Presentation Schedule and Deadlines
Date | Topic 1 | Topic 2 | Due |
---|---|---|---|
01/26/12 | Introduction | Research Topics | |
02/02/12 | Differential Power Analysis | Physical Unclonable Functions (Bilal) | Project Proposal |
02/09/12 | Literature Search Results | Usage of Embedded Resources for Cryptograohic Implememntations (Umar) | Literature Search |
02/16/12 | Secure Hash Function Candidates for SHA-3. Meeting with NIST. | ||
02/23/12 | Pairing Based Cryptosystems (Rabia) | Hash Functions on Embedded Systems (John) | Revised Literature Search |
03/01/12 | Cache Attacks (Mahidhar) | General Number Field Sieve(Robert) | Research Matrix |
03/15/12 | Homomorphic Encryption (David) | Research Matrix Presentations | Revised Research Matrix |
03/08/12 | Spring Break | ||
03/21/12 | Research Matrix Presentations | RFID Security(Changha) | |
03/29/12 | Midterm | ||
04/05/12 | Research Matrix Presentations | Research Idea Discussions | Research Ideas |
04/12/12 | (Bilal) | Open Problems Discussion | Previous Work |
04/19/12 | (Rabia) | Research Approach Discussion | Motivation |
04/26/12 | (Robert) | Research Approach | |
05/03/12 | Report Writing |
||
05/10/12 | (Umar)(Changa) | (John)(Mahidhar) | Final Report |