The Creation of a New Cryptographic Protocol

At the point of inception, our new cryptographic protocol was designed with an information theoretic secure algorithm which also included indistinguishability obfuscation. During our initial design an internal function z=y4 was used. For convenience we referred to this term as ZY4 and subsequently named our protocol after the term. Given the obvious similarity ZY4 has with the word "cipher", we pronounce our protocol "sigh-four."

Join the Team

Enjoy crumpets and cryptography? We are hiring in Vancouver and Toronto—get in touch.