PostQuantum 2015 - Workshop on Cybersecurity in a Post-Quantum World
Topics/Call fo Papers
NIST solicits papers, presentations, case studies, panel proposals, and participation from any interested parties, including researchers, systems architects, vendors, and users. NIST will post the accepted papers and presentations on the workshop web site and include these in a workshop handout. However, no formal workshop proceedings will be published. NIST encourages presentations and reports on preliminary work that
participants plan to publish elsewhere. Topics for submissions should include, but are not limited to, the following:
Security Status of Approved Public Key Cryptographic Algorithms
? How does the development of quantum computers affect the security of currently deployed public key algorithms? (E.g., encryption (for key transport), digital signatures, and key agreement)
? How would quantum computers affect other services which rely on public key infrastructure? (E.g. TLS, IPSec, etc.)
? Are there other concerns with the existing public key algorithms that would motivate the development of alternative ryptosystems?
? Are there other advanced computing technologies that could threaten the existing cryptosystems? Short Term Actions
? How urgent is the need for post-quantum cryptography?
? What changes to applications and protocols could mitigate potential interoperability problems?
? What guidance should NIST provide with respect to post-quantum cryptography? Conditions for an Early Transition
? What conditions would warrant a transition away from one of the approved public key algorithms?
? What changes to applications and protocols could facilitate such a transition? (E.g., ways of combining existing public key algorithms with newer post-quantum cryptosystems) Requirements for Post-Quantum Cryptographic Algorithms
? What are desirable properties of post-quantum cryptosystems with regard to security, performance, ease of implementation, and interoperability?
? What are desirable properties of post-quantum cryptosystems with regard to particular applications, such as encryption, digital signatures, key exchange, and message authentication? Potential Replacement Options
? What are the strengths and weaknesses of the different post-quantum cryptosystems that have been proposed? (E.g., schemes based on lattices, codes, multivariate systems of equations, hash trees, elliptic curve isogenies, Kerberos, etc.)
participants plan to publish elsewhere. Topics for submissions should include, but are not limited to, the following:
Security Status of Approved Public Key Cryptographic Algorithms
? How does the development of quantum computers affect the security of currently deployed public key algorithms? (E.g., encryption (for key transport), digital signatures, and key agreement)
? How would quantum computers affect other services which rely on public key infrastructure? (E.g. TLS, IPSec, etc.)
? Are there other concerns with the existing public key algorithms that would motivate the development of alternative ryptosystems?
? Are there other advanced computing technologies that could threaten the existing cryptosystems? Short Term Actions
? How urgent is the need for post-quantum cryptography?
? What changes to applications and protocols could mitigate potential interoperability problems?
? What guidance should NIST provide with respect to post-quantum cryptography? Conditions for an Early Transition
? What conditions would warrant a transition away from one of the approved public key algorithms?
? What changes to applications and protocols could facilitate such a transition? (E.g., ways of combining existing public key algorithms with newer post-quantum cryptosystems) Requirements for Post-Quantum Cryptographic Algorithms
? What are desirable properties of post-quantum cryptosystems with regard to security, performance, ease of implementation, and interoperability?
? What are desirable properties of post-quantum cryptosystems with regard to particular applications, such as encryption, digital signatures, key exchange, and message authentication? Potential Replacement Options
? What are the strengths and weaknesses of the different post-quantum cryptosystems that have been proposed? (E.g., schemes based on lattices, codes, multivariate systems of equations, hash trees, elliptic curve isogenies, Kerberos, etc.)
Other CFPs
- International Conference on Practice and Theory of Public-Key Cryptography (PKC)
- Twelfth Theory of Cryptography Conference (TCC 2015)
- 22nd International Workshop on Fast Software Encryption (FSE 2015)
- Information Theory Workshop (ITW)
- 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks
Last modified: 2014-08-12 23:16:04