Browsing Electrical and Computer Engineering by Subject "cryptography"
Now showing items 1-8 of 8
-
Applying Fully Homomorphic Encryption: Practices and Problems
(University of Waterloo, 2021-09-24)Fully homomorphic encryption (FHE) has been regarded as the "holy grail" of cryptography for its versatility as a cryptographic primitive and wide range of potential applications. Since Gentry published the first theoretically ... -
A graph based approach for formal verification of Galois field multipliers
(University of Waterloo, 2022-08-22)Data transfer between devices has increased rapidly with improvements in technology and the internet. To protect data from hackers, data is encrypted using methods of cryptography. To make the process of encryption faster, ... -
High Performance Elliptic Curve Cryptographic Co-processor
(University of Waterloo, 2003)In FIPS 186-2, NIST recommends several finite fields to be used in the elliptic curve digital signature algorithm (ECDSA). Of the ten recommended finite fields, five are binary extension fields with degrees ranging ... -
Light-weight verification of cryptographic API usage
(University of Waterloo, 2020-12-15)A pluggable type system is a light-weight approach for compile-time program verification, which provides more powerful types to both developers and compilers. Developers use pluggable types to boost program understanding, ... -
Quantum Key Distribution Data Post-Processing with Limited Resources: Towards Satellite-Based Quantum Communication
(University of Waterloo, 2013-01-23)Quantum key distribution (QKD), a novel cryptographic technique for secure distribution of secret keys between two parties, is the first successful quantum technology to emerge from quantum information science. The security ... -
Security Analysis Methods for Detection and Repair of DoS Vulnerabilities in Smart Contracts
(University of Waterloo, 2021-04-19)In recent years we have witnessed a dramatic increase in the applications of blockchain and smart contracts in a variety of contexts, including supply-chain, decentralized finance, and international money transfers. However, ... -
Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging
(University of Waterloo, 2013-05-01)Side-Channel Analysis plays an important role in cryptology, as it represents an important class of attacks against cryptographic implementations, especially in the context of embedded systems such as hand-held mobile ... -
Verification of Pipelined Ciphers
(University of Waterloo, 2009-01-29)The purpose of this thesis is to explore the formal verification technique of completion functions and equivalence checking by verifying two pipelined cryptographic circuits, KASUMI and WG ciphers. Most of current methods ...