Scientific Organisers
-
Erin Hales, Royal Holloway University of London
-
Rachel Player, Royal Holloway University of London
-
Joe Rowell, Royal Holloway University of London
About:
Lattice-based cryptography is a highly relevant application area of mathematics, and a thriving area of cryptographic research in the UK. Its worldwide importance as a branch of post-quantum cryptography is evidenced by the number of lattice-based proposals currently being considered for standardisation by the US National Institute of Standards and Technology (NIST).
This workshop brought together lattice researchers in the UK and Europe and facilitated community building, especially among PhD students and ECRs. The content that was presented is published online as a lasting resource. The ultimate objective of the workshop was to have a significant long-term effect on research in lattice-based cryptography by encouraging connections and creating resources for researchers.
Speakers:
MONDAY 25 JULY 2022 | ||
Damien Stehlé, ENS Lyon | Lattice-based Cryptography (Pt 1) | |
Damien Stehlé, ENS Lyon | Lattice-based Cryptography (Pt 2) | |
Lightning Talks | Session 1 | |
Alice Pellet-Mary, Bordeaux University | Algebraic lattices for Cryptography | |
TUESDAY 26 JULY 2022 | ||
Martin Albrecht, Royal Holloway, University of London | Solving the Learning with Errors Problem | |
Ilaria Chillotti, ZAMA | FHE and the TFHE Scheme (Pt 1) | |
Martin Albrecht, Royal Holloway, University of London | Cryptanalysis (Lab Session - Not Recorded) | |
Ilaria Chillotti, ZAMA | FHE and the TFHE scheme (Pt 2) | |
WEDNESDAY 27 JULY 2022 | ||
Anamaria Costache, Norwegian University of Science and Technology | Challenges and open problems in Fully Homomorphic Encryption | |
Lightning Talks | Session 2 | |
Alice Pellet-Mary, Bordeaux University | Some attacks on Algebraic Lattice Problems | |
THURSDAY 28 JULY 2022 | ||
Chloe Martindale, University of Bristol | Isogeny-based cryptography: why, how, and what next? | |
Luca De Feo, IBM Research Europe | Unexpected discoveries and challenges in isogeny based cryptography |