ICSI-526/426 Cryptography
Spring 2016
List of approved projects
May 9, Monday:
1:00 p.m.: Abhishek Gupta and Amrinder Singh,
Text and Image Encryption using ECC
. (Implementation)
1:15 p.m.: Parushwi Patel,
Blind Digital Signature Schemes and Their Applications
. (Survey)
1:30 p.m.: Varun Chandrasekar Narayanan and Shanmugar,
Image-based Password Authentication Schemes
. (Survey & Implementation)
1:45 p.m.: Shashank Arora,
Quantum and Post-Quantum Cryptography
. (Survey)
2:00 p.m.: Jamie Lee,
Source Camera Identification by JPEG Compression Statistics for Image Forensics
. (Implementation)
2:15 p.m.: Vishal Agarwal and Soundarya Choppalli,
Cryptographic Code Obfuscation Techniques
. (Survey)
2:30 p.m.: Dhaval Lad and Abdul Muqtadeer Mohammed,
Privacy and Security Issues in Social Media
. (Survey)
3:00 p.m.: Sneha Banala and Arthi Vijayakumar,
Cryptographic Digital Signatures: Techniques, Applications and Attacks
. (Survey)
3:15 p.m.: Yun Wang and Jinlai Wan,
Cryptographic Techniques for Security of Online Banking
. (Survey)
3:30 p.m.: Niharika Pujari and Komal Narwekar,
Software code obfuscation by hiding control flow information in stack
. (Implementation)
3:45 p.m.: Pouroushi Hak,
Cryptographic Techniques for Password Security
. (Survey)
4:00 p.m.: Abhiram Mocharla and Shivam Awasthi,
Cryptographic Techniques for Multimedia Databases
. (Survey)
4:15 p.m.: Amol Shete and Ashish Yeshawant Jadhav,
Publicly Verifiable Secret Sharing and Its Applications
. (Survey)
4:30 p.m.: Meley Sennay Kifleyyesas,
Survey of Homomorphic Encryption Tools on Text and Image data
. (Survey)
Back to course web page