Theses and Projects
Master's theses are available from the
Wallace Library at RIT,
from the Grad Library in the CS department, or for a quick look in my office.
Many master's project final reports (unfortunately not all) are available
from the Grad Library in the CS department, from the author's homepage,
or in my office.
Many of the theses and project reports are available from the
RIT Digital Media Library.
Ph.D. Committee Member

Jan Goedgebeur, May 2013
Generation Algorithms for Mathematical and Chemical Problems
Department of Applied Mathematics and Computer Science, Ghent, Belgium

Andrew Lin, December 2011
Solving Hard Problems in Election Systems
GCCIS, Rochester Institute of Technology

Rahul Tripathi, April 2005
Complexity of Concrete Problems and Test Languages
Department of Computer Science, University of Rochester

Alina Beygelzimer, April 2003
Probabilistic Property Testing
Department of Computer Science, University of Rochester

Zhou Guofei, June 1999
Tournaments of Order n<=9 and Their Applications
Nanjing University, China

Pau Bofill, June 1997
Optimizing Neural Networks for the Generation of Block Designs
Universidad Politecnica de Catalunya, Barcelona, Spain

Harry Gross, August 1996
An Image Fusion Algorithm for Spatially Enhancing Spectral Mixture Maps
Center for Imaging Science, Rochester Institute of Technology

Konrad Piwakowski, June 1996
Zastosowanie metod algorytmicznych w znajdowaniu dolnych i gornych oszacowan liczb Ramseya
[Algorithmic methods in the quest for lower and upper bounds for Ramsey numbers]
Department of Foundations of Informatics, Technical University of Gdansk, Poland
Master's Thesis Committee Chair

Christopher Wood, August 2013
Large Substitution Boxes with Efficient Combinational Implementations

Russell Martin, August 2013
cochaired with Prof. Marcin Lukowiak, Department of Computer Engineering
Group Selection and Key Management Strategies for
CiphertextPolicy AttributeBased Encryption

Alexander Lange, June 2013
Solving Hard Graph Problems with
Combinatorial Computing and Optimization

Mark Rodzinka, September 2012
CrossEnterprise Access Control Security for Electronic Health Records:
Technical, Practical and Legislation Impact

Liliya Andreicheva, June 2011
Security of the SHA3 candidate functions Keccak and
Blue Midnight Wish, and Zerosum Distinguishers

Joel Lathrop, May 2009
Cube Attacks on Cryptographic Hash Functions

Peter Wozny, August 2008
Elliptic Curve Cryptography: Generation and Validation
of Domain Parameters in Binary Galois Fields

Suresh Sundriyal, January 2008
Counting Points on Elliptic Curves over Z_{p}

Tigin Kaptanoglu, March 2007
Performance Evaluation of eXtended Sparse Linearization in GF(2) and GF(2^8)

Laura Beth Lincoln, March 2006
On Achieving Symmetric Private Information Retrieval
via Additive Homomorphic Probabilistic Encryption

Jonathan Coles, March 2005
Algorithms for Bounding Folkman Numbers

Kevin Ligozio, November 2004
Jini Distributed Key Exchange and File Transfer Service with Digital Signatures

Joshua Stinehour, April 2004
R(W5,K5) = 27

Robert Getschmann, July 2001
Enumeration of Small TriangleFree Ramsey Graphs

Susan E. Fettes, January 2001
On the Classical Ramsey Number R(3,3,3,3)

Keath Chen, June 2000
Improvement of Reconciliation for Quantum Key Distribution

Andrew Radin, May 2000
Graph Coloring Heuristics from Investigation of Smallest Hard to Color Graphs

Christopher Martin, May 2000
Digital Image Watermarking Techniques

Alina Beygelzimer, August 1999
Combinatorial Computing Approach to Selected Extremal Problems in Geometry

Molli Noland, May 1999
Interactive and ZeroKnowledge Proofs

Sashka T. Davis, December 1998
HuTucker Algorithm for Building Optimal Alphabetic Binary Search Trees

Alec Berenbaum, December 1998
Experimental Study of Performance of Minimum Spanning Tree Algorithms

Kirk Ocke, December 1997
Factoring Integers Defined by Second and Third Order Recurrence Relations
adviced jointly with Prof. Peter Anderson

Vladimir Kolesnikov, September 1997
Multidimensional Subset Sum Problem

Shardul Rao, August 1997
Applying a Genetic Algorithm to Improve the Lower Bounds of MultiColor Ramsey Numbers
adviced jointly with Prof. Peter Anderson

Xia Jin, August 1993
Ramsey Numbers Involving a Triangle: Theory and Algorithms

Jing Zhou, March 1992
Computational Techniques in Turan Problems

James N. McNamara, June 1991
Two New Ramsey Numbers

Sonja Benz, June 1991
Fast Multiplication of MultiplePrecision Integers

Catherine E. Chronaki, December 1990
Parallelism in Declarative Languages

Hieu T. Pham, December 1988
Variable Size Block Truncation Coding with Adaptive Bit Plane Omission for Image Compression

Robert P. Herloski, June 1987
Automatic Differentiation: Implementation in the Ada Programming Language
Master's Project Committee Chair

Naveen Kandakumar, June 2014
Rebound Attack on Reduced Versions of the JH Hash Function

Nicolette Nicolosi, December 2013
Enhancements of SATSolvers for Some Combinatorial NAESAT Problems

Alex Blank, December 2012
Chaumvan Antwerpen Undeniable Signatures on Elliptic Curves

Darryl Clyde Eychner, May 2012
A Statistical Analysis of SHA3 Candidates BLAKE, CubeHash, and Skein

Michael Pratt, November 2011
A Study of the Parallelism and Efficiency of the Index Calculus Algorithm

Ashok Vepampedu Karunakaran, August 2011
Statistical and Performance Analysis of SHA3 Hash Candidates

David Rivshin, August 2007
A Computational Investigation of Graph Reconstruction

Kert A. Richardson, July 2006
Progress on Probabilistic Encryption Schemes

Jisoo Kim, July 2005
Group Key Agreement Protocols with Implicit Key Authentication

Sungho Maeung, July 2005
Electronic Voting System for RIT Student Government Elections

Gerard Joseph Nealon, July 2005
ElGamalType Signature Schemes in Modular Arithmetic and Galois Fields

Brian McMullen, June 2005
Graph Reconstruction Numbers

Edison Paul Gnanasekaran Sakthivel, March 2005
The Role of Diffusion in Differential Analysis of Substitution
Permutation Networks and Rijndaellike Ciphers

Min Hu, February 2004
Exploring the Topology of SmallWorld Networks

Yan Li, January 2004
The Study of Ramsey Numbers r(Ck,Ck,Ck)

Chenggang Wang, May 2003
Untraceable Electronic Cash System

Takeshi Aoyama, May 2003
Polynomial Time Primality Testing Algorithm

Robert Gretzinger, February 2003
ZeroKnowledge Proofs In Anonymous Group Identification

Frank Dana, February 2003
Elliptic Curve Cryptosystem for Palm OS

Andrey Babak, December 2002
Computing BookComplete Ramsey Numbers

Jun Wang, August 2002
Generating and Solving 3SAT

Narender Yellanki, July 2002
Software Solution for Optimizing Poultry Feed Cost

Scott McCloskey, April 2002
Digital Image Watermarking Resistant to Translation, Rotation, and Scaling

Marc Daniels, May 2001
An Indepth Study of String Matching Algorithms

KungKuen Tse, September 2000
Algorithms and Computations of CycleComplete Ramsey Numbers

Nan Yang, May 1999
Visualization and Experiments with Network Flow Algorithms

Norman W. Moulton, August 1998
Algorithms for MultiplePrecision Integer Math

Xiaofei Zhao, August 1998
Generation and Isomorph Rejection of TriangleFree Edge 3Colorings

Yelena Migdalovich, 1998
Multiplication Algorithms

Dan Symula, November 1997
The Transportation Problem: Two Comparative Implementations

Javid Huseynov, July 1997
Embeddability of Pseudoline Arrangements and Point Configurations into Euclidean Plane

Farid Aknine, 1996

Rushan Sheen, October 1993

HsuWei Wang, August 1993
Petri Net As a Modeling Tool for Biological Systems  Modeling Human Urea Cycle

Kwaku A. Darkwah, October 1992
Graph Isomorphism Package: an Interface to NAUTY (No AUTomorphisms, Yes?)

Ruben L. Andujar, July 1992
Solving Some Chessboard NonAttacking Puzzles

Shutzu Hung, April 1992
Implementation of the RivestShamirAdleman Cryptosystem

Miguel M. Arias, June 1991
Multicolor Monochromatic TriangleFree Colorings in Ramsey Problems
spr's main page