Kris Gaj

Scholarly Papers

2008

Author Title

Defense Date

Ryon Sumner Implementation and Comparative Analysis of Selected Modern Hardware Architectures for Montgomery Multiplication (abstract)

Apr. 2008

2007

Author Title

Defense Date

Philip Hines Improvements to an Efficient Implementation of an Elliptic Curve Cryptosystem over a Binary Galois Field in the Polynomial Basis (report + slides) Jul. 2007
Chandana Anand Factoring of Large Numbers using Number Field Sieve - The Matrix Step (abstract) May 2007
Sanjay Puttaraju Open Cores Coding Guidelines and WISHBONE System-on-Chip (SoC) Interconnection Architecture (abstract) May 2007
Jeremy Nightingale Comparative Analysis of Java Cryptographic Libraries for Public Key Cryptography (abstract) Apr. 2007

2006

Author Title

Defense Date

Rajesh Ravi Analysis of Existing Implementations of S/MIME (abstract) Nov. 2006
Steven P. Hubbard VLSI Design Automation of a Montgomery Multiplier using Astro by Synopsys (abstract) Aug. 2006

2005

Author Title

Defense Date

William Thomson Cryptographic Hardware Security, Implementations and Protective Measures (abstract) Dec. 2005
Saadat A. Khan Standard Cell Based ASIC Library Development Flow (abstract) Dec. 2005
Mateo Mejia-Tellez Design and Implementation of Ternary Logic Circuits in CMOS Technology (abstract) Dec. 2005
Jamie Bernard Physical Level Design using Synopsys (abstract) Nov. 2005
Cory Ellinger VLSI Design Automation (abstract) Aug. 2005
Mehul Revankar Security Infrastructure Management Systems and Open Source Tools (abstract) Aug. 2005
Ranjeeta Patil Hardware-Software Co-design using Xilinx FPGAs (abstract) Aug. 2005
Pipat Songkaitisak Smart Card Security (abstract) May 2005
Nandakishore Sastry High-Level Synthesis: Languages, Tools, Methodologies and Case study on SRC- 6E reconfigurable computer (abstract) May 2005

2004

Author Title

Defense Date

Venkata Koonaparaju Implementation of Cryptographic algorithms using FPGAs and Network Processors (abstract) Dec. 2004
Kevin Magee Timing Cryptanalysis (abstract) Nov. 2004
Kuan-Hwa Yao The Development of Network Processor Technology (abstract) Sep. 2004

2003

Author Title Defense Date
Waheed Qureshi Past, Presence and Future of Public Key Infrastructure (PKI) (abstract) Dec. 2003
Devin Bayles Radiation Hardened Library Design: Challenges and Considerations (abstract) Dec. 2003
Shylaja Morisetty Security In Handheld Devices (abstract) Dec. 2003
Prathibha Kuppala Working of Transport Layer Security and Kerberos-V5 and how these are applied to Robust Security Network (RSN) (abstract) Dec. 2003
Poornima Sarvadevabhatla Reconfigurable Computing Tools (abstract) Dec. 2003
Rajesh Chintala Storage Area Networks, Their Architectures and Benefits (abstracts) Dec. 2003
Rama Donthireddy Analysis of Security Evaluation Methods with a Case Study on FIPS 140-2 Evaluation (abstract)
Varun Aggarwal Performance Evaluation of Secure Routing Protocol for Ad Hoc Networks (abstract) Aug. 2003
Lakshmi Gayathri Bayyavarapu Survey of Security Risks and Challenges in RFID Systems (abstract) Aug. 2003

2002

Author Title Defense Date
Himabindu Sajja AES ASIC to FPGA porting (abstract) Dec. 2002
Deepak Somesula Survey of Different Hardware Architectures for RSA (abstract) Dec. 2002
Nandgopal Cherukuru Routing Protocols for Ad Hoc Networks and their Security (abstract) Dec. 2002
Prakairat Moon Secure Ad Hoc Networks (abstract) Nov. 2002
Vasant Patel Next Generation IP Protocol (IPv6) (abstract) Aug. 2002
Paul E. LaFond Public Key Infrastructure: Past, Present, & Future May 2002
Viswanadham Sanku Emerging public key cryptosystems (ECC, NTRU, HFE) and their security (abstract) May 2002
Xiaofang F. Yuan Survey of PKI Used in the U.S. Federal Government (abstract) May 2002
Prem R. Vemuganti Security in Wireless Communications: IEEE 802.11 and Bluetooth (abstract) May 2002
Soonyong Sohn Analysis of Denial of Service Attack (abstract) Apr. 2002
Poonam Arora Overview of Digital Subscriber Line Technology (abstract) Apr. 2002
Tom Lash Power Analysis in Rijndael, the Advanced Encryption Standard (abstract) Feb. 2002

2001

Author Title Defense Date
Nguyen Nguyen Performance Comparison of Job Management Systems (abstract) Dec. 2001
Paul C. Rollins Intrusion Detection Communication Models (abstract) Apr. 2001

2000

Author Title Defense Date
Mike Viazanko The Emergence of Reconfigurable Digital Signal Processing in Field Programmable Gate Arrays (abstract) May 2000
Masoud Alghul Virtual Private Networks (abstract) Jan. 2000

1999

Author Title Defense Date
Frank E. Perry Hybrid SIMD/MIMD Parallel Computer Design (abstract) Dec. 1999
Suneela Racha Electronic Cash Schemes Dec. 1999