5 zoekresultaten voor “cryptography” in de Publieke website
-
aspects of class group actions and applications to post-quantum cryptography
Most of current public-key cryptography is considered insecure against attacks from sufficiently powerful quantum computers. Post-quantum cryptography studies methods to secure information resistant against such attacks. One proposal is isogeny-based cryptography, which bases its security on computational…
-
Unconditionally secure cryptographic protocols from coding-theoretic primitives
This dissertation presents new cryptographic protocols, which can be divided into two families.
-
Knowledge extraction in the quantum random-oracle model
The aim of this thesis is to present novel techniques for proving cryptographic schemes secure against quantum adversaries. Most results are within the context of an idealized model called the ‘quantum random-oracle model’.
-
Attacks on hash functions and applications
Promotores: R. Cramer, A.K. Lenstra, Co-Promotor: B.M.M. de Weger
-
Onzichtbaar maar overal aanwezig: vrouwelijke spionnen in de 17e eeuw
Lang werd gedacht dat er weinig tot geen vrouwelijke spionnen zijn geweest in de geschiedenis. Maar niets blijkt minder waar. In haar boek Invisible Agents reconstrueert Nadine Akkerman de verhalen van de vele Britse vrouwen die spioneerden in de 17e eeuw.