ECE 646 Cryptography and Computer-Network Security
 

Project Presentations

Friday, December 7, 2018
5:00-9:45 PM

The Showcase Room at the base of the Observatory Tower (next to Research Hall)


Session I

Quantum Computing and Post-Quantum Cryptography I



5:00 - 5:10

Welcome & Rules of the Contest for the Best Project


by Kris Gaj

5:10 - 5:25

Quantum Computers and Their Application to Breaking Ciphers


by Huajun Zhang

5:25 - 5:40
Feasibility and Performance of Quantum Resistant Cryptography for the IoT

by Brian Hession
5:40 - 5:55
Side-Channel Attacks and Countermeasures for Post-Quantum Cryptography

by Fatemeh Gholizadeh
5:55 - 6:10
Refreshments

Session II

Post-Quantum Cryptography II



6:10 - 6:25

Adapting and Extending Selected Open-Source Hardware Implementations of Post-Quantum Cryptography Algorithms with Support for the CERG Hardware API


by Alexander Olihovik

6:25 - 6:40

A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES


by Kevin Briggs

6:40 - 6:55

Implementation of the NIST Round 1 Post-Quantum Cryptography candidate LEDAkem in Hardware


by Bao Bui

6:55 - 7:10

StrongStar: An FPGA Implementation of Kyber


by Kamyar Mohajerani

7:10 - 7:40
Pizza Break

Session III

Blockchains and Malware



7:40 - 7:55

Ether and Applications of the Ethereum Blockchains Beyond Cryptocurrencies


by Roshitha Vallurupalli, Anudeep Reddy Timmapuram, and Ahlad Challa

7:55 - 8:10

Blocklist: A Technique Against Large Scale DDoS Attacks in IoT Using Blockchain


by Long Jiao and Surya Ulaganathan

8:10 - 8:25

A Comprehensive Analysis of WannaCry: Reverse Engineering, Technical Analysis, and Motivation


by Waleed Alraddadi and Harshini Sarvotham

8:25 - 8:40
Refreshments

Session IV

Cryptography, Obfuscation, and Steganography



8:40 - 8:55

Challenges of Implementing and Managing Public Key Infrastructure for Large Computer Networks


by Arun Paul

8:55 - 9:10

Security of Vehicle-to-Vehicle (V2V) Communication Networks


by Yara Alkhalifah

9:10 - 9:25

Efficacy of Sensitization Attacks on Obfuscated Circuits


by John McLaughlin

9:25 - 9:40

Understanding Image/Video Steganography


by Clair Guthrie

9:40 - 9:45
Closing Remarks