Advanced Cryptography Term Papers
CSCI-762, Spring 2018

Choosing a Topic

In general, I prefer more algorithm and cryptography oriented focus, but security topics (with significant cryptography component) are also fine.


First step, due February 11 (Sun)

You may still have doubts what is your choice of subject, but you have to complete the steps below. This term project is evaluated individually, but you can work with somebody else in pair to make a two-part single subject study.


Second step, February 27 (Tue)

All students have a good idea of the subjects of their term papers. Write a somwhat longer abstract, put an overview, table of contents, some definitions, etc. Include in the paper website the main sources and references used in your project. We will review in class all proposed topics, suggest modifications and settle possible team work. Use of beamer for slides is recommended :-)


Third step, March 20 (Tue) and March 22 (Thu)

So, the skeletons of your projects are fixed ... We will review all projects in class, about 10 minutes each.


Fourth step, presentations, April

Final papers due Thursday, May 3


Subjects/presentations/papers from Spring 2018

  1. Rebecca Froling, Analysis of FrodoKEM Post Quantum Key Encryption, 3/29, 4/19
  2. Scott Furman, Falcon: A Post-Quantum Signature Scheme, 3/27, 4/17
  3. Kyle McGlynn, Keccak Message Authentication Codes (KMAC), 3/27, 4/12
  4. Chloe Jackson, Titanium NIST submission by Steinfeld, Sakzad, and Zhao, 3/22, 4/19
  5. Daichi Mae, Zero-Knowledge Succinct Non-Interactive Argument of Knowledge, 3/29, 4/24
  6. Richard Munson, Cardano and Proof of Stake (PoS), 4/3, 4/26
  7. Prathibha Rama, Privacy preserving classifiers, 3/29, 4/24
  8. Jacob Ryder, Hamming Quasi-Cyclic (HQC): Quantum-Resistant Public Key Encryption Scheme, 3/20, 4/17
  9. Kritka Sahni, Ding Key Exchange, 3/27, 4/19
  10. Aziel Shaw, An analysis of LAC, a lattice based post quantum encryption scheme, 3/27, 4/17
  11. Justin Tang, Securing Medical Devices, 3/27, 4/24
  12. Romal Thakkar, Analysing Two Post-Quantum Cryptosystems: LOTUS and Mersenne, 4/26 after regular class time
  13. Cody Tinker, Exploring the Feasibility of Optimizing Homomorphic Encryption Operations through Hardware, 3/29, 4/26
  14. Maitri Vaghela, Analysis of the round 1 submissions for post quantum cryptography hosted by NIST, 3/20, 4/26
  15. Stanisław Radziszowski, instructor, some links


List of papers and presentations from the Spring 2017 semester
List of papers and presentations from the Spring 2016 semester
List of papers and presentations from the Spring 2015 semester
List of papers and presentations from the Spring 2013 quarter
List of papers and presentations from the Spring 2012 quarter
List of papers and presentations from the Spring 2011 quarter
List of papers and presentations from the Spring 2010 quarter

Back to Advanced Cryptography course page