AN-1 |
Victor S. Andrei and Srinidhi Sreepad |
|
Analysis
of the Security of Proposed Internet Voting Systems |
AN-2 |
Vijay Ratnam, Aaron Hunter, and Cesar Corzo |
|
|
AN-3 |
Yuchen Cao |
|
|
AN-5 | Sowmya Shetty and Alem Abreha |
Erasure coding and AONT algorithm selection for Secure Distributed Storage | |
AN-8 | Anurag Kamat Haldonker and Jeremy Barthélemy |
Encryption Schemes for Copy Protection of Digital Media |
HW-1 |
Michael Val |
|
SipHash:
Hardware Implementations Using Low-Cost Xilinx, Lattice,
and Actel FPGAs |
HW-2 |
Anne-Marie Cressin |
|
Implementation
and Comparison of OCB-AES128 and GCM-AES128 Using
Xilinx FPGAs |
HW-3 |
Yamini Ravishankar |
|
SW-1 |
Snehil Suresh Wakchaure
and Simrit Kaur Arora |
|
|
SW-3 |
Stacie Reynolds
|
Porting
and Optimizing C Implementations of Keccak SHA-3
Algorithm to the TI MSP430 |
OWN-1 |
Muneeb Akhter |
|
|
OWN-2 |
Tunde Falade and Shegaw Alemu |
|
Security of
Transactions Performed Using Credit Card Readers for
Smartphones and Tablets |