Alan Kaminsky Department of Computer Science Rochester Institute of Technology 4572 + 2433 = 7005
Home Page
Foundations of Cryptography CSCI 662-01 Spring Semester 2018
Course Page

CSCI 662-01—Foundations of Cryptography
Research Paper

Prof. Alan Kaminsky—Spring Semester 2018
Rochester Institute of Technology—Department of Computer Science

Topic
Part One
Part Two
Formatting Requirements
Submission Requirements
Grading Criteria
Late Submissions
Plagiarism


Topic

For your topic, you will study the research literature and pick an application area that uses cryptographic techniques. Here are some acceptable topics (these are not the only acceptable topics):

However, application areas covered in the course are not acceptable topics, including (these are not the only unacceptable topics):

If you are unsure whether a certain topic is acceptable, please consult with me.

You will pick three papers from the research literature in your chosen topic area. Each paper must describe original research; papers that merely survey or summarize other people's research are not acceptable. Each paper must be published in a research journal, in a research conference, in the Cryptology ePrint Archive, or in arXiv.org. Each paper must be dated 2008 or later. For a list of research journals and conferences, see the Bibliography. If you are unsure whether a certain paper is acceptable, please consult with me.

You will write and submit your research paper in two parts as described below. Part One will consist of introductory information and a list of references. Part Two will be the full research paper.


Part One

Part One of your research paper must include these sections, and no others.


Part Two

Part Two of your research paper must include these sections, and no others. Part Two of your research paper must be about 3000–4000 words (about 6–8 pages).


Formatting Requirements

For more detailed information about the required format, including the way to format citations in the body of the paper and the way to format references in the List of References at the end, see the example of the paper format. You can also look at the example's LaTeX source file and BibTeX source file.

Depending on the exact fonts you use, a 3000–4000 word paper should take about 6–8 pages (not including list of references, figures if any, etc.) However, you must write a 3000–4000 word paper, not a 6- or 8-page paper.

I will only accept a PDF file for your paper. I will not accept any other kind of file, and I will not accept a hard copy printout. Your PDF file must be named "<username>.pdf", where <username> is the username of your Computer Science Department account. You may use any word processing software you wish, as long as the final output is a PDF file.


Submission Requirements

Send your PDF file to me by email at ark­@­cs.rit.edu. Include your full name and your computer account name in the email message, and include the PDF file as an attachment.

I will accept your submission only if all of the following requirements are met:

I will then send you a reply message stating whether or not I accepted your research paper. If you have not received a reply within one business day (i.e., not counting weekends), please contact me. Your research paper is not successfully submitted until I have sent you an acknowledgment stating that I accepted your research paper.

The submission deadline for Part One is Monday, February 26, 2018 at 11:59pm. The submission deadline for Part Two is Monday, April 16, 2018 at 11:59pm. The date/time at which your email message arrives in my inbox will determine whether your research paper meets the deadline.

You may submit Part One and Part Two multiple times up until the deadline. I will keep and grade only the most recent successful submission. There is no penalty for multiple submissions.

If you submit Part One or Part Two before the deadline, but I do not accept it, and you cannot or do not submit Part One or Part Two again before the deadline, Part One or Part Two will be late (see Late Submissions below). I strongly advise you to submit Part One and Part Two several days BEFORE the deadline, so there will be time to deal with any problems that may arise in the submission process.


Grading Criteria

The research paper will be graded as follows:

Part One will be graded pass/fail:

Each section of Part Two will be graded as follows:

After grading your research paper I will put your grade and any comments I have in your encrypted grade file. For further information, see the Course Grading and Policies and the Encrypted Grades.


Late Submissions

If I have not received a successful submission of Part One or Part Two by the deadline, Part One or Part Two will be late and will receive a grade of zero. You may request an extension for Part One or Part Two. There is no penalty for an extension. See the Course Policies for my policy on extensions.


Plagiarism

The research paper must be entirely your own individual work. I will not tolerate plagiarism. If in my judgment the research paper is not entirely your own work, you will automatically receive, as a minimum, a grade of zero for the assignment. See the Course Policies for my policy on plagiarism.

Foundations of Cryptography CSCI 662-01 Spring Semester 2018
Course Page
Alan Kaminsky Department of Computer Science Rochester Institute of Technology 4572 + 2433 = 7005
Home Page
Copyright © 2018 Alan Kaminsky. All rights reserved. Last updated 17-Jan-2018. Please send comments to ark­@­cs.rit.edu.