ここから本文です
研究室
情報セキュリティ研究室

情報セキュリティ研究室

Post-Quantum Cryptography Workshop

Workshop: Post-Quantum Cryptography and Its Related Topics

Japanese page

Overview

 The purpose is to exchange ideas and discuss about cryptography which would resist to attacks from quantum computers, like cryptosystems based on multivariate polynomials, code-based cryptography, lattice-based cryptography, as well as about related topics. Such cryptosystems are also candidates to next generation public-key cryptography. Through this workshop, we aimed at fostering developments for post-quantum cryptography.

Previous Workshop  held in March 2013.

Date

December 14 (Sat.) and  15 (Sun.)

Place

Fukuoka SRP Center Building 2F, Hall 1

Program

 Saturday December 14, 2013

13:00-14:00   Jintai Ding (University of Cincinnati)
 Keynote Lecture  “Degree of degenration of HFE and its variants”

14:15-15:00  Vanessa Vitse (Institut Fourier, Université Grenoble I)
“Summation polynomials and symmetries for the ECDLP over extension fields”
15:00-15:30  Kouichi Nagao (Kanto Gakuin University)
“Decomposition formula of the Jacobian group of plane curve”

15:50-16:20  Chen-Mou Cheng (National Taiwan University)
“Factoring RSA keys from certified smart cards using univariate and multivariate Coppersmith’s method”
16:20-16:50  Shigeo Tsujii (Chuo University)
“Concept of Organizational Cryptosystems Realized by MPKC and Elliptic Curve Cryptosystems”
16:50-17:20  Bo-Yin Yang (Academia Sinica)
“On Enumerative Solutions of Low-Degree Systems of Equations over GF(2)”

Banquet 18:00–

 Sunday December 15, 2013

10:00-10:30  Yuta Taguchi (Gifu University)
“Multivariate Public Key Cryptosystem Using the Square with Mixed l- Branch Structure”
10:30-11:00  Masahito Gotaishi (Chuo University)
“Computing Gröbner Base by Mutant Groebner Base Algorithm -How to avoid reduction to Zero-”
11:00-11:30  Satoshi Tanaka (Kyushu University)
“Solving Multivariate Quadratic Polynomial System by XL Algorithm on GPU”
11:30-12:15  Enrico Thomae (Ruhr-University Bochum)
“Algebraic Techniques to Solve the Isomorphism of Polynomials Problem, Impact and Limitations of Good Keys”

Lunch

14:00-14:30  Keita Kusagawa (NTT)
“Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions”
14:30-15:00  Tung Chou (TU Eindhoven)
“McBits: fast constant-time code-based cryptography”
15:00-15:30  Kirill Morozov (Kyushu University)
“Zero-Knowledge Protocols for Code-Based Public-Key Encryption”

Supported by

[Main sponsor]  Institute of Systems, Information Technologies and Nanotechnologies

[Joint sponsor]  Graduate School of Information Science and Electorical Engineering

Acknoledgement

This workshop is supported by the following grants-in-aid.

  • Strategic Information and Communications R&D Promotion Programme  (SCOPE), contract no. 0159-0172, Ministry of Internal Affairs and Communications, Japan.
  • Excellent Graduate Schools, MEXT, Japan.

Committees

Takanori Yasuda (ISIT)
Kouichi Sakurai(Kyushu Univ., ISIT)
Tsuyoshi Takagi (Kyushu Univ.)
Xavier Dahan (Kyushu Univ.)
Tetsushi Tanaka (Kyushu Univ.)

Contact

Takanori Yasuda(ISIT)

e-mail: yasuda@isit.or.jp