Now showing items 1-4 of 4

    • Evaluating Large Degree Isogenies between Elliptic Curves 

      Soukharev, Vladimir (University of Waterloo, 2010-12-20)
      An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between elliptic curves efficiently. For ordinary curves ...
    • Implementing the Castryck-Decru attack on SIDH with general primes 

      Laflamme, Jeanne (University of Waterloo, 2024-01-09)
      With the rapid progress of quantum computers in recent years, efforts have been made to standardize new public-key cryptographic protocols which would be secure against them. One of the schemes in contention was Supersingular ...
    • Machine-Level Software Optimization of Cryptographic Protocols 

      Fishbein, Dieter (University of Waterloo, 2014-04-30)
      This work explores two methods for practical cryptography on mobile devices. The first method is a quantum-resistant key-exchange protocol proposed by Jao et al.. As the use of mobile devices increases, the deployment of ...
    • Quantum Cost Models for Cryptanalysis of Isogenies 

      Jaques, Samuel (University of Waterloo, 2019-05-01)
      Isogeny-based cryptography uses keys large enough to resist a far-future attack from Tani’s algorithm, a quantum random walk on Johnson graphs. The key size is based on an analysis in the query model. Queries do not ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages