ECE 646 Cryptography and Computer-Network Security
 

Project Presentations

Tuesday, December 5, 2017
5:00-10:00 PM

The Showcase Room at the base of the Observatory Tower (next to Research Hall)

Results of the Contest for the Best Project


Session I

Hardware Security & Benchmarking of Cryptographic Algorithms Using Microcontrollers



5:00 - 5:10

Welcome & Rules of the Contest for the Best Project


by Kris Gaj

5:10 - 5:25

Threats to Integrated Circuits: Attacks, Vulnerabilities, and Counterfeiting


by Stephanie Brockway

5:25 - 5:40
Benchmarking Lightweight Cryptographic Algorithms Using the XXBX Platform

by Jay Raval, Snehal Patil, and Vatsal Shukla
5:40 - 5:55
Extension of the XXBX Platform to Support an ARM M4 Microcontroller with AES Cryptographic Module

by Raghurama Velagala
5:55 - 6:05
Refreshments

Session II

Implementations of Cryptography Using High-Level Synthesis and Domain Specific Languages



6:05 - 6:20

Implementation of the ASCON-128 Authenticated Cipher in Cryptol


by Niklas Kochdumper

6:20 - 6:35

Benchmarking of Round 3 SHA-3 Candidates Using Academic HLS Tools


by Marzuq Rahman

6:35 - 6:50

OTR Quantum Cryptographic Messaging App


by Tri Le

6:50 - 7:15
Pizza Break

Session III

Analysis and Visualization of Quantum Algorithms and Post-Quantum Cryptography



7:15 - 7:30

Quantum Computing


by Sattyik Kundu

7:30 - 7:45

Analysis and Comparison of Lattice-based Post-Quantum Cryptographic Algorithms


by Nithin Chandra Nadendla

7:45 - 8:00

Illustrated Execution for Understanding Post-Quantum Cryptographic Algorithms


by Ben Carroll and Christopher White

8:00 - 8:15
Refreshments

Session IV

Post-Quantum Cryptography in Software and Hardware



8:15 - 8:30

Software Optimization of DAGS: Key Encapsulation from GS Codes


by Richard Haeussler and Duc Tri Nguyen

8:30 - 8:45

Hardware Implementation of the Code-based Key Encapsulation Mechanism DAGS


by Viet Ba Dang

8:45 - 9:00

Hardware Implementation of the Post-Quantum Key Exchange Algorithm - The NewHope on FPGAs


by Chaitanya Neelamraju

9:00 - 9:15
Refreshments

Session V

Secure Protocols & Their Implementation in Software


9:15 - 9:30

Comparison of SSL/TLS Libraries


by Akshay Thorat

9:30 - 9:45

Attacks on SSL/TLS Protocols


by Siva Shashank Chintapenta and Aishwarya Vadlamani

9:45 - 10:00

Security of Vehicle-to-Vehicle (V2V) Networks Using DSRC Protocol


by Santos Jha

10:00
Closing Remarks