Now showing items 1-7 of 7

    • Classical and Quantum Algorithms for Isogeny-based Cryptography 

      Sankar, Anirudh (University of Waterloo, 2015-09-30)
      Isogeny-based cryptography using supersingular elliptic curves --- most prominently, the constructions of De Feo-Jao-Plut --- is one of the few practical candidates for post-quantum public key cryptography. Its formidable ...
    • Conical Designs and Categorical Jordan Algebraic Post-Quantum Theories 

      Graydon, Matthew (University of Waterloo, 2017-01-06)
      Physical theories can be characterized in terms of their state spaces and their evolutive equations. The kinematical structure and the dynamical structure of finite dimensional quantum theory are, in light of the ...
    • Implementing the Castryck-Decru attack on SIDH with general primes 

      Laflamme, Jeanne (University of Waterloo, 2024-01-09)
      With the rapid progress of quantum computers in recent years, efforts have been made to standardize new public-key cryptographic protocols which would be secure against them. One of the schemes in contention was Supersingular ...
    • New Design and Analysis Techniques for Post-Quantum Cryptography 

      Eaton, Edward (University of Waterloo, 2022-09-16)
      Due to the threat of scalable quantum computation breaking existing public-key cryptography, interest in post-quantum cryptography has exploded in the past decade. There are two key aspects to the mitigation of the quantum ...
    • An Operational Road towards Understanding Causal Indefiniteness within Post-Quantum Theories 

      Sakharwade, Nitica (University of Waterloo, 2022-01-07)
      A theory, whatever it does, must correlate data. We commit ourselves to operational methodology, as a means towards studying the space of Generalised Probability Theories that are compatible with Indefinite Causality. Such ...
    • Post-Quantum Account Recovery for Passwordless Authentication 

      Wilson, Spencer MacLaren (University of Waterloo, 2023-04-24)
      WebAuthn is a passwordless authentication protocol which allows users to authenticate to online services using public-key cryptography. Users prove their identity based on possession of a private key, which is stored on a ...
    • Signature Schemes in the Quantum Random-Oracle Model 

      Eaton, Edward (University of Waterloo, 2017-04-25)
      A signature scheme is a fundamental component in modern digital communication. It allows for authenticated messages, without which it would be nearly impossible to ensure security when using most modern technologies. ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages