Now showing items 1-8 of 8

    • Design, Analysis, and Optimization of Isogeny-Based Key Establishment Protocols 

      LeGrow, Jason Travis (University of Waterloo, 2020-08-19)
      We analyze the Commutative Supersingular Isogeny Diffie-Hellman protocol (CSIDH), a novel supersingular isogeny-based key establishment protocol. Our analysis is from three perspectives: Quantum Cryptanalysis. Building ...
    • Graph-Theoretic Techniques for Optimizing NISQ Algorithms 

      Jena, Andrew (University of Waterloo, 2024-02-15)
      Entering the NISQ era, the search for useful yet simple quantum algorithms is perhaps of more importance now than it may ever be in the future. In place of quantum walks, the quantum Fourier transform, and asymptotic results ...
    • Graphical CSS Code Transformation Using ZX Calculus 

      Li, Sarah Meng (University of Waterloo, 2023-12-21)
      In this work, we present a generic approach to transform CSS codes by building upon their equivalence to phase-free ZX diagrams. Using the ZX calculus, we demonstrate diagrammatic transformations between encoding maps ...
    • Improving post-quantum cryptography through cryptanalysis 

      Schanck, John (University of Waterloo, 2020-07-15)
      Large quantum computers pose a threat to our public-key cryptographic infrastructure. The possible responses are: Do nothing; accept the fact that quantum computers might be used to break widely deployed protocols. Mitigate ...
    • Partitioning Pauli Operators: in Theory and in Practice 

      Jena, Andrew (University of Waterloo, 2019-09-04)
      Measuring the expectation value of Pauli operators on prepared quantum states is a fundamental task in the variational quantum eigensolver. Simultaneously measuring sets of operators allows for fewer measurements and an ...
    • Practical Lattice Cryptosystems: NTRUEncrypt and NTRUMLS 

      Schanck, John (University of Waterloo, 2015-12-22)
      Public key cryptography, as deployed on the internet today, stands on shaky ground. For over twenty years now it has been known that the systems in widespread use are insecure against adversaries equipped with quantum ...
    • Quantum Cost Models for Cryptanalysis of Isogenies 

      Jaques, Samuel (University of Waterloo, 2019-05-01)
      Isogeny-based cryptography uses keys large enough to resist a far-future attack from Tani’s algorithm, a quantum random walk on Johnson graphs. The key size is based on an analysis in the query model. Queries do not ...
    • STPA-Sec Applied to Path Planning: Quantum-Safe Autonomous Vehicles 

      Jepson, David (University of Waterloo, 2022-05-12)
      Autonomous vehicles and quantum computers are two emerging technologies that will transform our world in the not-too-distant future. This thesis examines the safety and security of autonomous vehicles in a world where ...


      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages