Search for tag: "cryptography"

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…

From  Research Princeton Research Day 4 likes 80 plays

Pursuing the Beauty of Numbers, Evan M. O'Dorney, GS (2306680)

In my work in number theory, I explore patterns in numbers, specifically counting the equations with integer coefficients with a given discriminant. I am studying the Ohno-Nakagawa theorem, a…

From  Research Princeton Research Day 2 likes 928 plays

CITP Seminar: Shaanan Cohney - Leaving Randomness to Chance: Standards Shortcomings and Buried Backdoors in Random Number Generators

Security is too important to leave to chance. Security by design is often touted as the solution, but when your system is broken before you design it—something has gone very, very wrong.Secure…

From  CI Center for Information Technology Policy 0 likes 15 plays