Now showing items 1-5 of 5

    • Efficient Zero-Knowledge Proofs and Applications 

      Henry, Ryan (University of Waterloo, 2014-08-12)
      Zero-knowledge proofs provide a means for a prover to convince a verifier that some claim is true and nothing more. The ability to prove statements while conveying zero information beyond their veracity has profound ...
    • Improving post-quantum cryptography through cryptanalysis 

      Schanck, John (University of Waterloo, 2020-07-15)
      Large quantum computers pose a threat to our public-key cryptographic infrastructure. The possible responses are: Do nothing; accept the fact that quantum computers might be used to break widely deployed protocols. Mitigate ...
    • Practical Lattice Cryptosystems: NTRUEncrypt and NTRUMLS 

      Schanck, John (University of Waterloo, 2015-12-22)
      Public key cryptography, as deployed on the internet today, stands on shaky ground. For over twenty years now it has been known that the systems in widespread use are insecure against adversaries equipped with quantum ...
    • Quantum Cost Models for Cryptanalysis of Isogenies 

      Jaques, Samuel (University of Waterloo, 2019-05-01)
      Isogeny-based cryptography uses keys large enough to resist a far-future attack from Tani’s algorithm, a quantum random walk on Johnson graphs. The key size is based on an analysis in the query model. Queries do not ...
    • Techniques of Side Channel Cryptanalysis 

      Muir, James (University of Waterloo, 2001)
      The traditional model of cryptography examines the security of cryptographic primitives as mathematical functions. This approach does not account for the physical side effects of using these primitives in the real world. ...


      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages