Joint Mathematics Meetings AMS Special Session
Current as of Saturday, January 13, 2024 03:30:05
- Program
- ·
- Deadlines
- ·
- Timetable
- ·
- Inquiries: meet@ams.org
2024 Joint Mathematics Meetings (JMM 2024)
- Moscone North/South, Moscone Center, San Francisco, CA
- January 3-6, 2024 (Wednesday - Saturday)
- Meeting #1192
Associate Secretary for the AMS Scientific Program:
Michelle Ann Manes, American Institute of Mathematics mmanes@secretariat.ams.org
AMS Special Session on Cryptography and Related Fields
-
Friday January 5, 2024, 8:00 a.m.-12:00 p.m.
AMS Special Session on Cryptography and Related Fields, I
Cryptographic research spans many mathematical areas, especially coding theory and number theory. These areas boast theoretical and practical applications that are especially significant considering the ongoing effort to build a quantum-safe cyberspace. Indeed, coding theory and number theory have been sources for many of the hard problems (ideal lattice reduction, elliptic curve isogeny, random matrix decoding, etc.) used in recently proposed post-quantum cryptosystems.
Room 310, The Moscone Center
Organizers:
Ryann Cartor, Clemson University rcartor@clemson.edu
Angela Robinson, NIST
Daniel Everett Martin, Clemson University
-
8:00 a.m.
What can theta functions tell us about abelian threefolds?
Christelle Vincent*, University of Vermont
(1192-11-31347) -
8:30 a.m.
Densely-divisible numbers and the quadratic sieve
Garo Sarajian*, United States Military Academy
(1192-11-31645) -
9:00 a.m.
Finding orientations of supersingular elliptic curves and quaternion orders
Sarah Arpin*, University of Colorado Boulder
James Clements, University of Bristol
Pierrick Dartois, Centre Inria de l'Universite de Bordeau
Jonathan Eriksen, Norwegian University of Science and Technology
Peter Kutas, Eotvos Lorand University
Benjamin Wesolowski, ENS de Lyon, CNRS, UMPA
(1192-11-32059) -
9:30 a.m.
Path-finding algorithms using one endomorphism
Sarah Arpin, University of Colorado Boulder
Mingjie Chen, School of Computer Science, University of Birmingham, University Road West
Kristin Lauter, Facebook
Renate Scheidler, University of Calgary
Katherine E. Stange, University of Colorado, Boulder
Ha Tran*, Concordia University of Edmonton
(1192-11-30003) -
10:00 a.m.
Number of 4-Cycles of the Genus 2 Superspecial Isogeny Graph
Vladimir Pyotr Sworski*, Colorado State University
(1192-11-28549) -
10:30 a.m.
Quantitative upper bounds related to an isogeny criterion for elliptic curves
A.C. Cojocaru, University of Illinois Chicago
Auden Hinz*, University of Illinois Chicago
Tian Wang, Max Planck Institute for Mathematics
(1192-11-31732) -
11:00 a.m.
CSI-Otter: Isogeny-Based Blind Signatures from the Class Group Action with a Twist
Shuichi Katsumata, PQShield, Ltd
Yi-Fu Lai, University of Auckland
Jason LeGrow*, Virginia Tech
Ling Qin, University of Auckland
(1192-94-31483) -
11:30 a.m.
CROSS - Codes and Restricted Objects Signature Scheme
Marco Baldi, Polytechnic university of Marche
Alessandro Barenghi, Polytechnic University of Milan
Sebastian Bitzer, Technical University of Munich
Patrick Karl, Technical University of Munich
Felice Manganiello*, Clemson University
Alessio Pavoni, Technical University of Munich
Gerardo Pelosi, Polytechnic University of Milan
Paolo Santini, Polytechnic University of Marche
Jonas Schupp, Technical University of Munich
Freeman Slaughter, Clemson University
Antonia Wachter-Zeh, Technical University of Munich
Violetta Weger, Technical University of Munich
(1192-11-29048)
-
8:00 a.m.
-
Saturday January 6, 2024, 8:00 a.m.-12:00 p.m.
AMS Special Session on Cryptography and Related Fields, II
Cryptographic research spans many mathematical areas, especially coding theory and number theory. These areas boast theoretical and practical applications that are especially significant considering the ongoing effort to build a quantum-safe cyberspace. Indeed, coding theory and number theory have been sources for many of the hard problems (ideal lattice reduction, elliptic curve isogeny, random matrix decoding, etc.) used in recently proposed post-quantum cryptosystems.
Room 310, The Moscone Center
Organizers:
Ryann Cartor, Clemson University rcartor@clemson.edu
Angela Robinson, NIST
Daniel Everett Martin, Clemson University
-
8:00 a.m.
Concrete Security of Lattice-Based Cryptography
Shi Bai*, Florida Atlantic University
(1192-11-30525) -
9:00 a.m.
Reductions from module lattices to free module lattices, and application to dequantizing module-LLL
Gabrielle De Micheli*, UCSD
(1192-06-32375) -
9:30 a.m.
An algorithm for solving the principal ideal problem with subfields
Jean-François Biasse, University of South Florida
Claus Fieker, University of Kaiserslautern
Tommy Hofmann, University of Siegen
William Youmans*, Florida Atlantic University
(1192-11-31126) -
10:00 a.m.
Demystifying post-quantum ZK-SNARKs
Veronika Kuchta*, Florida Atlantic University
(1192-94-33072) -
10:30 a.m.
CANCELLED Sigma and proof of knowledge protocols: state, limitations and future
Sofia Celi*, Brave
(1192-94-30499) -
11:00 a.m.
Proof-Carrying Data From Arithmetized Random Oracles
Megan Chen*, Boston University
(1192-68-32127) -
11:30 a.m.
Monitoring Cryptographic Usage: Some Insights and Challenges
Ha T. Lam*, Oracle Cloud Infrastructure
(1192-10-32832)
-
8:00 a.m.
-
Saturday January 6, 2024, 1:00 p.m.-5:00 p.m.
AMS Special Session on Cryptography and Related Fields, III
Cryptographic research spans many mathematical areas, especially coding theory and number theory. These areas boast theoretical and practical applications that are especially significant considering the ongoing effort to build a quantum-safe cyberspace. Indeed, coding theory and number theory have been sources for many of the hard problems (ideal lattice reduction, elliptic curve isogeny, random matrix decoding, etc.) used in recently proposed post-quantum cryptosystems.
Room 310, The Moscone Center
Organizers:
Ryann Cartor, Clemson University rcartor@clemson.edu
Angela Robinson, NIST
Daniel Everett Martin, Clemson University
-
1:00 p.m.
SALSA, PICANTE y VERDE: Machine Learning attacks on LWE with small sparse secrets
Kristin E. Lauter*, Meta AI Research (FAIR)
(1192-11-32549) -
2:00 p.m.
Analysis of Deep Learning Side Channel Attacks on Lightweight Cryptographic Systems
Liljana Babinkostova*, Boise State University
(1192-68-31235) -
2:30 p.m.
A Brief History of MinRank
Maxime Bros*, NIST
(1192-15-30074) -
3:00 p.m.
Cryptosystems as Error Correcting Codes
Alejandro Cohen, Technion
Rafael D'Oliveira*, Clemson University
Ken R. Duffy, Northeastern University
Muriel Medard, MIT
Jongchan Woo, MIT
(1192-94-32140) -
3:30 p.m.
Analysis of REDOG and Layered-ROLLO-I
Alex Pellegrini*, Eindhoven University of Technology
(1192-94-33251) -
4:00 p.m.
Products of MRD Codes
Giuseppe Cotardo*, Virginia Tech
Alain Couvreur, Inria Saclay-Île-de-France Research Centre
(1192-15-31710) -
4:30 p.m.
On the Decoding Failure Rate of BIKE
Sarah Arpin, University of Colorado Boulder
Tyler Raven Billingsley, St. Olaf College of Northfield, MN
Daniel Rayor Hast, Boston University
Jun Bo Lau*, Boston University
Ray Perlner, NIST
Angela Robinson, NIST
(1192-11-30166)
-
1:00 p.m.