ECE 646 Cryptography and Computer-Network Security
 

Project Presentations

Tuesday, December 9, 2014
4:30-10:00 PM

The Showcase Room at the base of the Observatory Tower (next to Research Hall)

Results of the Contest for the Best Project


Session I
Cryptocurrencies and Future of Electronic Payments


4:30 - 4:40

Welcome & Rules of the Contest for the Best Project


by Kris Gaj

4:40 - 4:55

Security Analysis of Bitcoin


by Yashwanth Gazula, Jaswant Katragadda, Dibyojyoti
Mukherjee

4:55 - 5:10

Mobile Payment System Security


by Raghunath Pasumarthi

5:10 - 5:25
Security of Contactless Cards

by Rajiv Gautham Champati and Ashritha Rasa
5:25 - 5:40
Refreshments

Session II
Cryptography in Hardware


5:40 - 5:55

Implementation and Analysis of the PRIMATEs Family of Authenticated Ciphers


by Ahmed Ferozpuri

5:55 - 6:10

Hardware Implementation of SCREAM Authenticated Cipher and Analysis of Resistance to Side Channel Attacks


by William Diehl

6:10 - 6:25

High-­Level Synthesis of Cryptographic Hardware


by Jeremy Trimble

6:25 - 6:40
FPGA Implementation of an Error Correcting Code for Physical Unclonable Functions

by Brian Jarvis
6:40 - 7:00
Refreshments

Session III
Steganography & Codebreaking


7:00 - 7:15

Using Facebook as a Carrier for Image Steganography


by Tejas Dakve and Jason Hiney

7:15 - 7:30

VoIP Steganography


by Sai Praveen Sadhu

7:30 - 7:45
Survey of Codebreaking Machines

by Swathi Guruduth, Vivekanand Kamanuri, Harshad Patil
7:45 - 8:00
Refreshments

Session IV
Security Protocols


8:00 - 8:15

Implementation and Simulation of SSL in Windows Presentation Foundation


by Vikram Gawade and Harsh Vachharajani

8:15 - 8:30

Back Doors in SSL/TLS


by Jaya Surya Dondapati, Akshay Reddy Veerayyagari, and Avinash Yeluri

8:30 - 8:45

Messaging Service Security


by Shiting Pan and Sicheng Peng

8:45 - 9:00
Secure E-mail Client for Mobile Devices

by Ekta Binwani, Akhil Kumar, and Jatin Virmani
9:00 - 9:15
Refreshments

Session V
Security of Cloud Storage and Cloud Computing


9:15 - 9:30

Analyzing the Security Schemes of Various Cloud Storage Services


by Gagandeep Singh Bamrah and Ankita Pandey

9:30 - 9:45

Security of Cloud Storage and Cloud Computing


by Giri-Praneeth Kommalapati and Venkat Raman Sriperumbudur

9:45 - 10:00
Analysis of Different Fully Homomorphic Encryption Schemes

by Vincent Dasari, Arun Bhargav Palaparthy, Kalyan Peddinti
10:00
Closing Remarks