Cryptography II Term Papers
VCSG-706, Spring 2012
Choosing a Topic
In general, I prefer more algorithm and cryptography oriented
focus, but security topics (with significant cryptography component)
are also fine.
First step, due April 4 (Wed)
You may still have doubts what to do, but you have to complete
the steps below. You can work with somebody else in pair.
- make a clickable title of your proposed term paper
- write and post the abstract of your paper in simple html
- send me email including author name(s) and URL
Second step, April 18 (Wed)
All students have fixed subjects of their term papers.
Include in the paper website the main sources and references
used in your project. We will review in class all proposed
topics, suggest modifications and possible team work.
Third step, due May 18 (Fri)
Formatted hardcopy of the papers, presentation slides and
accompanying documents have to be posted on the web in pdf.
Fourth step, due May 23 (Wed)
Send to spr@cs.rit.edu reviews of 3 projects of your choice.
Please, send the reviews in 3 separate email messages in plain text
(not as an attachment, not encrypted), containing only the review.
The subject line of the message must have the form
i.1-j or i.2-j, where i is your (team) index,
j is the index of the project you are reviewing,
and you are the first or second author (1 or 2) of i.
For example, the subject line of the message from the second
author of (#4) commenting on the paper by (#6)
should have the subject "4.2-6". I will concatenate all reviews
(without mail headers, not in index order) and send them to
the authors of the papers.
Subjects/presentations/papers from spring 2012
-
Richard Ballard,
Performance of the Skein Hash Function, 5/16
-
Muhannad Darnasser,
Ciphertext-Policy Attribute-Based Encryption, 5/2
-
Christopher Hoffman,
WEP Vulnerabilities, 5/9
-
Sara Jackson,
Homomorphic Encryption, 5/7
-
Jonathan Johnson,
Creation and Detection of Image-Based Steganography
-
James Loomis,
Parallel AES Implemented Using Graphics Hardware, 5/16
-
Russ Martin,
Secret Sharing Schemes, 5/14
-
Kevin Meritt,
Differential Power Analysis attacks on AES, 5/16
-
Valeriy Skobelev,
Shor's Algorithm, 5/16
-
David Stalnaker,
AKS Primality Test
-
Michael Thomsen,
Linear Feedback Shift Registers, Galois Fields, and Stream Ciphers, 5/14
-
Christopher Wood, Optimizing Diffusion and Confusion
in Cryptographic Primitives, 5/9
-
-
Stanislaw Radziszowski, instructor,
Hashing slides
and links
List of papers and presentations from the Spring 2011 quarter
List of papers and presentations from the Spring 2010 quarter
List of papers and presentations from the Spring 2009 quarter
Back to
Cryptography II course page