Now showing items 1-3 of 3

    • Algorithm Substitution Attacks: Detecting ASAs Using State Reset and Making ASAs Asymmetric 

      Hodges, Philip (University of Waterloo, 2021-08-27)
      The field of cryptography has made incredible progress in the last several decades. With the formalization of security goals and the methods of provable security, we have achieved many privacy and integrity guarantees in ...
    • Chosen Ciphertext Security from Zero Knowledge Proofs 

      Steckel, Camryn (University of Waterloo, 2023-08-24)
      When designing encryption schemes, there are different levels of security that one can achieve. Of the two main security levels, cryptographers generally strive for the stronger notion of chosen ciphertext attack (CCA) ...
    • Post-Quantum Account Recovery for Passwordless Authentication 

      Wilson, Spencer MacLaren (University of Waterloo, 2023-04-24)
      WebAuthn is a passwordless authentication protocol which allows users to authenticate to online services using public-key cryptography. Users prove their identity based on possession of a private key, which is stored on a ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages