Error message
- Deprecated function: TYPO3\PharStreamWrapper\Manager::initialize(): Implicitly marking parameter $resolver as nullable is deprecated, the explicit nullable type must be used instead in include_once() (line 19 of includes/file.phar.inc).
- Deprecated function: TYPO3\PharStreamWrapper\Manager::initialize(): Implicitly marking parameter $collection as nullable is deprecated, the explicit nullable type must be used instead in include_once() (line 19 of includes/file.phar.inc).
- Deprecated function: TYPO3\PharStreamWrapper\Manager::__construct(): Implicitly marking parameter $resolver as nullable is deprecated, the explicit nullable type must be used instead in include_once() (line 19 of includes/file.phar.inc).
- Deprecated function: TYPO3\PharStreamWrapper\Manager::__construct(): Implicitly marking parameter $collection as nullable is deprecated, the explicit nullable type must be used instead in include_once() (line 19 of includes/file.phar.inc).
- Deprecated function: UpdateQuery::expression(): Implicitly marking parameter $arguments as nullable is deprecated, the explicit nullable type must be used instead in require_once() (line 1884 of includes/database/database.inc).
- Deprecated function: MergeQuery::expression(): Implicitly marking parameter $arguments as nullable is deprecated, the explicit nullable type must be used instead in require_once() (line 1884 of includes/database/database.inc).
- Deprecated function: SelectQueryInterface::getArguments(): Implicitly marking parameter $queryPlaceholder as nullable is deprecated, the explicit nullable type must be used instead in require_once() (line 1884 of includes/database/database.inc).
- Deprecated function: SelectQueryInterface::preExecute(): Implicitly marking parameter $query as nullable is deprecated, the explicit nullable type must be used instead in require_once() (line 1884 of includes/database/database.inc).
- Deprecated function: SelectQueryExtender::getArguments(): Implicitly marking parameter $queryPlaceholder as nullable is deprecated, the explicit nullable type must be used instead in require_once() (line 1884 of includes/database/database.inc).
- Deprecated function: SelectQueryExtender::preExecute(): Implicitly marking parameter $query as nullable is deprecated, the explicit nullable type must be used instead in require_once() (line 1884 of includes/database/database.inc).
- Deprecated function: SelectQuery::getArguments(): Implicitly marking parameter $queryPlaceholder as nullable is deprecated, the explicit nullable type must be used instead in require_once() (line 1884 of includes/database/database.inc).
- Deprecated function: SelectQuery::preExecute(): Implicitly marking parameter $query as nullable is deprecated, the explicit nullable type must be used instead in require_once() (line 1884 of includes/database/database.inc).
Post-Quantum Security Models
Submitted by
Sfelloni on Fri, 20/08/2010 - 18:27.
Registration deadline:
Thursday, September 23, 2010
Submission deadline:
Thursday, September 16, 2010
PQSM - Post-Quantum Security Models in Paris
In a post-quantum world, an eavesdropper is able to use quantum resources, possibly amounting to a large quantum computer, to process information. Thus, post-quantum attackers must be taken into account whenever security models and proofs are concerned, by both quantum and classical existing and future cryptosystems. And while we still do not know when, how or even whether we will enter a post-quantum era, there is already ground for common work between the quantum information and the cryptography community.
The objective of the workshop is to build scientific bridges between these two communities on topics of joint interest: from the state of the art and perspectives in the theory and design of quantum computers and eavesdropping attacks, to computationally secure and/or information-theoretically secure post-quantum cryptographic schemes, to analysis of the corresponding emerging post-quantum security models.
PQSM Topics
Provable security in complexity-based cryptosystems
Provable security in quantum cryptosystems (and other “physically-based” cryptosystems)
Proposals to model attackers in a post-quantum world
Evaluations of the impact of post-quantum attackers on practical quantum and classical cryptosystems
State of the art and recent developments towards post-quantum attackers