next presentation: apr 18, 2013. ludovic perret (université pierre et marie curie) tba

1
Next presentation: Apr 18, 2013. Ludovic Perret (Université Pierre et Marie Curie) TBA “Symbolic Computations and Post-Quantum Cryptography” Online Seminar Johannes A. Buchmann (Technische Universitat Darmstadt) “The Future of Digital Signatures.” Apr 4, 12:00pm (New York Time). Abstract: Digital signatures are of great importance for the security of information technology and, in particular, the Internet. However, the digital signature schemes that are used in practice today are threatened by quantum computer attacks. Therefore, digital signature schemes are required that resist quantum computer attacks and can be used in practice. After explaining the relevance of digital signatures this talk discusses minimal security requirements for such schemes. The hash-based scheme XMSS is presented which has minimal security requirements. Experimental data show that XMSS is ready for being used in practice.

Upload: boyd

Post on 05-Jan-2016

45 views

Category:

Documents


3 download

DESCRIPTION

“ Symbolic Computations and Post-Quantum Cryptography ” Online Seminar. Johannes A. Buchmann (Technische Universitat Darmstadt) “ The Future of Digital Signatures. ” Apr 4, 12:00pm (New York Time). Abstract: - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Next presentation:   Apr 18, 2013.  Ludovic Perret  (Université Pierre et Marie Curie) TBA

Next presentation:  Apr 18, 2013. Ludovic Perret (Université Pierre et Marie Curie)TBA

“Symbolic Computations and Post-Quantum Cryptography”Online Seminar

Johannes A. Buchmann

(Technische Universitat Darmstadt)

“The Future of Digital Signatures.”

Apr 4, 12:00pm (New York Time).

Abstract:

Digital signatures are of great importance for the security of information technology and, in particular, the Internet. However, the digital signature schemes that are used in practice today are threatened by quantum computer attacks. Therefore, digital signature schemes are required that resist quantum computer attacks and can be used in practice. After explaining the relevance of digital signatures this talk discusses minimal security requirements for such schemes. The hash-based scheme XMSS is presented which has minimal security requirements. Experimental data show that XMSS is ready for being used in practice.