Search for tag: "cryptography"
How do we know what we know?  as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in latticebased cryptography., Yuxi Zheng, UG '23 (2279885)Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…
From Research Princeton Research Day
4 likes
87 plays


Pursuing the Beauty of Numbers, Evan M. O'Dorney, GS (2306680)In my work in number theory, I explore patterns in numbers, specifically counting the equations with integer coefficients with a given discriminant. I am studying the OhnoNakagawa theorem, a…
From Research Princeton Research Day
2 likes
984 plays


CITP Seminar: Shaanan Cohney  Leaving Randomness to Chance: Standards Shortcomings and Buried Backdoors in Random Number GeneratorsSecurity is too important to leave to chance. Security by design is often touted as the solution, but when your system is broken before you design it—something has gone very, very wrong.Secure…
From CI Center for Information Technology Policy
0 likes
15 plays
