Conference Agenda

Overview and details of the sessions of this conference. Please select a date or location to show only sessions at that day or location. Please select a single session for detailed view (with abstracts and downloads if available).

 
Session Overview
Location: Unitobler, F-123
52 seats, 100m^2
Date: Tuesday, 09/Jul/2019
10:00am
-
12:00pm
MS132, part 1: Polynomial equations in coding theory and cryptography
Location: Unitobler, F-123
 
10:00am - 12:00pm

Polynomial equations in coding theory and cryptography

Chair(s): Alessio Caminata (University of Neuchâtel, Switzerland), Alberto Ravagnani (University College Dublin, Ireland)

 

(25 minutes for each presentation, including questions, followed by a 5-minute break; in case of x<4 talks, the first x slots are used unless indicated otherwise)

 

Free resolutions of test sets and their applications to coding theory

Edgar Martinez Moro
University of Valladolid

 

Algebraic geometry codes from del Pezzo surfaces

Alain Couvreur
INRIA

 

An Approach to Density Problems in Coding Theory

Eimear Byrne
University College Dublin

 

Multivariate Signatures

Jintai Ding
University of Cincinnati

3:00pm
-
5:00pm
MS132, part 2: Polynomial equations in coding theory and cryptography
Location: Unitobler, F-123
 
3:00pm - 5:00pm

Polynomial equations in coding theory and cryptography

Chair(s): Alessio Caminata (University of Neuchâtel, Switzerland), Alberto Ravagnani (University College Dublin, Ireland)

 

(25 minutes for each presentation, including questions, followed by a 5-minute break; in case of x<4 talks, the first x slots are used unless indicated otherwise)

 

Efficient Key Generation for Rainbow

Albrecht Petzoldt
University of Versailles

 

Algebraic techniques for cryptanalysis of rank-based cryptosystems

Simona Samardjiska
Radboud University

 

MinRank Problems in Post-Quantum Cryptography

Daniel Smith-Tone
NIST and University of Louisville

 

Rank Analysis of Cubic Multivariate Cryptosystems

Karan Khathuria
University of Zurich


Date: Wednesday, 10/Jul/2019
10:00am
-
12:00pm
MS145, part 1: Isogenies in Cryptography
Location: Unitobler, F-123
 
10:00am - 12:00pm

Isogenies in Cryptography

Chair(s): Tanja Lange (Eindhoven University of Technology, Netherlands, The), Chloe Martindale (Eindhoven University of Technology, Netherlands, The), Lorenz Panny (Eindhoven University of Technology, Netherlands, The)

 

(25 minutes for each presentation, including questions, followed by a 5-minute break; in case of x<4 talks, the first x slots are used unless indicated otherwise)

 

Overview of isogenies in cryptography (Part I)

Chloe Martindale1, Lorenz Panny2
1Eindhoven University of Techonology, 2Eindhoven University of Technology

 

Overview of isogenies in cryptography (Part II)

Lorenz Panny, Chloe Martindale
Eindhoven University of Technology

 

Quantum attacks against isogenies

Daniel J. Bernstein
University of Illinois at Chicago

 

Pre- and post-quantum Diffie-Hellman

Benjamin Smith
INRIA & LIX - Ecole Polytechnique

3:00pm
-
5:00pm
MS132, part 3: Polynomial equations in coding theory and cryptography
Location: Unitobler, F-123
 
3:00pm - 5:00pm

Polynomial equations in coding theory and cryptography

Chair(s): Alessio Caminata (University of Neuchâtel, Switzerland), Alberto Ravagnani (University College Dublin, Ireland)

 

(25 minutes for each presentation, including questions, followed by a 5-minute break; in case of x<4 talks, the first x slots are used unless indicated otherwise)

 

Classical and Quantum Evaluation Codes at the Trace Roots

Diego Ruano
University of Valladolid

 

Optimal curves and codes with locality

Gretchen Matthews
Virginia Tech

 

The Story of Solving Random Quadratic Multivariate Systems of Equations

Bo Yin Yang
Academia Sinica

 

The Zeta Function for Generalized Rank Weights

Eimear Byrne, Giuseppe Cotardo, Alberto Ravagnani
University College Dublin


Date: Thursday, 11/Jul/2019
10:00am
-
12:00pm
MS145, part 2: Isogenies in Cryptography
Location: Unitobler, F-123
 
10:00am - 12:00pm

Isogenies in Cryptography

Chair(s): Tanja Lange (Eindhoven University of Technology, Netherlands, The), Chloe Martindale (Eindhoven University of Technology, Netherlands, The), Lorenz Panny (Eindhoven University of Technology, Netherlands, The)

 

(25 minutes for each presentation, including questions, followed by a 5-minute break; in case of x<4 talks, the first x slots are used unless indicated otherwise)

 

Constant-time isogeny implementations

David Jao
University of Waterloo

 

Isogeny-based cryptography: a cryptanalysis perspective

Christophe Petit
Birmingham University

 

Fast isogeny-based signatures

Frederik Vercauteren
KU Leuven

 

Orienting supersingular isogeny graphs

David Kohel
University of Marseilles

3:00pm
-
5:00pm
MS132, part 4: Polynomial equations in coding theory and cryptography
Location: Unitobler, F-123
 
3:00pm - 5:00pm

Polynomial equations in coding theory and cryptography

Chair(s): Alessio Caminata (University of Neuchâtel, Switzerland), Alberto Ravagnani (University College Dublin, Ireland)

 

(25 minutes for each presentation, including questions, followed by a 5-minute break; in case of x<4 talks, the first x slots are used unless indicated otherwise)

 

Linearized Polynomials in Finite Geometry and Rank-Metric Coding

John Sheekey
University College Dublin

 

Quantum Algorithms for Optimization over Finite Fields and Applications in Cryptanalysis

Xiao-Shan Gao
Academy of Mathematics and Systems Science, Chinese Academy of Sciences

 

On the Complexity of ``Superdetermined'' Minrank Instances

Daniel Cabarcas
Universidad Nacional de Colombia

 

MinRank Problems Arising from Rank-based Cryptography

Ray Perlner
NIST


Date: Friday, 12/Jul/2019
10:00am
-
12:00pm
MS145, part 3: Isogenies in Cryptography
Location: Unitobler, F-123
 
10:00am - 12:00pm

Isogenies in Cryptography

Chair(s): Tanja Lange (Eindhoven University of Technology, Netherlands, The), Chloe Martindale (Eindhoven University of Technology, Netherlands, The), Lorenz Panny (Eindhoven University of Technology, Netherlands, The)

 

(25 minutes for each presentation, including questions, followed by a 5-minute break; in case of x<4 talks, the first x slots are used unless indicated otherwise)

 

Superspecial genus 2 curves in cryptography

Thomas Decru
KU Leuven

 

Quantum algorithms for finding isogenies between supersingular elliptic curves.

Jean-François Biasse
University of South Florida

 

Horizontal isogeny graphs

Benjamin Wesolowski
CWI

 

Isogeny Graphs of Ordinary Abelian Surfaces and Endomorphism Rings

Dimitar Jetchev
EPFL

3:00pm
-
5:00pm
MS162, part 1: Applications of finite fields theory
Location: Unitobler, F-123
 
3:00pm - 5:00pm

Applications of finite fields theory

Chair(s): Antoine Joux (University of Sorbonne), Giacomo Micheli (EPFL), Violetta Weger (University of Zurich, Switzerland)

 

(25 minutes for each presentation, including questions, followed by a 5-minute break; in case of x<4 talks, the first x slots are used unless indicated otherwise)

 

Introductory Talk

Giacomo Micheli
EPFL

 

Using Mersenne and Fermat numbers in Cryptosystems

Antoine Joux
University of Sorbonne

 

Cryptographic attacks against filter generator using monomial mapping

Yann Rotella
Inria

 

Permutation and complete rational functions via Chebotarev theorem for function fields

Andrea Ferraguti
Max Planck Institute for Mathmatics


Date: Saturday, 13/Jul/2019
10:00am
-
12:00pm
MS145, part 4: Isogenies in Cryptography
Location: Unitobler, F-123
 
10:00am - 12:00pm

Isogenies in Cryptography

Chair(s): Tanja Lange (Eindhoven University of Technology, Netherlands, The), Chloe Martindale (Eindhoven University of Technology, Netherlands, The), Lorenz Panny (Eindhoven University of Technology, Netherlands, The)

 

(25 minutes for each presentation, including questions, followed by a 5-minute break; in case of x<4 talks, the first x slots are used unless indicated otherwise)

 

Post-quantum signature schemes and more from supersingular isogenies

Ward Beullens
KU Leuven

 

Algorithmic aspects of cryptographic invariant maps from isogenies

Florian Hess
University of Oldenburg

 

Verifiable Delay Functions from Isogenies and Pairings

Luca De Feo
Ecole Polytechnique

 

Cryptographic goals beyond key exchange and signatures

Jeff Burdges
GNUnet

3:00pm
-
5:00pm
MS162, part 2: Applications of finite fields theory
Location: Unitobler, F-123
 
3:00pm - 5:00pm

Applications of finite fields theory

Chair(s): Antoine Joux (University of Sorbonne), Giacomo Micheli (EPFL), Violetta Weger (University of Zurich, Switzerland)

 

(25 minutes for each presentation, including questions, followed by a 5-minute break; in case of x<4 talks, the first x slots are used unless indicated otherwise)

 

Public key encryption and key exchange from LDPC codes: LEDAcrypt

Paolo Santini
Marche Polytechnic University

 

Cryptological properties of mappings of finite fields

Gohar Kyureghyan
University of Rostock

 

Pseudorandom walks on elliptic curves

Laszlo Merai
RICAM

 

Fractional Jumps and pseudorandom number generation

Federico Amadio Guidi
University of Oxford