ICSI-526/426 Cryptography

Spring 2015

List of potential projects


Implementation Projects:
  • Conference papers:
    Crypto 2013
    Crypto 2012
    Crypto 2011
    1. A Scalable Video Encryption Algorithm for H.264/SVC
    2. A universal image forensic strategy based on steganalytic model
    3. Region of interest signalling for encrypted JPEG images
    4. A visual saliency based video hashing algorithm
    5. ---
    6. A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery
    7. A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search
    8. Detecting Relay Attacks with Timing-Based Protocols
    9. Exploiting Social Networks for Threshold Signing: Attack-resilience vs. Availability
    10. Mutual Authentication in RFID
    11. Power Efficiency Analysis of Multimedia

    Survey Projects:
    1. Applications of Elliptic Curve Cryptography for Image and Video Security
    2. Visual Hashing
    3. Applications of Visual Cryptography for Image Security
    4. Cyrptographic Techniques for Security of Online Banking
    5. Cyrptographic Techniques for Network Security
    6. Cyrptographic Techniques for Database Security
    7. Cyrptographic Techniques for Software Security
    8. Homomorphic Encryption Techniques
    9. Secure Multi-party Computation Techniques
    10. ---
    11. Smart card security
    12. Security issues in RFID systems
    13. Video watermarking
    14. Digital right management
    15. Digital signatures
    16. Security issues in electronic communications
    17. Security issues in social media
    18. Cloud security

    Back to course web page