Position |
Team |
Topic |
Average score |
Award |
I | Shawn Wilikinson |
Analysis of the Intel AES-NI Extensions to the x86 Instruction Set |
8.50 |
5 points |
II | Farnoud Farahmand | Vivado HLS Implementation of Round-2 SHA-3 Candidates |
8.29 |
3 points |
III | Sanjay Deshpande |
Analysis and Pipelined Implementation of Selected Parallelizable CAESAR Candidates |
8.22 |
1 point |
Position |
Team |
Topic |
Average score |
Award |
I | Shawn Wilikinson | Analysis of the Intel AES-NI Extensions to the x86 Instruction Set |
8.79 |
5 points |
II | Matthew Carter and Brienne Douglas |
Securing Card-Not-Present Transactions through EMV Authentication |
8.50 |
3 points |
III | Richard Joy | A Comparison of Popular Open Source Libraries Implementing the SSL/TLS Protocols with Particular Focus on Compatibility, Security, and Performance |
8.22 |
1 point |
Congratulations to the winners!
Thanks to everybody for sharing your
discoveries and experiences
with all of us!