Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Within this website:
External resources:
Within this website:
External resources:
  • the dblp Computer Science Bibliography

Dagstuhl Seminar 11381

Quantum Cryptanalysis

( Sep 18 – Sep 23, 2011 )

(Click in the middle of the image to enlarge)

Please use the following short url to reference this page:





A total of 41 scientists from across the world, including both young and senior researchers, visited Dagstuhl for this seminar. To ensure fruitful discussions between experts in quantum computing and in cryptography, the invited participants were chosen such that there is enough common ground/research experience to communicate with colleagues in the other ``camp''. We scheduled the talks with sufficient buffer to have time left for interaction during the talks and for discussions in smaller groups between the talks. Details of the schedule kept changing during the seminar, reflecting the dynamic nature of this meeting. For Wednesday afternoon no talks were scheduled and some participants took advantage of this free afternoon for a hiking trip, some for an excursion to Trier, and others for more discussions.

As anticipated, one of the central topics of the seminar was the hardness of cryptographically relevant computational problems in the presence of quantum attacks: a number of talks addressed classical computational problems and the availability or non-availability of efficient quantum algorithms for these. Moreover, specific cryptographic proposals were discussed which were designed to offer resistance against adversaries with access to quantum computers. Security guarantees of such schemes may rely on some suitable computational hardness assumption, but also on other technological restrictions imposed on the attacker, or solely on the correctness of quantum mechanics. Talks on additional topics, specifically on efficient implementations, foundations of quantum computing and quantum information theory completed the program of the seminar. More details on the individual talks can be found in the abstracts following this introduction.

Looking at the extensive, fruitful, and passionate discussions in the seminar, it is fair to say that this meeting successfully fostered the exchange of two research communities. The presented talks and ensuing discussions added to our understanding of particular cryptographic constructions in the presence of quantum computers. Directions for future work on ``quantum-resistant'' cryptographic schemes have been indicated, and we hope that follow-up meetings will offer the opportunity to deepen the collaboration between quantum computing and cryptography and therewith help to advance the state-of-the-art in ``post quantum'' cryptography.

  • Daniel J. Bernstein (University of Illinois - Chicago, US) [dblp]
  • Anne Broadbent (University of Waterloo, CA) [dblp]
  • Harry Buhrman (CWI - Amsterdam, NL) [dblp]
  • Andrew Childs (University of Waterloo, CA) [dblp]
  • Matthias Christandl (ETH Zürich, CH)
  • Roger Colbeck (Perimeter Institute - Waterloo, CA)
  • Serge Fehr (CWI - Amsterdam, NL) [dblp]
  • Dmitry Gavinsky (NEC Laboratories America, Inc. - Princeton, US)
  • Sean Hallgren (Pennsylvania State University - University Park, US) [dblp]
  • Aram W. Harrow (University of Washington - Seattle, US) [dblp]
  • Avinatan Hassidim (Google Israel - Tel-Aviv, IL) [dblp]
  • Peter Hoyer (University of Calgary, CA) [dblp]
  • Tsuyoshi Ito (University of Waterloo, CA)
  • Stacey Jeffery (University of Waterloo, CA) [dblp]
  • Stephen P. Jordan (NIST - Gaithersburg, US) [dblp]
  • Robert Koenig (IBM TJ Watson Research Center - Yorktown Heights, US)
  • Tanja Lange (TU Eindhoven, NL) [dblp]
  • Frédéric Magniez (University of Paris VII, FR) [dblp]
  • Loïck Magnin (University of Paris VII, FR)
  • Dmitri Maslov (NSF - Arlington, US)
  • Alexander May (Ruhr-Universität Bochum, DE) [dblp]
  • Cris Moore (Santa Fe Institute, US) [dblp]
  • Kirill Morozov (Kyushu University - Fukuoka, JP) [dblp]
  • Michele Mosca (University of Waterloo, CA) [dblp]
  • Daniel Nagaj (Slovak Academy of Sciences - Bratislava, SK)
  • Maris Ozols (University of Waterloo, CA) [dblp]
  • Anupam Prakash (University of California - Berkeley, US)
  • Ben Reichardt (University of Southern California, US)
  • Martin Roetteler (NEC Laboratories America, Inc. - Princeton, US) [dblp]
  • Jérémie Roland (Université Libre de Bruxelles, BE)
  • Alexander Russell (University of Connecticut - Storrs, US) [dblp]
  • Leonard J. Schulman (CalTech - Pasadena, US) [dblp]
  • Igor A. Semaev (University of Bergen, NO)
  • Igor Shparlinski (Macquarie University - Sydney, AU) [dblp]
  • Rolando Somma (Los Alamos National Lab., US) [dblp]
  • Florian Speelman (CWI - Amsterdam, NL) [dblp]
  • Rainer Steinwandt (Florida Atlantic University - Boca Raton, US) [dblp]
  • Barbara Terhal (RWTH Aachen, DE) [dblp]
  • Wim van Dam (University of California - Santa Barbara, US) [dblp]
  • Thomas Vidick (MIT - Cambridge, US)
  • Arne Winterhof (RICAM - Linz, AT)

Related Seminars
  • Dagstuhl Seminar 13371: Quantum Cryptanalysis (2013-09-08 - 2013-09-13) (Details)
  • Dagstuhl Seminar 15371: Quantum Cryptanalysis (2015-09-06 - 2015-09-11) (Details)
  • Dagstuhl Seminar 17401: Quantum Cryptanalysis (2017-10-01 - 2017-10-06) (Details)
  • Dagstuhl Seminar 19421: Quantum Cryptanalysis (2019-10-13 - 2019-10-18) (Details)
  • Dagstuhl Seminar 21421: Quantum Cryptanalysis (2021-10-17 - 2021-10-22) (Details)
  • Dagstuhl Seminar 23421: Quantum Cryptanalysis (2023-10-15 - 2023-10-20) (Details)

  • Data structures/Algorithms/Complexity
  • Security / Cryptography

  • Quantum Computing
  • Post Quantum Cryptography
  • Computational Algebra
  • Cryptographic Protocol Design