Browsing University of Waterloo by Supervisor "Mosca, Michele"
Now showing items 1-15 of 15
-
The Compilation of Reversible Circuits and a New Optimization Game
(University of Waterloo, 2016-09-28)The focus of this thesis is reversible circuit compilation. We will explore the use of pebble games for circuit analysis. The usefulness of this technique is demonstrated by finding a new space bound for the Karatsuba ... -
Design, Analysis, and Optimization of Isogeny-Based Key Establishment Protocols
(University of Waterloo, 2020-08-19)We analyze the Commutative Supersingular Isogeny Diffie-Hellman protocol (CSIDH), a novel supersingular isogeny-based key establishment protocol. Our analysis is from three perspectives: Quantum Cryptanalysis. Building ... -
Extended Nonlocal Games
(University of Waterloo, 2017-03-31)The notions of entanglement and nonlocality are among the most striking ingredients found in quantum information theory. One tool to better understand these notions is the model of nonlocal games; a mathematical framework ... -
Formal Methods in Quantum Circuit Design
(University of Waterloo, 2019-02-26)The design and compilation of correct, efficient quantum circuits is integral to the future operation of quantum computers. This thesis makes contributions to the problems of optimizing and verifying quantum circuits, with ... -
Graph-Theoretic Techniques for Optimizing NISQ Algorithms
(University of Waterloo, 2024-02-15)Entering the NISQ era, the search for useful yet simple quantum algorithms is perhaps of more importance now than it may ever be in the future. In place of quantum walks, the quantum Fourier transform, and asymptotic results ... -
Graphical CSS Code Transformation Using ZX Calculus
(University of Waterloo, 2023-12-21)In this work, we present a generic approach to transform CSS codes by building upon their equivalence to phase-free ZX diagrams. Using the ZX calculus, we demonstrate diagrammatic transformations between encoding maps ... -
Improving post-quantum cryptography through cryptanalysis
(University of Waterloo, 2020-07-15)Large quantum computers pose a threat to our public-key cryptographic infrastructure. The possible responses are: Do nothing; accept the fact that quantum computers might be used to break widely deployed protocols. Mitigate ... -
Methods for parallel quantum circuit synthesis, fault-tolerant quantum RAM, and quantum state tomography
(University of Waterloo, 2019-01-18)The pace of innovation in quantum information science has recently exploded due to the hope that a quantum computer will be able to solve a multitude of problems that are intractable using classical hardware. Current quantum ... -
Optics, Loss and Gravity
(University of Waterloo, 2021-01-13)We look at some ideas that can be found from making connections among optics, non-Hermitian dynamics and gravity. Using nonlinear optics, we demonstrate how loss can be used to make brighter sources of thermal light. Also, ... -
Partitioning Pauli Operators: in Theory and in Practice
(University of Waterloo, 2019-09-04)Measuring the expectation value of Pauli operators on prepared quantum states is a fundamental task in the variational quantum eigensolver. Simultaneously measuring sets of operators allows for fewer measurements and an ... -
Practical Lattice Cryptosystems: NTRUEncrypt and NTRUMLS
(University of Waterloo, 2015-12-22)Public key cryptography, as deployed on the internet today, stands on shaky ground. For over twenty years now it has been known that the systems in widespread use are insecure against adversaries equipped with quantum ... -
Quantum Algorithmic Techniques for Fault-Tolerant Quantum Computers
(University of Waterloo, 2019-10-01)Quantum computers have the potential to push the limits of computation in areas such as quantum chemistry, cryptography, optimization, and machine learning. Even though many quantum algorithms show asymptotic improvement ... -
Quantum Cost Models for Cryptanalysis of Isogenies
(University of Waterloo, 2019-05-01)Isogeny-based cryptography uses keys large enough to resist a far-future attack from Tani’s algorithm, a quantum random walk on Johnson graphs. The key size is based on an analysis in the query model. Queries do not ... -
Quantum information in security protocols
(University of Waterloo, 2022-01-18)Information security deals with the protection of our digital infrastructure. Achieving meaningful real-world security requires powerful cryptographic models that can give strong security guarantees and it requires ... -
STPA-Sec Applied to Path Planning: Quantum-Safe Autonomous Vehicles
(University of Waterloo, 2022-05-12)Autonomous vehicles and quantum computers are two emerging technologies that will transform our world in the not-too-distant future. This thesis examines the safety and security of autonomous vehicles in a world where ...