BEGIN:VCALENDAR
BEGIN:VEVENT
UID:103@asiaccs2017.com
DTSTART;TZID=Asia/Dubai:20170403T153500
DTEND;TZID=Asia/Dubai:20170403T170500
SUMMARY:Tutorial: Post-quantum cryptography, an overview
LOCATION:A6-007
DESCRIPTION:Johannes Buchmann, TU Darmstadt, Germany\n\nPublic-key cryptography (PKC) is an essential building block for cybersecurity. For example, the TLS protocol that protects Internet communication is based on PKC. The security of PKC algorithms that are used today is based on the hardness of the integer factorization and certain discrete logarithm problem. However, in his seminal 1994 paper Peter Shor showed how to solve these problems in polynomial time on a quantum computer. As a result, it is necessary to come up with new PKC algorithms resist quantum computer attacks. They are referred to as post-quantum cryptography algorithms. This talk discusses the necessity of PKC. It describes current PKC algorithms. It gives an overview overstatus of the current post-quantum approaches: hash-, lattice-, code-based and multivariate and discusses their practicability and their security.\n\nWarning: Schedule may change, please check the current schedule on the website
END:VEVENT
END:VCALENDAR