Browsing Combinatorics and Optimization by Author "0a6a4a2e-7f96-4cb7-bd12-e9d05d4feb45"
Now showing items 1-2 of 2
-
Improving post-quantum cryptography through cryptanalysis
Schanck, John (University of Waterloo, 2020-07-15)Large quantum computers pose a threat to our public-key cryptographic infrastructure. The possible responses are: Do nothing; accept the fact that quantum computers might be used to break widely deployed protocols. Mitigate ... -
Practical Lattice Cryptosystems: NTRUEncrypt and NTRUMLS
Schanck, John (University of Waterloo, 2015-12-22)Public key cryptography, as deployed on the internet today, stands on shaky ground. For over twenty years now it has been known that the systems in widespread use are insecure against adversaries equipped with quantum ...