PQCrypto 2024

 

The 15th International Conference on Post-Quantum Cryptography

PQCrypto 2024 

June 12-14, 2024

Mathematical Institute, University of Oxford (UK)

Introduction

The aim of PQCrypto is to serve as a forum for researchers to present results and exchange ideas on the topic of cryptography in an era with large-scale quantum computers. 

After fourteen successful PQCrypto conferences (2006 in Leuven, 2008 in Cincinnati, 2010 in Darmstadt, 2011 in Taipei, 2013 in Limoges, 2014 in Waterloo, 2016 in Fukuoka, 2017 in Utrecht, 2018 in Fort Lauderdale, 2019 in Chongqing, 2020 in Paris (online), 2021 in Daejeon (hybrid), 2022 (online), in Maryland 2023), we are looking forward to PQCrypto 2024.

The conference will take place at the University of Oxford, Mathematical Institute. The dates are June 12–14, 2024.

We are on twitter as @PQCryptoConf for updates. 


Affiliated Event - newtpqc

PQCrypto 2024 will be preceded by a 2-day workshop, The New Trends in Post-Quantum Cryptography workshop, or newtpqc. It will take place at the Mathematical Institute, University of Oxford (UK) on Monday 10 June and Tuesday 11 June 2024.

The goal of the workshop is to discuss the most recent and exciting trends of post-quantum cryptography. Ten world-class researchers will give keynote talks on cutting-edge topics that will play an important part in post-quantum cryptography in the years to come.

Further information can be found in the newtpqc website.  


Important dates

  • Initial submission deadline: January 19, 2024
  • Final submission deadline: January 26, 2024
  • Notification of acceptance: March 15, 2024
  • Final version due: March 29, 2024
  • Early registration deadline: May 12, 2024
  • Affiliated event: Monday-Tuesday, June 10-11, 2024
  • Conference: Wednesday-Friday, June 12-14, 2024. 


Conference Program

Wednesday 12 June 2024

09:15Transforms and Proofs (Chair: Delaram Kahrobaei)
 Kathrin Hövelmanns and Christian Majenz 
Explicitly rejecting Fujisaki-Okamoto transforms and worst-case correctness - completing the picture 
[Video] [Slides]
 Kamil Doruk Gür, Jonathan Katz and Tjerand Silde 
Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption 
[Video] [Slides]
 Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck and Maximiliane Weishäupl 
Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures 
[Video] [Slides]
 Yao Cheng, Xianhui Lu, Ziyi Li and Bao Li 
Revisiting Anonymity in Post-Quantum Public Key Encryption 
[Video] [Slides]
11:00Invited Talk 1 (Chair: Daniel Smith-Tone)
 Nadia Heninger 
On Incentives and Cryptanalysis 
[Video] [Slides]
14:00Multivariate Cryptography 1 (Chair: Ludovic Perret)
 Pierre Pébereau 
One vector to rule them all: Key recovery from one vector in UOV schemes 
[Video] [Slides]
 Peigen Li and Jintai Ding 
Cryptanalysis of the SNOVA signature scheme 
[Video] [Slides]
 Hiroki Furue and Momonari Kudo 
Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings 
[Video] [Slides]
15:30Lattices 1 (Chair: Thomas Prest)
 Henry Bambury and Phong Nguyen 
Improved Provable Reduction of NTRU and Hypercubic Lattices 
[Video] [Slides]
 Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen and Jinwei Zheng 
Compact Encryption based on Module-NTRU problems 
[Video] [Slides]
 Leizhang Wang 
Analyzing Pump and jump BKZ algorithm using dynamical systems 
[Video] [Slides]

Thursday 13 June 2024

09:15Group Actions (Chair: Delaram Kahrobaei)
 Jonas Meers and Doreen Riepel 
CCA Secure Updatable Encryption from Non-Mappable Group Actions 
[Video] [Slides]
 Benjamin Benčina, Alessandro Budroni, Jesús-Javier Chi-Domínguez and Mukul Kulkarni 
Properties of Lattice Isomorphism as a Cryptographic Group Action 
[Slides]
 Markus Bläser, Zhili Chen, Dung Duong, Antoine Joux, Tuong Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo and Gang Tang 
On digital signatures based on group actions: QROM security and ring signatures 
[Video] [Slides]
 Antonin Leroux and Maxime Roméas 
Updatable Encryption from Group Actions 
[Video] [Slides]
11:00Invited talk 1 (Chair: Markku-Juhani O. Saarinen) 
 Sabrina Kunzweiler 
Recent developments in isogeny-based cryptography 
[Video] [Slides]
14:00Lattices 2 (Chair: Rainer Steinwandt)
 Corentin Jeudy, Adeline Roux-Langlois and Olivier Sanders 
Phoenix: Hash-and-Sign with Aborts from Lattice Gadgets 
[Video] [Slides]
 Toi Tomita and Junji Shikata 
Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWE 
[Video] [Slides]
 Zhen Liu, Vishakha, Jintai Ding, Chi Cheng and Yanbin Pan 
An Improved Practical Key Mismatch Attack Against NTRU 
[Video] [Slides]
15:30Multivariate Cryptography 2 (Chair: Tung Chou)
 Thomas Aulbach, Simona Samardjiska and Monika Trimoska 
Practical key-recovery attack on MQ-Sign and more 
[Video] [Slides]
 Hao Guo, Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong and Jintai Ding 
Practical and Theoretical Cryptanalysis of VOX 
[Video] [Slides]
 Pierre Varjabedian, Benoit-Michel Cogliati, Gilles Macario-Rat and Jacques Patarin 
State of the art of HFE variants Is it possible to repair HFE with appropriate perturbations? 
[Video] [Slides]

 

Friday 14 June 2024

09:15Attacks (Chair: Liqun Chen)
 Martin Ekerå and Joel Gärtner 
Extending Regev’s factoring algorithm to compute discrete logarithms 
[Video] [Slides]
 Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret and Siamak F. Shahandashti 
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem 
[Video] [Slides]
 Tomoki Moriya, Hiroshi Onuki, Maozhi Xu and Guoqing Zhou 
Adaptive attacks against FESTA without input validation or constant-time implementation 
[Video] [Slides]
 Jeonghwan Lee, Donghoe Heo, Hyeonhak Kim, Gyusang Kim, Suhri Kim, Heeseok Kim and Seokhie Hong 
Fault attack on SQISign 
[Video] [Slides]
11:00Invited talk 3 (Chair: Federico Pintore)
 N.N. (NCSC Technical Director for Cryptography) 
Post-Quantum Cryptography in UK Government 
[Slides]
14:00Applications and Protocols (Chair: Tjerand Silde)
 Loïc Ferreira and Johan Pascal 
Post-Quantum Secure ZRTP 
[Video] [Slides]
 Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton and Yalan Wang 
A New Hash-based Enhanced Privacy ID Signature Scheme 
[Video] [Slides]
14:40Code-Based Cryptography (Chair: Tjerand Silde)
 Nicolas Aragon, Pierre Briaud, Victor Dyseryn, Philippe Gaborit and Adrien Vinçotte 
Blockwise Rank Syndrome Learning problem and its applications to cryptography 
[Video] [Slides]
 Tung Chou, Ruben Niederhagen, Lars Ran and Simona Samardjiska 
Reducing Signature Size of Matrix-code-based Signature Schemes 
[Video] [Slides]

Invited Speakers

  • Nadia Heninger (University of California, San Diego, US)
  • Sabrina Kunzweiler (Inria Bordeaux, France)
  • A Speaker from NCSC, UK
     

Conference Registration

Registration is required for both in-person and virtual participation. Virtual participation will allow viewing of the talks, but not discussion with the speaker or the audience.

Early registration ends on May 12, 2024.

If you require a letter of invitation from the conference organizers, please register for the conference, pay the registration fee, and then email the general chairs to request a letter.

To register to the conference PQCrypto 2024 or to the conference PQCrypto 2024 and the affiliated event newtpqc click here.

For virtual participation, register here.

To register to the affiliated event newtpqc only, visit its website or click here

 

Hotel Rooms 
 

We have been offered discounted rates at two nearby hotels. If you would like to access these discounted rates, please contact the representatives as per below.

Leonardo Royal Hotel Oxford  - please contact Sales Executive, Lee Wood (lee_wood@leonardohotels.com), with event reference - PQCrypto24

Rasa Sayang House - please contact Reservations Manager, Daniel Kiss (@email), with event reference - PQCrypto24

 

Further (non-discounted) options include - but are not limited to - the following hotels at all budget levels: Easy Hotel OxfordPremier Inn, Botley OxfordMalmaison Hotel OxfordOld Parsonage Hotel.

We encourage attendees to check popular websites such as booking.com and hotels.com for accommodation. There is a choice of Airbnb in Oxford (some suggestions can be found here), while the following is a link to the university rooms website: http://www.universityrooms.com/en/city/oxford/home.
Summertown, Jericho, Cowley road, Iffley road, Abingdon road are areas of Oxford within a walking distance from the Mathematical Institute and enjoy many restaurants and groceries. Headington could also be an option, but a bus or a bike is needed to get to the Mathematical Institute in less than an hour.
 

Venue 

PQCrypto 2024 and newtpqc will take place at the Mathematical Institute of the University of Oxford (UK), whose address is:

Mathematical Institute
Radcliffe Observatory,
Andrew Wiles Building,
Woodstock Rd,
Oxford OX2 6GG

 

Travel

 
Air - Travellers from abroad may arrive by plane at:

Rail - See Rail Timetable Information for details of trains to Oxford and to purchase train tickets.

 

Coach - Tickets can usually be purchased on the linked travel company websites.

Local Bus Timetables

Local Taxi Firms

Student Financial Aid

We can give a discount off the student registration fee, for a limited number of students. We also have a small amount of travel funding, for students who have papers that were accepted to the conference.

If you are interested in this, please ask a professor who knows you to send an email to the general chairs, with the subject line "PQCrypto 2024 student discount," explaining why you need financial assistance, and why attending the conference in-person would be beneficial for you and/or other attendees at the conference. 
 

Call for Papers

Call for papers in pdf format.

Original research papers on all technical aspects of cryptographic research related to post-quantum cryptography are solicited. Topics of interest include (but are not restricted to):

  1. Cryptanalysis of post-quantum systems, and quantum cryptanalysis.
  2. Cryptosystems that have the potential to be safe against quantum computers such as: code-based, hash-based, isogeny-based, lattice-based, and multivariate constructions.
  3. Implementations of, and side-channel attacks on post-quantum cryptosystems.
  4. Security models for the post-quantum era.

Instructions to authors

Accepted papers will be published in Springer's LNCS series. Submissions must be anonymous. Submissions must not exceed 30 pages, including appendices and excluding references, and must be in a single-column format in 10pt fonts using the default llncs class without adjustments. The submission should begin with a title, a short abstract, and a list of key words. Its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Reviewers are not required to read appendices; submissions are expected to be intelligible and complete without them. Submissions must not substantially duplicate work that any of the authors has published in a journal or a conference/workshop with proceedings, or has submitted/is planning to submit before the author notification deadline to a journal or other conferences/workshops that have proceedings. Submissions ignoring these guidelines may be rejected without further consideration.

If the submission is accepted, the length of the final version is at most 35 pages including both references and appendices, in the llncs class format.

Paper Submission Page

Easychair Link

Conference Springer Proceedings
https://link.springer.com/book/10.1007/978-3-031-62743-9 and https://link.springer.com/book/10.1007/978-3-031-62746-0

General chairs

Program chairs

  • Markku-Juhani O. Saarinen (Tampere University and PQShield)
  • Daniel Smith-Tone (University of Louisville and NIST)

Program Committee

  • Magali Bardet (University of Rouen Normandie)
  • Daniel J. Bernstein (UIC, RUB, and Academica Sinica)
  • Ward Beullens (IBM)
  • Olivier Blazy (École Polytechnique)
  • Katharina Boudgoust (Aarhus University)
  • Daniel Cabarcas (UNAL-Sede Medellín)
  • Ryann Cartor (Clemson University)
  • Sanjit Chatterjee (Indian Institute of Science)
  • Anupam Chattopadhyay (Nanyang Technological University)
  • Chen-Mou Cheng (BTQ Technologies Corp)
  • Jung Hee Cheon (Seoul National University)
  • Thomas Decru (Université Libre de Bruxelles)
  • Martin Ekerå (KTH and Swedish NCSA)
  • Thibauld Feneuil (CryptoExperts)
  • Scott Fluhrer (Cisco Systems)
  • Philippe Gaborit (University of Limoges)
  • Tommaso Gagliardoni (Kudelski Security)
  • Qian Guo (Lund University)
  • Michael Hamburg (Rambus) 
  • David Jao (University of Waterloo)
  • Thomas Johansson (Lund University)
  • Shuichi Katsumata (PQShield and AIST)
  • John Kelsey (NIST and KU Leuven)
  • Jon-Lark Kim (Sogang University, Korea)
  • Elena Kirshanova (TII)
  • Dustin Moody (NIST)
  • Ray Perlner (NIST)
  • Edoardo Persichetti (FAU and Sapienza University)
  • Thomas Poppelmann (Infineon)
  • Thomas Prest (PQShield)
  • Angela Robinson (NIST)
  • Mélissa Rossi (ANSSI)
  • Palash Sarkar (Indian Statistical Institute)
  • Nicolas Sendrier (INRIA)
  • Benjamin Smith (INRIA)
  • Damien Stehlé (ENS Lyon)
  • Rainer Steinwandt (UAH)
  • Tsuyoshi Takagi (The University of Tokyo)
  • Atsushi Takayasu (The University of Tokyo)
  • Jean-Pierre Tillich (INRIA)
  • Yu Yu (Shanghai Jiao Tong University)
  • Yang Yu (Tsinghua University)
  • Aaram Yun (Ewha Womans University)
  • Rina Zeitoun (IDEMIA)

 

 

 

Last updated on 14 Oct 2024, 8:36am. Please contact us with feedback and comments about this page.