Now showing items 1-7 of 7

    • Algorithm Substitution Attacks: Detecting ASAs Using State Reset and Making ASAs Asymmetric 

      Hodges, Philip (University of Waterloo, 2021-08-27)
      The field of cryptography has made incredible progress in the last several decades. With the formalization of security goals and the methods of provable security, we have achieved many privacy and integrity guarantees in ...
    • Chosen Ciphertext Security from Zero Knowledge Proofs 

      Steckel, Camryn (University of Waterloo, 2023-08-24)
      When designing encryption schemes, there are different levels of security that one can achieve. Of the two main security levels, cryptographers generally strive for the stronger notion of chosen ciphertext attack (CCA) ...
    • Efficient Oblivious Database Joins 

      Krastnikov, Simeon (University of Waterloo, 2020-12-10)
      A major algorithmic challenge in designing applications intended for secure remote execution is ensuring that their execution is oblivious to their inputs, in the sense that their memory access patterns do not leak sensitive ...
    • Enabling Post-Quantum Signatures in DNSSEC: One ARRF at a time 

      Goertzen, Jason (University of Waterloo, 2022-12-19)
      The Domain Name System Security Extensions (DNSSEC) provide authentication of DNS responses using digital signatures. DNS relies on UDP as its primary delivery method which imposes several constraints, with the most notable ...
    • New Design and Analysis Techniques for Post-Quantum Cryptography 

      Eaton, Edward (University of Waterloo, 2022-09-16)
      Due to the threat of scalable quantum computation breaking existing public-key cryptography, interest in post-quantum cryptography has exploded in the past decade. There are two key aspects to the mitigation of the quantum ...
    • Post-Quantum Account Recovery for Passwordless Authentication 

      Wilson, Spencer MacLaren (University of Waterloo, 2023-04-24)
      WebAuthn is a passwordless authentication protocol which allows users to authenticate to online services using public-key cryptography. Users prove their identity based on possession of a private key, which is stored on a ...
    • ProofFrog: A Tool For Verifying Game-Hopping Proofs 

      Evans, Ross (University of Waterloo, 2024-04-15)
      Cryptographic proofs allow researchers to provide theoretical guarantees on the security that their constructions provide. A proof of security can completely eliminate a class of attacks by potential adversaries. Human ...


      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages