Search for tag: "cryptography"
How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…
From Research Princeton Research Day
4 likes
87 plays
|
|
Pursuing the Beauty of Numbers, Evan M. O'Dorney, GS (2306680)In my work in number theory, I explore patterns in numbers, specifically counting the equations with integer coefficients with a given discriminant. I am studying the Ohno-Nakagawa theorem, a…
From Research Princeton Research Day
2 likes
984 plays
|
|
CITP Seminar: Shaanan Cohney - Leaving Randomness to Chance: Standards Shortcomings and Buried Backdoors in Random Number GeneratorsSecurity is too important to leave to chance. Security by design is often touted as the solution, but when your system is broken before you design it—something has gone very, very wrong.Secure…
From CI Center for Information Technology Policy
0 likes
15 plays
|