Post-Quantum cryptography is discussed in relation to symmetric key and hash-based schemes.

Topic 1: Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations Authors: Akinori Hosoyamada; Yu Sasaki

Topic 2: Improving Stateless Hash-Based Signatures Authors: Jean-Philippe Aumasson; Guillaume Endignoux

Speakers: Guillaume Endignoux, Akinori Hosoyamada

Guillaume Endignoux recently joined Google after completing his master’s degree at EPFL, where he worked on a wide range of security and privacy topics. During his master’s thesis, he worked on post-quantum cryptography at Kudelski Security, with a focus on improving hash-based signatures. Endignoux also contributed to open-source projects in various programming languages, including a PDF parser in OCaml and cryptographic code in Rust.

In April 2016, Akinori Hosoyamada joined NTT Secure Platform Laboratories, Japan. Hosoyamada received an M.Sc. (in mathematics) from Kyoto University, Japan, in March 2016, and a B.Sc. (in mathematics) from Kyoto University, Japan, in March 2014.

Detailed Presentation:

(Source: RSA Conference USA 2018)
 
 
Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership