Browsing University of Waterloo by Subject "cryptography"
Now showing items 21-40 of 44
-
Implementing the Castryck-Decru attack on SIDH with general primes
(University of Waterloo, 2024-01-09)With the rapid progress of quantum computers in recent years, efforts have been made to standardize new public-key cryptographic protocols which would be secure against them. One of the schemes in contention was Supersingular ... -
Improving post-quantum cryptography through cryptanalysis
(University of Waterloo, 2020-07-15)Large quantum computers pose a threat to our public-key cryptographic infrastructure. The possible responses are: Do nothing; accept the fact that quantum computers might be used to break widely deployed protocols. Mitigate ... -
Key establishment --- security models, protocols and usage
(University of Waterloo, 2008-07-30)Key establishment is the process whereby two or more parties derive a shared secret, typically used for subsequent confidential communication. However, identifying the exact security requirements for key establishment ... -
Light-weight verification of cryptographic API usage
(University of Waterloo, 2020-12-15)A pluggable type system is a light-weight approach for compile-time program verification, which provides more powerful types to both developers and compilers. Developers use pluggable types to boost program understanding, ... -
Machine-Level Software Optimization of Cryptographic Protocols
(University of Waterloo, 2014-04-30)This work explores two methods for practical cryptography on mobile devices. The first method is a quantum-resistant key-exchange protocol proposed by Jao et al.. As the use of mobile devices increases, the deployment of ... -
New Design and Analysis Techniques for Post-Quantum Cryptography
(University of Waterloo, 2022-09-16)Due to the threat of scalable quantum computation breaking existing public-key cryptography, interest in post-quantum cryptography has exploded in the past decade. There are two key aspects to the mitigation of the quantum ... -
On Pairing-Based Signature and Aggregate Signature Schemes
(University of Waterloo, 2009-01-21)In 2001, Boneh, Lynn, and Shacham presented a pairing-based signature scheme known as the BLS signature scheme. In 2003, Boneh, Gentry, Lynn, and Shacham presented the first aggregate signature scheme called the BGLS ... -
Post-Quantum Account Recovery for Passwordless Authentication
(University of Waterloo, 2023-04-24)WebAuthn is a passwordless authentication protocol which allows users to authenticate to online services using public-key cryptography. Users prove their identity based on possession of a private key, which is stored on a ... -
Practical Lattice Cryptosystems: NTRUEncrypt and NTRUMLS
(University of Waterloo, 2015-12-22)Public key cryptography, as deployed on the internet today, stands on shaky ground. For over twenty years now it has been known that the systems in widespread use are insecure against adversaries equipped with quantum ... -
Privately Constrained Testable Pseudorandom Functions
(University of Waterloo, 2018-09-20)Privately Constrained Pseudorandom Functions allow a PRF key to be delegated to some evaluator in a constrained manner, such that the key’s functionality is restricted with respect to some secret predicate. Variants of ... -
ProofFrog: A Tool For Verifying Game-Hopping Proofs
(University of Waterloo, 2024-04-15)Cryptographic proofs allow researchers to provide theoretical guarantees on the security that their constructions provide. A proof of security can completely eliminate a class of attacks by potential adversaries. Human ... -
Quantum Key Distribution Data Post-Processing with Limited Resources: Towards Satellite-Based Quantum Communication
(University of Waterloo, 2013-01-23)Quantum key distribution (QKD), a novel cryptographic technique for secure distribution of secret keys between two parties, is the first successful quantum technology to emerge from quantum information science. The security ... -
Revisiting the security model for aggregate signature schemes
(University of Waterloo, 2014-05-26)Aggregate signature schemes combine the digital signatures of multiple users on different messages into one single signature. The Boneh-Gentry-Lynn-Shacham (BGLS) aggregate signature scheme is one such scheme, based on ... -
Security Analysis Methods for Detection and Repair of DoS Vulnerabilities in Smart Contracts
(University of Waterloo, 2021-04-19)In recent years we have witnessed a dramatic increase in the applications of blockchain and smart contracts in a variety of contexts, including supply-chain, decentralized finance, and international money transfers. However, ... -
Security Analysis of Isogeny-Based Cryptosystems
(University of Waterloo, 2020-08-20)Let $E$ be a supersingular elliptic curve over a finite field. In this document we study public-key encryption schemes which use non-constant rational maps from $E$. The purpose of this study is to determine if such ... -
Security for Rural Public Computing
(University of Waterloo, 2008-09-15)Current research on securing public computing infrastructure like Internet kiosks has focused on the use of smartphones to establish trust in a computing platform or to offload the processing of sensitive information, and ... -
SFour: A Protocol for Cryptographically Secure Record Linkage at Scale
(University of Waterloo, 2019-09-23)The prevalence of various (and increasingly large) datasets presents the challenging problem of discovering common entities dispersed across disparate datasets. Solutions to the private record linkage problem (PRL) aim to ... -
Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging
(University of Waterloo, 2013-05-01)Side-Channel Analysis plays an important role in cryptology, as it represents an important class of attacks against cryptographic implementations, especially in the context of embedded systems such as hand-held mobile ... -
Signature Schemes in the Quantum Random-Oracle Model
(University of Waterloo, 2017-04-25)A signature scheme is a fundamental component in modern digital communication. It allows for authenticated messages, without which it would be nearly impossible to ensure security when using most modern technologies. ... -
Squashing Models for Optical Measurements in Quantum Communication
(University of Waterloo, 2009-10-02)Many protocols and experiments in quantum information science are described in terms of simple measurements on qubits. However, in an experimental implementation, the exact description of the measurement is usually more ...