Friday,
December
18, 2015
4:30-10:25 PM
The
Showcase Room at the base of the Observatory Tower (next to
Research Hall)
Attendance
in each session counts as one MSCpE/MSEE seminar credit
Results of the Contest for Best
Project
4:30 - 4:40 |
|
|
by Kris Gaj |
4:40 - 4:55 |
|
|
by Ravali Chennamneni and Rajitha Devabhaktuni |
4:55 - 5:10 |
Securing Card-Not-Present Transactions through EMV Authentication |
by Matthew Carter and Brienne Douglas |
|
5:10 - 5:20 |
Refreshments |
5:20 - 5:35 |
High-Speed
Implementation of Authenticated Ciphers Competing in
the CAESAR Contest |
|
by Abubakr Abdulgadir |
5:35 - 5:50 |
Analysis and Pipelined Implementation of Selected Parallelizable CAESAR Candidates |
|
by Sanjay Deshpande |
5:50 - 6:05 |
|
|
by Farnoud Farahmand |
6:05 - 6:15 |
Refreshments |
6:15 - 6:30 |
Analysis
of the Intel AES-NI Extensions to the x86
Instruction Set |
|
by Shawn Wilkinson |
6:30 - 6:45 |
Overview and Comparison of Open Source Cryptographic Libraries |
|
by Cong Chen and Yuqi Wang |
6:45 - 7:00 |
Overview and Comparison of Open Crypto Libraries for Application Development |
|
by Ravi Kota |
7:00 - 7:20 |
Pizza Break |
7:20 - 7:35 |
SSL/TLS:
Vulnerabilities and Attacks |
by Ernest Kushevski |
|
7:35 - 7:50 |
|
|
by Tejas Sontakke, Anamika Kesharwani,
and Deepika Mallappa |
7:50 - 8:05 |
|
|
by Richard Joy |
8:05 - 8:15 |
Refreshments |
8:15 - 8:30 |
|
|
by Brian Maher |
8:30 - 8:45 |
Parameters Optimization of Post-Quantum Cryptography Schemes |
|
by Qing Chen |
8:45 - 8:55 |
Refreshments |
8:55 - 9:10 |
|
|
by Krishna Nikhila Kalinga and Daniel
May |
9:10 - 9:25 |
Alice’s
Jewelry Store-Educational Multi-media Presentation |
|
by Uday Kumar Vatti, Naga Navya Mingu,
and Preethi Kondaprithviraj |
9:25 - 9:40 |
|
|
by Michael Risher |
9:40 - 9:50 |
Refreshments |
9:50 - 10:05 |
|
|
by Amit Singh |
10:05 - 10:20 |
Anti-Counterfeiting of Integrated Circuits: RFID Tags as a Countermeasure |
|
by Sathya Kanth Vardhanapu |
10:20 - 10:25 |
Closing Remarks |