Friday,
December 7, 2018
5:00-9:45 PM
The Showcase Room at the base of the Observatory Tower (next to Research Hall)
Results of the Contest for the Best Project
5:00 - 5:10 |
Welcome & Rules of the Contest for the Best Project (slides) |
|
by Kris Gaj |
5:10 - 5:25 |
Quantum Computers and Their Application to Breaking Ciphers (slides, report) |
|
by Huajun Zhang |
5:25 - 5:40 |
Feasibility and Performance of Quantum Resistant Cryptography in Embedded Devices (slides, report) |
by Brian Hession | |
5:40 - 5:55 |
Side-Channel Attacks and Countermeasures for Post-Quantum Cryptography (slides, report) |
by Fatemeh Gholizadeh | |
5:55 - 6:10 |
Refreshments |
6:10 - 6:25 |
Adapting and Extending Selected Open-Source Hardware Implementations of Post-Quantum Cryptography Algorithms with Support for the CERG Hardware API (slides, report) |
|
by Alexander Olihovik |
6:25 - 6:40 |
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES (slides, report) |
|
by Kevin Briggs |
6:40 - 6:55 |
Hardware Implementation of Q-decoding Algorithm in LEDAkem Encapsulation Mechanism (slides, report) |
|
by Bao Bui |
6:55 - 7:40 |
Pizza Break |
7:40 - 7:55 |
Ether and Applications of the Ethereum Blockchains Beyond Cryptocurrencies (slides, report) |
|
by Roshitha Vallurupalli, Anudeep Reddy Timmapuram, and Ahlad Challa |
7:55 - 8:10 |
Blocklist: A Technique Against Large Scale DDoS Attacks in IoT Using Blockchain (slides, report) |
|
by Long Jiao and Surya Ulaganathan |
8:10 - 8:25 |
A Technical Analysis of WannaCry (slides, report) |
|
by Waleed Alraddadi and Harshini Sarvotham |
8:25 - 8:40 |
Refreshments |
8:40 - 8:55 |
Challenges of Implementing and Managing PKI (slides, report) |
by Arun Paul | |
8:55 - 9:10 |
Security of Vehicle-to-Vehicle (V2V) Communication Networks (slides, report) |
|
by Yara Alkhalifah |
9:10 - 9:25 |
Software Implementation of Sensitization Attacks on Obfuscated Circuits (slides, report) |
|
by John McLaughlin |
9:25 - 9:40 |
|
|
by Clair Guthrie |
9:40 - 9:45 |
Closing Remarks |