Cryptography II Term Papers
VCSG-706, Spring 2012

Choosing a Topic

In general, I prefer more algorithm and cryptography oriented focus, but security topics (with significant cryptography component) are also fine.


First step, due April 4 (Wed)

You may still have doubts what to do, but you have to complete the steps below. You can work with somebody else in pair.


Second step, April 18 (Wed)

All students have fixed subjects of their term papers. Include in the paper website the main sources and references used in your project. We will review in class all proposed topics, suggest modifications and possible team work.


Third step, due May 18 (Fri)

Formatted hardcopy of the papers, presentation slides and accompanying documents have to be posted on the web in pdf.


Fourth step, due May 23 (Wed)

Send to spr@cs.rit.edu reviews of 3 projects of your choice. Please, send the reviews in 3 separate email messages in plain text (not as an attachment, not encrypted), containing only the review. The subject line of the message must have the form i.1-j or i.2-j, where i is your (team) index, j is the index of the project you are reviewing, and you are the first or second author (1 or 2) of i. For example, the subject line of the message from the second author of (#4) commenting on the paper by (#6) should have the subject "4.2-6". I will concatenate all reviews (without mail headers, not in index order) and send them to the authors of the papers.


Subjects/presentations/papers from spring 2012

  1. Richard Ballard, Performance of the Skein Hash Function, 5/16
  2. Muhannad Darnasser, Ciphertext-Policy Attribute-Based Encryption, 5/2
  3. Christopher Hoffman, WEP Vulnerabilities, 5/9
  4. Sara Jackson, Homomorphic Encryption, 5/7
  5. Jonathan Johnson, Creation and Detection of Image-Based Steganography
  6. James Loomis, Parallel AES Implemented Using Graphics Hardware, 5/16
  7. Russ Martin, Secret Sharing Schemes, 5/14
  8. Kevin Meritt, Differential Power Analysis attacks on AES, 5/16
  9. Valeriy Skobelev, Shor's Algorithm, 5/16
  10. David Stalnaker, AKS Primality Test
  11. Michael Thomsen, Linear Feedback Shift Registers, Galois Fields, and Stream Ciphers, 5/14
  12. Christopher Wood, Optimizing Diffusion and Confusion in Cryptographic Primitives, 5/9
  13. Stanislaw Radziszowski, instructor, Hashing slides and links


List of papers and presentations from the Spring 2011 quarter
List of papers and presentations from the Spring 2010 quarter
List of papers and presentations from the Spring 2009 quarter

Back to Cryptography II course page