ECE 646 Cryptography and Computer-Network Security
 

Project Presentations

Wednesday, December 8, 2010
7:20-11:00 PM

The Engineering Building, Room 3507

Results of the Contest for the Best Project


Session I
Low-Area Implementations of SHA-3 Candidates


7:20 - 7:25

Kris Gaj


Welcome & Rules of the Contest for the Best Project

7:25 - 7:40

Bilal Habib


Low-Area Implementations of CubeHash and Skein

7:40 - 7:55

Kishore Kumar Surapathi


Low-Area Implementations of Groestl, Luffa, BMW, and SHAvite-3

7:55 - 8:10 Smriti Gurung
Low-Area Implementations of Keccak
8:10 - 8:25 Susheel Vadlamudi
Low-Area Implementations of Blake
8:25 - 8:40 Refreshments

Session II
Implementations of SHA-3 Candidates in FPGAs, ASICs, and Microcontrollers


8:40 - 8:55

Ambarish Vyas


Generic Padding Circuit for 14 SHA-3 Round 2 Candidates

8:55 - 9:10

Rabia Shahid and Malik Umar Sharif


Use of Embedded FPGA Resources in Implementations of SHA-3 Candidates

9:10 - 9:25

Mahmoud El Ali


ASIC Implementation of Skein

9:25 – 9:40

John Pham

Low-Area Implementation of JH.
Porting of Skein, BMW, Shabal, and BLAKE to MSP430.
9:40 - 9:50 Refreshments

Session III
Attacks against Cryptosystems, Protocols, and Implementations


 9:50 - 10:05

David Petty


Attacks on Cryptographic Systems using FPGAs, GPUs, and Cell Processors

10:05 - 10:20

Kinjal Shah


Glitch Detection and Reduction for Secure Circuits

10:20 - 10:35

Zhuo Xu


Security of GSM and 3G/4G Telephony

10:35 - 10:50

Scott Pugmire


Encryption Schemes for Copy Protection of Digital Media

10:50 - 10:55

Kris Gaj

Closing Remarks