ICSI-526/426 Cryptography

Spring 2016

List of approved projects


May 9, Monday:
  1. 1:00 p.m.: Abhishek Gupta and Amrinder Singh, Text and Image Encryption using ECC. (Implementation)
  2. 1:15 p.m.: Parushwi Patel, Blind Digital Signature Schemes and Their Applications. (Survey)
  3. 1:30 p.m.: Varun Chandrasekar Narayanan and Shanmugar, Image-based Password Authentication Schemes. (Survey & Implementation)
  4. 1:45 p.m.: Shashank Arora, Quantum and Post-Quantum Cryptography. (Survey)
  5. 2:00 p.m.: Jamie Lee, Source Camera Identification by JPEG Compression Statistics for Image Forensics. (Implementation)
  6. 2:15 p.m.: Vishal Agarwal and Soundarya Choppalli, Cryptographic Code Obfuscation Techniques. (Survey)
  7. 2:30 p.m.: Dhaval Lad and Abdul Muqtadeer Mohammed, Privacy and Security Issues in Social Media . (Survey)
  8. 3:00 p.m.: Sneha Banala and Arthi Vijayakumar, Cryptographic Digital Signatures: Techniques, Applications and Attacks. (Survey)
  9. 3:15 p.m.: Yun Wang and Jinlai Wan, Cryptographic Techniques for Security of Online Banking. (Survey)
  10. 3:30 p.m.: Niharika Pujari and Komal Narwekar, Software code obfuscation by hiding control flow information in stack. (Implementation)
  11. 3:45 p.m.: Pouroushi Hak, Cryptographic Techniques for Password Security . (Survey)
  12. 4:00 p.m.: Abhiram Mocharla and Shivam Awasthi, Cryptographic Techniques for Multimedia Databases. (Survey)
  13. 4:15 p.m.: Amol Shete and Ashish Yeshawant Jadhav, Publicly Verifiable Secret Sharing and Its Applications. (Survey)
  14. 4:30 p.m.: Meley Sennay Kifleyyesas, Survey of Homomorphic Encryption Tools on Text and Image data. (Survey)

Back to course web page