}?>
By Joining you agree to MachPrinciple's Terms and Conditions and Privacy Policy
Click to Login
Please check your email. A registration confirmation link will be sent to your mailbox..
A registration confirmation link has been sent to your email. Please check your email and finish the registration process.
Search a Conference through our dedicated search page
Despite the enormous commercial potential that quantum computing presents, the existence of large-scale quantum computers also has the potential to destroy current security infrastructures. Post-quantum cryptography aims to develop new security protocols that will remain secure even after powerful quantum computers are built. This workshop focuses on isogeny-based cryptography, one of the most promising areas in post-quantum cryptography. In particular, we will examine the security, feasibility and development of new protocols in isogeny-based cryptography, as well as the intricate and beautiful pure mathematics of the related isogeny graphs and elliptic curve endomorphism rings. To address the goals of both training and research, the program will be comprised of keynote speakers and working group sessions.