Browsing Combinatorics and Optimization by Subject "key establishment"
Now showing items 1-2 of 2
-
Design, Analysis, and Optimization of Isogeny-Based Key Establishment Protocols
(University of Waterloo, 2020-08-19)We analyze the Commutative Supersingular Isogeny Diffie-Hellman protocol (CSIDH), a novel supersingular isogeny-based key establishment protocol. Our analysis is from three perspectives: Quantum Cryptanalysis. Building ... -
Security in Key Agreement: Two-Party Certificateless Schemes
(University of Waterloo, 2008-12-22)The main goal of cryptography is to enable secure communication over a public channel; often a secret shared among the communicating parties is used to achieve this. The process by which these parties agree on such a shared ...