ECE 646 Cryptography and Computer-Network Security
 

Project Presentations

Friday, December 18, 2015
4:30-10:25 PM

The Showcase Room at the base of the Observatory Tower (next to Research Hall)

Attendance in each session counts as one MSCpE/MSEE seminar credit

Results of the Contest for Best Project


Session I
Secure Payments


4:30 - 4:40

Welcome & Rules of the Contest for the Best Project


by Kris Gaj

4:40 - 4:55

Bitcoin - An Innovation


by Ravali Chennamneni and Rajitha Devabhaktuni

4:55 - 5:10
Securing Card-Not-Present Transactions through EMV Authentication

by Matthew Carter and Brienne Douglas
5:10 - 5:20
Refreshments

Session II
Cryptography in Hardware


5:20 - 5:35

High-Speed Implementation of Authenticated Ciphers Competing in the CAESAR Contest


by Abubakr Abdulgadir

5:35 - 5:50

Analysis and Pipelined Implementation of Selected Parallelizable CAESAR Candidates


by Sanjay Deshpande

5:50 - 6:05

Vivado HLS Implementation of Round-2 SHA-3 Candidates


by Farnoud Farahmand

6:05 - 6:15
Refreshments

Session III
Crypto Libraries


6:15 - 6:30

Analysis of the Intel AES-NI Extensions to the x86 Instruction Set


by Shawn Wilkinson

6:30 - 6:45

Overview and Comparison of Open Source Cryptographic Libraries


by Cong Chen and Yuqi Wang

6:45 - 7:00

Overview and Comparison of Open Crypto Libraries for Application Development


by Ravi Kota

7:00 - 7:20
Pizza Break

Session IV
Attacks against SSL and TLS


7:20 - 7:35
SSL/TLS: Vulnerabilities and Attacks

by Ernest Kushevski

7:35 - 7:50

Study of SSL/TLS Attacks


by Tejas Sontakke, Anamika Kesharwani, and Deepika Mallappa

7:50 - 8:05

A Comparison of Popular Open Source Libraries Implementing the SSL/TLS Protocols with Particular Focus on Compatibility, Security, and Performance


by Richard Joy

8:05 - 8:15
Refreshments

Session V
Quantum and Post-Quantum Cryptography


8:15 - 8:30

Implementation Vulnerabilities in Quantum Key Distribution


by Brian Maher

8:30 - 8:45

Parameters Optimization of Post-Quantum Cryptography Schemes


by Qing Chen

8:45 - 8:55
Refreshments

Session VI
Security of Special Networks


8:55 - 9:10

Security of Vehicle-to-Vehicle Communication Networks


by Krishna Nikhila Kalinga and Daniel May

9:10 - 9:25

Alice’s Jewelry Store-Educational Multi-media Presentation
on Fully Homomorphic Encryption
(+ video)


by Uday Kumar Vatti, Naga Navya Mingu, and Preethi Kondaprithviraj

9:25 - 9:40

Message Confidentiality in Enterprise Messaging Systems


by Michael Risher

9:40 - 9:50
Refreshments

Session VII
Hardware Security


9:50 - 10:05

All Programmable System on Chip Security


by Amit Singh

10:05 - 10:20

Anti-Counterfeiting of Integrated Circuits: RFID Tags as a Countermeasure


by Sathya Kanth Vardhanapu

10:20 - 10:25
Closing Remarks