.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/nfLAVybabMs" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;"><b></b>Presentation: Dustin Moody</p> <p style="font-size:110%;margin-bottom:5px;"><b>10:00-11:00 Code-Based Cryptography I (Chair: Nicolas Sendrier)</b></p> <p style="font-size:110%;margin-bottom:0.5px;"><i>IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter</i> [<a href="/data/von-Maurich-Hybrid_Encryption_from_QC-MDPC Niederreiter.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/uS_3_qcWEeU" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Ingo von Maurich, Lukas Heberle, and Tim Guneysu</p> <p style="font-size:110%;margin-bottom:0.5px;"><i>RankSynd a PRNG Based on Rank Metric</i> [<a href="https://youtu.be/jMLbCkf2a3Y" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;">Philippe Gaborit, Adrien Hauteville, and Jean-Pierre Tillich</p> <p style="font-size:110%;margin-bottom:5px;"><b>11:00-11:30 Coffee Break</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>11:30-12:30 Invited Talk I (Chair: Nicolas Sendrier)</b></p> <p style="font-size:110%;margin-bottom:0.5px;"><i>The Post-Quantum Internet</i> [<a href="/data/Bernstein-slides-djb-20160224-4x3.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/bbkCBlWfwaQ" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;"><b> </b>Daniel Bernstein (University of Illinois at Chicago)</p> <p style="font-size:110%;margin-bottom:5px;"><b>12:30-12:40 Group Picture</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>12:40-14:00 Lunch</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>14:00-16:00 Quantum Security (Chair: David Jao)</b></p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Applying Grover's Algorithm to AES: Quantum Resource Estimates</i> [<a href="/data/Langenberg-Grover-AES.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/3dIa-I0CYHg" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Markus Grassl, Brandon Langenberg, Martin Roetteler, and Rainer Steinwandt</p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation</i> [<a href="/data/Anand-present.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/sGscnSHCtKs" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Dominique Unruh, Ehsan Ebrahimi Targhi, Gelo Noel Tabia, and Mayuresh Vivekanand Anand</p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Post-Quantum Security Models for Authenticated Encryption</a></i> [<a href="/data/Soukharev-talk3.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/sEfWTPB-cs4" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Vladimir Soukharev, David Jao, and Srinath Seshadri</p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Quantum Collision-Resistance of Non-Uniformly Distributed Functions</i> [<a href="/data/Ebrahimi-presntation-collision.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/bviP1AKC9kU" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;"><b> </b>Ehsan Ebrahimi Targhi, Gelo Noel Tabia, and Dominique Unruh</p> <p style="font-size:110%;margin-bottom:5px;"><b>16:00-16:30 Coffee Break</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>16:30-17:30 Invited Talk II (Chair: Rainer Steinwandt)</b></p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Quantum Key Distribution Platform and Its Applications</i> [<a href="/data/Sasaki_PQCrypto2016_slide_20160224.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/5Xb3SCq6CBQ" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;"><b> </b>Masahide Sasaki (Quantum ICT Laboratory, NICT)</p> <p style="font-size:110%;margin-bottom:20px;"><b>18:20- Reception (<a href="http://www.fukuoka-srp.co.jp/english_leaflet.pdf">Fukuoka SRP Center Building</a> - <a href="https://goo.gl/maps/icjwiaFgMcq">Google Maps</a>)</b></p> <p style="font-size:140%;margin-bottom:5px;color: blue"><b>February 25 (Thursday)</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>8:30-9:00 Registration</b> (Venue opens at 8:30)</p> <p style="font-size:110%;margin-bottom:5px;"><b>9:00-11:00 Code-Based Cryptography II (Chair: Tanja Lange)</b></p> <p style="font-size:110%;margin-bottom:0.5px;"><i>An Efficient Attack on a Code-based Signature Scheme</i> [<a href="/data/Phesso_Tillich_Slides.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/smzpdhsgcu0" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Aurélie Phesso and Jean-Pierre Tillich</p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Vulnerabilities of "McEliece in the World of Escher"</i> [<a href="/data/Perlner-EscherMcEliece5.pptx" target="_blank"><b>pptx</b></a>] [<a href="/data/Perlner-EscherMcEliece5.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/rL9mUK_YMNM" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Dustin Moody and Ray Perlner</p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes</i> [<a href="/data/Dragoi_McEliece_Polar_cryptanalysis.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/yj_aEWNue1w" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Magali Bardet, Julia Chaulet, Vlad Dragoi, Ayoub Otmani, and Jean-Pierre Tillich </p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Analysis of Information Set Decoding for a Sub-Linear Error Weight</i> [<a href="/data/Torres-Sublinear.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/GyW-HpkW4BY" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;"><b> </b>Rodolfo Canto Torres and Nicolas Sendrier</p> <p style="font-size:110%;margin-bottom:5px;"><b>11:00-11:30 Coffee Break</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>11:30-12:30 Invited Talk III (Chair: Johannes Buchmann)</b></p> <p style="font-size:110%;margin-bottom:0.5px;"><i>The Intel Strategy for Post Quantum Cryptography</i> [<a href="/data/Brickell-Post_Quantum_Strategy-PQC_2016_final.pptx" target="_blank"><b>pptx</b></a>] [<a href="/data/Brickell-Post_Quantum_Strategy-PQC_2016_final.pdf" target="_blank"><b>pdf</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;"><b> </b>Ernie Brickell (Intel)</p> <p style="font-size:110%;margin-bottom:5px;"><b>12:30-14:00 Lunch</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>14:00-16:00 Multivariate Polynomial Cryptography (Chair: Bo-Yin Yang)</b></p> <p style="font-size:110%;margin-bottom:0.5px;"><i>On the Differential Security of the HFEv- Signature Primitive</i> [<a href="/data/Vates_Presentation.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/B6_ruWqW50k" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Ryann Cartor, Ryan Gipson, Daniel Smith-Tone, and Jeremy Vates</p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems</i> [<a href="/data/Szepieniec-efc.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/T1IoW1y7T2A" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Alan Szepieniec, Jintai Ding, and Bart Preneel</p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Security Analysis and Key Modification for ZHFE</i> [<a href="/data/Smith-Tone-PQCRYPTO2016.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/PLmn2RkMZvc" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Ray Perlner and Daniel Smith-Tone</p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Efficient ZHFE Key Generation</i> [<a href="/data/Cabarcas-zhfe_key_gen_slides.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/Ta2-JToFids" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;"><b> </b>John B. Baena, Daniel Cabarcas, Daniel E. Escudero, Jaiberth Porras-Barrera, and Javier A. Verbel</p> <p style="font-size:110%;margin-bottom:5px;"><b>16:00-16:30 Coffee Break</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>16:30-17:30 Invited Talk IV (Chair: Jintai Ding)</b></p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Challenges for Lattice Cryptography</i> [<a href="/data/Galbraith-PQCrypto.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/xpBEgT9xyk8" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;">Steven Galbraith (University of Auckland)</p> <p style="font-size:110%;margin-bottom:1px;"><b>18:30- Banquet (<a href="http://www.tripadvisor.com/Restaurant_Review-g298207-d6061179-Reviews-Fish_Kaiseki_Sanshiro-Fukuoka_Fukuoka_Prefecture_Kyushu_Okinawa.html">Restaurant Sanshirou</a>: reserved bus from the venue, 10 minutes drive)</b></p> <p style="font-size:110%;margin-bottom:20px;margin-left:115px;"><b>(<a href="https://goo.gl/maps/mGGXMJHiaZ12">Google Maps</a>)</b><p> <p style="font-size:140%;margin-bottom:5px;color: blue"><b>February 26 (Friday)</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>8:30-9:00 Registration</b> (Venue opens at 8:30)</p> <p style="font-size:110%;margin-bottom:5px;"><b>9:00-10:00 Lattice-Based Cryptography (Chair: Keita Xagawa)</b></p> <p style="font-size:110%;margin-bottom:0.5px;"><i>Additively Homomorphic Ring-LWE Masking</i> [<a href="/data/Reparaz_pqcrypto2016_to_web.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/pPLGL7G4Z7Y" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:15px;"><b> </b>Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede, and Ruan de Clercq</p> <p style="font-size:110%;margin-bottom:0.5px;"><i>An Homomorphic LWE based E-voting Scheme</i> [<a href="/data/Chillotti-Gama_Georgieva_Izabachene-An_Homomorphic_LWE-based_E-voting_Scheme-less-pauses.pdf" target="_blank"><b>pdf</b></a>] [<a href="https://youtu.be/S3RQ_s4RuPU" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;"><b> </b>Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachene</p> <p style="font-size:110%;margin-bottom:5px;"><b>10:00-10:30 Coffee Break</b></p> <p style="font-size:110%;margin-bottom:5px;"><b>10:30-11:30 <a href="/hot.html">Hot Topic Session</a> (Chair: Chen-Mou Cheng)</b> [<a href="https://youtu.be/7Z8Bj0KquiA" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;"><b>11:30-12:30 NIST Announcement Q&A</b> [<a href="https://youtu.be/bF7-hDIaBU8" target="_blank"><b>video</b></a>]</p> <p style="font-size:110%;margin-bottom:5px;"><b> </b>Moderators: Dustin Moody, Ray Perlner, and Daniel Smith-Tone</p> <p style="font-size:110%;margin-bottom:5px;"><b>12:30-12:35 Closing</b></p> <p style="font-size:110%;margin-bottom:1px;"><b>Afternoon: Excursion (Optional) - Traditional Japanese Sake Brewery</b></p> <p style="font-size:110%;margin-bottom:5px;"><b><a href="http://www.tripadvisor.com/Attraction_Review-g298207-d1878027-Reviews-Hakata_Hyakunenkura-Fukuoka_Fukuoka_Prefecture_Kyushu_Okinawa.html">Hakata Hyakunenkura</a> - <a href="https://goo.gl/maps/VqhQfvUotJT2">Google Maps</a></b> </div> </main> <div id="sub_contents_block"> <section class="nav_conference"> <div class="nav_ttl"> <p>About the Conference</p> </div> <nav> <ul> <li><a href="/">Top Page</a></li> <li><a href="/news/">News</a></li> <li><a href="/registration/">Registration</a></li> <li><a href="https://conference.sakura.ne.jp/www/pqcrypto2016/stipends/">Stipends</a></li> <li><a href="/program/">Program</a></li> <li><a href="/accepted.html">Accepted Papers</a></li> <li><a href="/hot.html">Hot Topic Session</a></li> <li><a href="/winter/">Winter School</a></li> <li><a href="/call/">Call for Papers</a></li> <li><a href="https://pqcrypto2016.jp/ichair/" target="_blank"><span class="icon_blank">Submit a Paper</span></a></li> <li><a href="/proceeding/">Proceedings</a></li> <li><a href="/contacts/">Contacts</a></li> </ul> </nav> </section> <section class="nav_general"> <div class="nav_ttl"> <p>General Information</p> </div> <nav> <ul> <li><a href="/location/">Location</a></li> <li><a href="/venue/">Venue</a></li> <li><a href="https://conference.sakura.ne.jp/www/pqcrypto2016/hotel/">Accomodation</a></li> <li><a href="/photo/">Discover Fukuoka</a></li> </ul> </nav> </section> <section class="banner_block"> <p class="banner_label">In Cooperation with</p> <ul class="banner_block_01"> <li class="txt_link"><a href="http://iacr.org" target="_blank"> <span class="ph"><img src="/img/common/bnr_iacrlogo.png" alt="" width="50"></span> <span class="txt">International Association for Cryptologic Research (IACR)</span></a></li> <li><a href="http://www.springer.com/lncs" target="_blank"><img src="/img/proceeding/lncs.gif" alt="Lecture Notes in Computer Science" width="220" height="70"></a></li> </ul> <p class="banner_label mt10">Local Organization</p> <ul class="banner_block_02"> <li><a href="http://www.isit.or.jp/english/" target="_blank"> <span class="ph"><img src="/img/common/isit-logo.png" alt="" width="50"></span> <span class="txt">Institute of Systems, Information Technologies and Nanotechnologies (ISIT)</span></a></li> <li><a href="http://www.imi.kyushu-u.ac.jp/eng/" target="_blank"> <span class="ph"><img src="/img/common/bnr_imi.gif" alt="" width="50" height="33"></span> <span class="txt">Institute of Mathematics for Industry,<br> Kyushu University</span></a></li> </ul> <p class="banner_label">PQCrypto 2016 Poster</p> <ul class="banner_block_01"> <li><a href="/data/pqcrypto2016_poster_web.pdf" target="_blank"> <img src="/img/common/pqc_2016_poster_web.jpg" alt=""> </a></li> </ul> <p class="banner_label">Related Conferences</p> <ul class="banner_block_01"> <li><a href="http://2015.qcrypt.net/" target="_blank"><img src="/img/common/bnr_qcrypt2015.gif" alt="QCrypt2015 in TOKYO" ></a></li> <li><a href="http://2015.uqcc.org/" target="_blank"><img src="/img/common/banner_UQCC2015.gif" alt="UQCC2015" width="220"></a></li> <li class="txt_only"><a href="http://www.etsi.org/membership/member-rights-and-benefits/10-news-events/events/949-etsi-iqc-3" target="_blank">ETSI 3rd Quantum-Safe Crypto Workshop in Seoul, October 5-7, 2015</a></li> </ul> <p class="banner_label">PQCrypto 2016 Banner</p> <ul class="banner_block_01"> <li class="font11">Use this banner to create a link to: <a href="https://pqcrypto2016.jp/" target="_blank">https://pqcrypto2016.jp/</a></li> <li><img src="/img/common/bnr_pqcrypto.gif" alt="PQCrypto 2016" width="220" height="70"></li> </ul> </section> </div> </div> </div> <footer> <p>Coryright © PQCrypto 2016. All Rights Reserved.</p> </footer> </body> </html>