Now showing items 1-5 of 5
Post-Quantum Elliptic Curve Cryptography
(University of Waterloo, 2016-05-16)
We propose and develop new schemes for post-quantum cryptography based on isogenies over elliptic curves. First we show that ordinary elliptic curves are have less than exponential security against quantum computers. These ...
Post-Quantum Security of Authenticated Key Establishment Protocols
(University of Waterloo, 2016-04-20)
We present a security model for authenticated key establishment that allows for quantum interactions between the adversary and quantum oracles that emulate classical parties, resulting in a truly post-quantum security ...
Computational Approaches to Problems in Noncommutative Algebra -- Theory, Applications and Implementations
(University of Waterloo, 2016-09-28)
Noncommutative rings appear in several areas of mathematics. Most prominently, they can be used to model operator equations, such as differential or difference equations. In the Ph.D. studies leading to this thesis, ...
On the effectiveness of isogeny walks for extending cover attacks on elliptic curves
(University of Waterloo, 2016-08-23)
Cryptographic systems based on the elliptic curve discrete logarithm problem (ECDLP) are widely deployed in the world today. In order for such a system to guarantee a particular security level, the elliptic curve selected ...
Key Compression for Isogeny-Based Cryptosystems
(University of Waterloo, 2016-04-21)
We present a method for key compression in quantum-resistant isogeny-based cryptosystems, which reduces storage and transmission costs of per-party public information by a factor of two, with no effect on the security level ...