Centre for Applied Cryptographic Research
Encyclopedia
The Centre for Applied Cryptographic Research (CACR) is a group of industrial representatives, professors, and students at the University of Waterloo
University of Waterloo
The University of Waterloo is a comprehensive public university in the city of Waterloo, Ontario, Canada. The school was founded in 1957 by Drs. Gerry Hagey and Ira G. Needles, and has since grown to an institution of more than 30,000 students, faculty, and staff...

 in Waterloo
Waterloo, Ontario
Waterloo is a city in Southern Ontario, Canada. It is the smallest of the three cities in the Regional Municipality of Waterloo, and is adjacent to the city of Kitchener....

, Ontario
Ontario
Ontario is a province of Canada, located in east-central Canada. It is Canada's most populous province and second largest in total area. It is home to the nation's most populous city, Toronto, and the nation's capital, Ottawa....

, Canada
Canada
Canada is a North American country consisting of ten provinces and three territories. Located in the northern part of the continent, it extends from the Atlantic Ocean in the east to the Pacific Ocean in the west, and northward into the Arctic Ocean...

 who work and do research in the field of cryptography
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...

.

The CACR aims to facilitate leading-edge cryptographic research, to educate students at postgraduate levels, to host conferences and research visits, and to partner with various industries. It was officially opened on June 19, 1998.

The CACR involves students and professors from four departments at the school: Combinatorics
Combinatorics
Combinatorics is a branch of mathematics concerning the study of finite or countable discrete structures. Aspects of combinatorics include counting the structures of a given kind and size , deciding when certain criteria can be met, and constructing and analyzing objects meeting the criteria ,...

 & Optimization
Optimization (mathematics)
In mathematics, computational science, or management science, mathematical optimization refers to the selection of a best element from some set of available alternatives....

, Computer Science
Computer science
Computer science or computing science is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems...

, Electrical and Computer Engineering, and Pure Math
Mathematics
Mathematics is the study of quantity, space, structure, and change. Mathematicians seek out patterns and formulate new conjectures. Mathematicians resolve the truth or falsity of conjectures by mathematical proofs, which are arguments sufficient to convince other mathematicians of their validity...

. It does not have a physical location, but utilizes resources from all the aforementioned departments.

The CACR plays a part in many conferences and workshops, including the following:
  • CACR Information Security Workshop
  • Privacy and Security Workshop
  • Workshop on Elliptic Curve Cryptography (ECC)
  • Workshop on Selected Areas in Cryptography
    Selected Areas in Cryptography
    Selected Areas in Cryptography is a series of international cryptography workshops held annually in Canada, every August since 1994. Through 1999, it was held at either Queen's University or Carleton University; the locations have varied more in recent years...

     (SAC)


The CACR includes the following notable faculty:
  • Scott Vanstone
    Scott Vanstone
    Scott A. Vanstone is a cryptographer who co-authored the Handbook of Applied Cryptography. He is currently on faculty at the University of Waterloo's Faculty of Mathematics and a member of the school's Centre for Applied Cryptographic Research. He is also the founder of Certicom. In 1998, he was...

    , professor, co-author of the Handbook of Applied Cryptography, founder of Certicom
  • Alfred Menezes
    Alfred Menezes
    Alfred Menezes is co-author of several books on cryptography, most notably the Handbook of Applied Cryptography.Menezes is a professor in the Department of Combinatorics & Optimization at the University of Waterloo. He is also the Managing Director of the Centre for Applied Cryptographic...

    , professor, co-author of the Handbook of Applied Cryptography
  • Neal Koblitz
    Neal Koblitz
    Neal I. Koblitz is a Professor of Mathematics at the University of Washington in the Department of Mathematics. He is also an adjunct professor with the Centre for Applied Cryptographic Research at the University of Waterloo. He is the creator of hyperelliptic curve cryptography and the...

    , adjunct professor, creator of elliptic curve cryptography
    Elliptic curve cryptography
    Elliptic curve cryptography is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz and Victor S...

     and hyperelliptic curve cryptography
    Hyperelliptic curve cryptography
    Hyperelliptic curve cryptography is similar to elliptic curve cryptography insofar as the Jacobian of a hyperelliptic curve is an Abelian group on which to do arithmetic, just as we use the group of points on an elliptic curve in ECC.-Definition:...

  • Doug Stinson
    Doug Stinson
    Douglas Robert Stinson is a Canadian mathematician and cryptographer, currently a professor at the University of Waterloo and a member of the Centre for Applied Cryptographic Research....

    , professor, author of Cryptography: Theory and Practice
  • Ian Goldberg
    Ian Goldberg
    Ian Avrum Goldberg is a cryptographer and cypherpunk. He is best known for breaking Netscape's implementation of SSL , and for his role as Chief Scientist of Radialpoint , a Canadian software company...

    , assistant professor, creator of Off-the-Record Messaging
    Off-the-record messaging
    Off-the-Record Messaging, commonly referred to as OTR, is a cryptographic protocol that provides strong encryption for instant messaging conversations. OTR uses a combination of the AES symmetric-key algorithm, the Diffie–Hellman key exchange, and the SHA-1 hash function...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK