Tuesday,
December 5, 2017
5:00-10:00 PM
The Showcase Room at the base of the Observatory Tower (next to Research Hall)
Results of the Contest for the Best Project
5:00 - 5:10 |
Welcome & Rules of the Contest for the Best Project |
|
by Kris Gaj |
5:10 - 5:25 |
Threats to Integrated Circuits: Attacks, Vulnerabilities, and Counterfeiting |
|
by Stephanie Brockway |
5:25 - 5:40 |
Benchmarking Lightweight Cryptographic Algorithms Using the XXBX Platform |
by Jay Raval, Snehal Patil, and Vatsal Shukla | |
5:40 - 5:55 |
Extension of the XXBX Platform to Support an ARM M4 Microcontroller with AES Cryptographic Module |
by Raghurama Velagala | |
5:55 - 6:05 |
Refreshments |
6:05 - 6:20 |
Implementation of the ASCON-128 Authenticated Cipher in Cryptol |
|
by Niklas Kochdumper |
6:20 - 6:35 |
Benchmarking of Round 3 SHA-3 Candidates Using Academic HLS Tools |
|
by Marzuq Rahman |
6:35 - 6:50 |
OTR Quantum Cryptographic Messaging App |
|
by Tri Le |
6:50 - 7:15 |
Pizza Break |
7:15 - 7:30 |
Quantum Computing |
|
by Sattyik Kundu |
7:30 - 7:45 |
Analysis and Comparison of Lattice-based Post-Quantum Cryptographic Algorithms |
|
by Nithin Chandra Nadendla |
7:45 - 8:00 |
Illustrated Execution for Understanding Post-Quantum Cryptographic Algorithms |
|
by Ben Carroll and Christopher White |
8:00 - 8:15 |
Refreshments |
8:15 - 8:30 |
Software Optimization of DAGS:
Key Encapsulation from GS Codes |
by Richard Haeussler and Duc Tri Nguyen | |
8:30 - 8:45 |
Hardware Implementation of the Code-based Key Encapsulation Mechanism DAGS |
|
by Viet Ba Dang |
8:45 - 9:00 |
Hardware Implementation of the Post-Quantum Key Exchange Algorithm - The NewHope on FPGAs |
|
by Chaitanya Neelamraju |
9:00 - 9:15 |
Refreshments |
9:15 - 9:30 |
Comparison of SSL/TLS Libraries |
|
by Akshay Thorat |
9:30 - 9:45 |
Attacks on SSL/TLS Protocols |
|
by Siva Shashank Chintapenta and Aishwarya
Vadlamani |
9:45 - 10:00 |
Security of Vehicle-to-Vehicle (V2V) Networks Using DSRC Protocol |
|
by Santos Jha |
10:00 |
Closing Remarks |