ECE 646 Cryptography and Computer-Network Security
 

Project Presentations

Friday, December 7, 2018
5:00-9:45 PM

The Showcase Room at the base of the Observatory Tower (next to Research Hall)

Results of the Contest for the Best Project


Session I

Quantum Computing and Post-Quantum Cryptography I



5:00 - 5:10

Welcome & Rules of the Contest for the Best Project (slides)


by Kris Gaj

5:10 - 5:25

Quantum Computers and Their Application to Breaking Ciphers (slides, report)


by Huajun Zhang

5:25 - 5:40
Feasibility and Performance of Quantum Resistant Cryptography in Embedded Devices (slides, report)

by Brian Hession
5:40 - 5:55
Side-Channel Attacks and Countermeasures for Post-Quantum Cryptography (slides, report)

by Fatemeh Gholizadeh
5:55 - 6:10
Refreshments

Session II

Post-Quantum Cryptography II



6:10 - 6:25

Adapting and Extending Selected Open-Source Hardware Implementations of Post-Quantum Cryptography Algorithms with Support for the CERG Hardware API (slides, report)


by Alexander Olihovik

6:25 - 6:40

A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES (slides, report)


by Kevin Briggs

6:40 - 6:55

Hardware Implementation of Q-decoding Algorithm in LEDAkem Encapsulation Mechanism (slides, report)


by Bao Bui

6:55 - 7:40
Pizza Break

Session III

Blockchains and Malware



7:40 - 7:55

Ether and Applications of the Ethereum Blockchains Beyond Cryptocurrencies (slides, report)


by Roshitha Vallurupalli, Anudeep Reddy Timmapuram, and Ahlad Challa

7:55 - 8:10

Blocklist: A Technique Against Large Scale DDoS Attacks in IoT Using Blockchain (slides, report)


by Long Jiao and Surya Ulaganathan

8:10 - 8:25

A Technical Analysis of WannaCry (slides, report)


by Waleed Alraddadi and Harshini Sarvotham

8:25 - 8:40
Refreshments

Session IV

Cryptography, Obfuscation, and Steganography



8:40 - 8:55

Challenges of Implementing and Managing PKI (slides, report)


by Arun Paul

8:55 - 9:10

Security of Vehicle-to-Vehicle (V2V) Communication Networks (slides, report)


by Yara Alkhalifah

9:10 - 9:25

Software Implementation of Sensitization Attacks on Obfuscated Circuits (slides, report)


by John McLaughlin

9:25 - 9:40

Understanding Image/Video Steganography (slides, report)


by Clair Guthrie

9:40 - 9:45
Closing Remarks