Codes and Isogenies

Two further methods for obtaining post-quantum security are discussed, namely code-based and isogeny-based cryptography.

Topic 1: Revocable Identity-based Encryption from Codes with Rank Metric (will be presented by Dr. Reza Azarderakhsh) Authors: Donghoon Chang; Amit Kumar Chauhan; Sandeep Kumar; Somitra Kumar Sanadhya

Topic 2: An Exposure Model for Supersingular Isogeny Diffie-Hellman Key Exchange Authors: Brian Koziel; Reza Azarderakhsh; David Jao

Speakers: Dr. Reza Azarderakhsh, David Jao

Reza Azarderakhsh an Assistant Professor in the Department of Computer Engineering and Science at Florida Atlantic University and Founder of PQSecure Technologies. His research has been supported by NSF, NIST and ARO.

Detailed Presentation:

(Source: RSA Conference USA 2018)
 
 
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)