TOP
Suche auf der Schloss Dagstuhl Webseite
Sie suchen nach Informationen auf den Webseiten der einzelnen Seminare? - Dann:
Nicht fündig geworden? - Einige unserer Dienste laufen auf separaten Webseiten mit jeweils eigener Suche. Bitte beachten Sie folgende Liste:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminare
Innerhalb dieser Seite:
Externe Seiten:
  • DOOR (zum Registrieren eines Dagstuhl Aufenthaltes)
  • DOSA (zum Beantragen künftiger Dagstuhl Seminare oder Dagstuhl Perspektiven Workshops)
Publishing
Innerhalb dieser Seite:
Externe Seiten:
dblp
Innerhalb dieser Seite:
Externe Seiten:
  • die Informatik-Bibliographiedatenbank dblp


Dagstuhl-Seminar 11381

Quantum Cryptanalysis

( 18. Sep – 23. Sep, 2011 )

(zum Vergrößern in der Bildmitte klicken)

Permalink
Bitte benutzen Sie folgende Kurz-Url zum Verlinken dieser Seite: https://www.dagstuhl.de/11381

Organisatoren

Kontakt



Programm

Summary

A total of 41 scientists from across the world, including both young and senior researchers, visited Dagstuhl for this seminar. To ensure fruitful discussions between experts in quantum computing and in cryptography, the invited participants were chosen such that there is enough common ground/research experience to communicate with colleagues in the other ``camp''. We scheduled the talks with sufficient buffer to have time left for interaction during the talks and for discussions in smaller groups between the talks. Details of the schedule kept changing during the seminar, reflecting the dynamic nature of this meeting. For Wednesday afternoon no talks were scheduled and some participants took advantage of this free afternoon for a hiking trip, some for an excursion to Trier, and others for more discussions.

As anticipated, one of the central topics of the seminar was the hardness of cryptographically relevant computational problems in the presence of quantum attacks: a number of talks addressed classical computational problems and the availability or non-availability of efficient quantum algorithms for these. Moreover, specific cryptographic proposals were discussed which were designed to offer resistance against adversaries with access to quantum computers. Security guarantees of such schemes may rely on some suitable computational hardness assumption, but also on other technological restrictions imposed on the attacker, or solely on the correctness of quantum mechanics. Talks on additional topics, specifically on efficient implementations, foundations of quantum computing and quantum information theory completed the program of the seminar. More details on the individual talks can be found in the abstracts following this introduction.

Looking at the extensive, fruitful, and passionate discussions in the seminar, it is fair to say that this meeting successfully fostered the exchange of two research communities. The presented talks and ensuing discussions added to our understanding of particular cryptographic constructions in the presence of quantum computers. Directions for future work on ``quantum-resistant'' cryptographic schemes have been indicated, and we hope that follow-up meetings will offer the opportunity to deepen the collaboration between quantum computing and cryptography and therewith help to advance the state-of-the-art in ``post quantum'' cryptography.


Teilnehmer
  • Daniel J. Bernstein (University of Illinois - Chicago, US) [dblp]
  • Anne Broadbent (University of Waterloo, CA) [dblp]
  • Harry Buhrman (CWI - Amsterdam, NL) [dblp]
  • Andrew Childs (University of Waterloo, CA) [dblp]
  • Matthias Christandl (ETH Zürich, CH)
  • Roger Colbeck (Perimeter Institute - Waterloo, CA)
  • Serge Fehr (CWI - Amsterdam, NL) [dblp]
  • Dmitry Gavinsky (NEC Laboratories America, Inc. - Princeton, US)
  • Sean Hallgren (Pennsylvania State University - University Park, US) [dblp]
  • Aram W. Harrow (University of Washington - Seattle, US) [dblp]
  • Avinatan Hassidim (Google Israel - Tel-Aviv, IL) [dblp]
  • Peter Hoyer (University of Calgary, CA) [dblp]
  • Tsuyoshi Ito (University of Waterloo, CA)
  • Stacey Jeffery (University of Waterloo, CA) [dblp]
  • Stephen P. Jordan (NIST - Gaithersburg, US) [dblp]
  • Robert Koenig (IBM TJ Watson Research Center - Yorktown Heights, US)
  • Tanja Lange (TU Eindhoven, NL) [dblp]
  • Frédéric Magniez (University of Paris VII, FR) [dblp]
  • Loïck Magnin (University of Paris VII, FR)
  • Dmitri Maslov (NSF - Arlington, US)
  • Alexander May (Ruhr-Universität Bochum, DE) [dblp]
  • Cris Moore (Santa Fe Institute, US) [dblp]
  • Kirill Morozov (Kyushu University - Fukuoka, JP) [dblp]
  • Michele Mosca (University of Waterloo, CA) [dblp]
  • Daniel Nagaj (Slovak Academy of Sciences - Bratislava, SK)
  • Maris Ozols (University of Waterloo, CA) [dblp]
  • Anupam Prakash (University of California - Berkeley, US)
  • Ben Reichardt (University of Southern California, US)
  • Martin Roetteler (NEC Laboratories America, Inc. - Princeton, US) [dblp]
  • Jérémie Roland (Université Libre de Bruxelles, BE)
  • Alexander Russell (University of Connecticut - Storrs, US) [dblp]
  • Leonard J. Schulman (CalTech - Pasadena, US) [dblp]
  • Igor A. Semaev (University of Bergen, NO)
  • Igor Shparlinski (Macquarie University - Sydney, AU) [dblp]
  • Rolando Somma (Los Alamos National Lab., US) [dblp]
  • Florian Speelman (CWI - Amsterdam, NL) [dblp]
  • Rainer Steinwandt (Florida Atlantic University - Boca Raton, US) [dblp]
  • Barbara Terhal (RWTH Aachen, DE) [dblp]
  • Wim van Dam (University of California - Santa Barbara, US) [dblp]
  • Thomas Vidick (MIT - Cambridge, US)
  • Arne Winterhof (RICAM - Linz, AT)

Verwandte Seminare
  • Dagstuhl-Seminar 13371: Quantum Cryptanalysis (2013-09-08 - 2013-09-13) (Details)
  • Dagstuhl-Seminar 15371: Quantum Cryptanalysis (2015-09-06 - 2015-09-11) (Details)
  • Dagstuhl-Seminar 17401: Quantum Cryptanalysis (2017-10-01 - 2017-10-06) (Details)
  • Dagstuhl-Seminar 19421: Quantum Cryptanalysis (2019-10-13 - 2019-10-18) (Details)
  • Dagstuhl-Seminar 21421: Quantum Cryptanalysis (2021-10-17 - 2021-10-22) (Details)
  • Dagstuhl-Seminar 23421: Quantum Cryptanalysis (2023-10-15 - 2023-10-20) (Details)

Klassifikation
  • Data structures/Algorithms/Complexity
  • Security / Cryptography

Schlagworte
  • Quantum Computing
  • Post Quantum Cryptography
  • Computational Algebra
  • Cryptographic Protocol Design