ECE 646 Cryptography and Computer-Network Security
 

Project Presentations

Friday, December 6, 2019
6:00-9:30 PM

The Showcase Room at the base of the Observatory Tower (next to Research Hall)

Results of the Contest for the Best Project


Session I

Analysis of Cryptographic Libraries and Standalone Implementations



6:00 - 6:05 PM

Welcome & Rules of the Contest for the Best Project


by Kris Gaj

6:05 - 6:25 PM

Overview and Comparison of Open Source Cryptographic Libraries (including 5-minute demo)


by Hung Mao Chen, Jun Wang, and Pengbo Xu

6:25 - 6:40 PM
Testing Post-Quantum Cryptographic Implementations for Constant-Time Execution

by Joshua Koyeerath and Dixin Sun
6:40 - 6:55 PM
Side-Channel Attacks and Countermeasures for Post-Quantum Cryptography

by Ayodeji Raymond
6:55 - 7:20 PM
Pizza Break

Session II

Efficient, Side-Channel-Protected, and Obfuscated Implementations in Hardware



7:20 - 7:35 PM

Hardware Implementation of ISAP - a Round 2 Candidate in the NIST Lightweight Cryptography Standardization Process


by Thang Dinh

7:35 - 7:50 PM

Threshold Implementation of NIST Lightweight Cryptography Standard Candidate TinyJAMBU to be Resistant Against Side-Channel Attacks


by Sammy Lin

7:50 - 8:05 PM

The Fully Hardware Implementation of Picnic Signature Scheme


by Javad Bahrami and Banafsheh Saber Latibari

8:05 - 8:20 PM

Security Analysis of Logic Locking using Asynchronous Circuits


by Hadi Mardani Kamali

8:20 - 8:40 PM
Refreshments

Session III

Security of Electronic Voting, Cryptocurrencies, and Smart Cars



8:40 - 8:55 PM

Reliability, Security of Voting Systems and an Approach: E-Smart Voting System


by Sai Vamsi Krishna Bondada, Akhil Sai Maarisetty, and Surya Prakash

8:55 - 9:10 PM

Security Analysis of Blockchain


by Kanan Patel

9:10 - 9:25 PM

Secure Vehicular Communication using ECDH Cryptosystem


by Srivatsa Niranjan Raju, Samanth Nag Jammula, and Saurabh Ravindra Rakibe

9:25 - 9:30 PM
Closing Remarks