Cryptography II
VCSG-706, Spring 2011


  1. David Carley, Secure Multicast
  2. Brian Gernhardt, Cryptographic Pseudo-Random Numbers
  3. Alexander Lange, Fully Homomorphic Encryption
  4. Zach Langley, AKS primality testing
  5. Nathaniel Moseley, Cell Phone Transmission Encryption and Vulnerabilities
  6. Nidhin Pattaniyil, NTRU and lattices?
  7. Garrett Smith, SHA-3 Hardware Architectures
  8. Xuan Tran and Naveen Kandakumar, Fault attacks and defenses of CRT-RSA
  9. Christopher Wood, Chaotic Cryptosystems

Back to Cryptography II course page