Playlist: 15 videos

Quantum Cryptanalysis of Post-Quantum Cryptography

Remote video URL
0:51:13 Quantum Research Workshops
Daniele Micciancio UC San Diego
https://simons.berkeley.edu/talks/relation-between-sis-and-lwe
Quantum Cryptanalysis of Post-Quantum Cryptography
Visit talk page
Remote video URL
0:37:12 Quantum Research Workshops
Elena Kirshanova, Immanuel Kant Baltic Federal University
https://simons.berkeley.edu/talks/overview-quantum-cryptanalysis-lattice-systems
Quantum Cryptanalysis of Post-Quantum Cryptography
Visit talk page
Remote video URL
0:50:18 Quantum Research Workshops
Tanja Lange, Technische Universiteit Eindhoven
https://simons.berkeley.edu/talks/overview-code-based-crypto-assumptions
Quantum Cryptanalysis of Post-Quantum Cryptography
Visit talk page
Remote video URL
0:52:0 Quantum Research Workshops
András Gilyén, CalTech
https://simons.berkeley.edu/talks/overview-quantum-algorithmic-tools
Quantum Cryptanalysis of Post-Quantum Cryptography
Visit talk page
Remote video URL
0:43:7 Quantum Research Workshops
Christian Majenz, University of Amsterdam
https://simons.berkeley.edu/talks/attacking-hash-function-based-cryptography
Quantum Cryptanalysis of Post-Quantum Cryptography
Visit talk page
Remote video URL
0:21:38 Quantum Research Workshops
Martin Roetteler, Microsoft
https://simons.berkeley.edu/talks/tbd-142
Quantum Cryptanalysis of Post-Quantum Cryptography
Visit talk page
Remote video URL
0:45:45 Quantum Research Workshops
Thomas Espitau (Rennes University)
https://simons.berkeley.edu/talks/current-state-lattice-basis-reduction
Quantum Cryptanalysis of Post-Quantum Cryptography
Visit talk page
Remote video URL
0:33:53 Quantum Research Workshops
Alexander May, Ruhr-Universität Bochum
https://simons.berkeley.edu/talks/overview-attacks-code-based-public-key-cryptography-and-recent-results-attacking-hashed
Quantum Cryptanalysis of Post-Quantum Cryptography
Visit talk page
Remote video URL
0:43:22 Quantum Research Workshops
David Jao, University of Waterloo
https://simons.berkeley.edu/talks/overview-elliptic-curve-isogenies-based-public-key-cryptography-assumptions
Quantum Cryptanalysis of Post-Quantum Cryptography
Visit talk page
Remote video URL
0:45:1 Quantum Research Workshops
Chloe Martindale, University of Bristol
https://simons.berkeley.edu/talks/overview-attacks-elliptic-curve-isogenies-based-systems-0
Quantum Cryptanalysis of Post-Quantum Cryptography
Visit talk page