BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Drupal iCal API//EN
X-WR-CALNAME:Events items teaser
X-WR-TIMEZONE:America/Toronto
BEGIN:VTIMEZONE
TZID:America/Toronto
X-LIC-LOCATION:America/Toronto
BEGIN:DAYLIGHT
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
UID:69ce8a5b79cb8
DTSTART;TZID=America/Toronto:20251105T103000
SEQUENCE:0
TRANSP:TRANSPARENT
DTEND;TZID=America/Toronto:20251105T113000
URL:https://uwaterloo.ca/combinatorics-and-optimization/events/crypto-readi
 ng-group-camryn-steckel
SUMMARY:Crypto Reading Group -Camryn Steckel
CLASS:PUBLIC
DESCRIPTION:TITLE:Hybrid Signature Schemes\n\nSpeaker\n Camryn Steckel\n\nA
 ffiliation\n University of Waterloo\n\nLocation\n MC 5479\n\nABSTRACT: Th
 e transition to post quantum cryptography comes with many\nchallenges. On 
 the one hand\, classically secure algorithms are\nwell-tested\, and we hav
 e a high degree of confidence in them against\nclassical adversaries\, but
  they are vulnerable to quantum computers.\nOn the other hand\, we current
 ly have no reason to believe that post\nquantum algorithms are vulnerable 
 to either classical or quantum\nadversaries\, however\, they are still rel
 atively new\, and because of\nthat\, they have not been scrutinized to the
  degree of their classical\ncounterparts. Additionally\, the transition wi
 ll not happen\ninstantaneously\, and there will be a period of time where 
 some\ninterfaces are able to support post quantum algorithms while others\
 ncan only support classical ones. One possible solution to these\nchalleng
 es (on the digital signature side of things) is to use hybrid\nsignature s
 chemes\, which\, loosely speaking\, are digital signature\nschemes based o
 ff of both a classical and a hybrid digital signature\nscheme\, which are 
 secure if at least one of the underlying signature\nschemes is secure. In 
 this talk\, I will cover a few different\nsignature combiners\, and compar
 e and contrast both how they work and\nthe properties they guarantee. This
  talk is based off of the papers \"A\nNote on Hybrid Signature Schemes\" b
 y Nina Bindel and Britta Hale\, and\n\"Bird of Prey: Practical Signature C
 ombiners Preserving Strong\nExistential Unforgeability\" by Jonas Janneck.
DTSTAMP:20260402T152515Z
END:VEVENT
END:VCALENDAR