Browsing Combinatorics and Optimization by Supervisor "Mosca, Michele"
Now showing items 1-8 of 8
-
Design, Analysis, and Optimization of Isogeny-Based Key Establishment Protocols
(University of Waterloo, 2020-08-19)We analyze the Commutative Supersingular Isogeny Diffie-Hellman protocol (CSIDH), a novel supersingular isogeny-based key establishment protocol. Our analysis is from three perspectives: Quantum Cryptanalysis. Building ... -
Graph-Theoretic Techniques for Optimizing NISQ Algorithms
(University of Waterloo, 2024-02-15)Entering the NISQ era, the search for useful yet simple quantum algorithms is perhaps of more importance now than it may ever be in the future. In place of quantum walks, the quantum Fourier transform, and asymptotic results ... -
Graphical CSS Code Transformation Using ZX Calculus
(University of Waterloo, 2023-12-21)In this work, we present a generic approach to transform CSS codes by building upon their equivalence to phase-free ZX diagrams. Using the ZX calculus, we demonstrate diagrammatic transformations between encoding maps ... -
Improving post-quantum cryptography through cryptanalysis
(University of Waterloo, 2020-07-15)Large quantum computers pose a threat to our public-key cryptographic infrastructure. The possible responses are: Do nothing; accept the fact that quantum computers might be used to break widely deployed protocols. Mitigate ... -
Partitioning Pauli Operators: in Theory and in Practice
(University of Waterloo, 2019-09-04)Measuring the expectation value of Pauli operators on prepared quantum states is a fundamental task in the variational quantum eigensolver. Simultaneously measuring sets of operators allows for fewer measurements and an ... -
Practical Lattice Cryptosystems: NTRUEncrypt and NTRUMLS
(University of Waterloo, 2015-12-22)Public key cryptography, as deployed on the internet today, stands on shaky ground. For over twenty years now it has been known that the systems in widespread use are insecure against adversaries equipped with quantum ... -
Quantum Cost Models for Cryptanalysis of Isogenies
(University of Waterloo, 2019-05-01)Isogeny-based cryptography uses keys large enough to resist a far-future attack from Tani’s algorithm, a quantum random walk on Johnson graphs. The key size is based on an analysis in the query model. Queries do not ... -
STPA-Sec Applied to Path Planning: Quantum-Safe Autonomous Vehicles
(University of Waterloo, 2022-05-12)Autonomous vehicles and quantum computers are two emerging technologies that will transform our world in the not-too-distant future. This thesis examines the safety and security of autonomous vehicles in a world where ...