Project Topics

advertisement
CIS5371 Cryptography Project topics – SELECTED TOPICS
Some topics from Crypto 2013
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
Functional Encryption: New Perspectives and Lower Bounds
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
Bounds in Shallows and in Miseries
Limits of provable security for homomorphic encryption
Key Homomorphic PRFs and Their Applications
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Secure Computation Against Adaptive Auxiliary Information
Obfuscating Conjunctions
Sieve-in-the-Middle: Improved MITM Attacks
An Algebraic Framework for Diffie-Hellman Assumptions
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
How to Run Turing Machines on Encrypted Data: Nidhi Shekar ns13j Suchitra Jambawalikar srj13e (Tuesday 4/15)
What Information is Leaked under Concurrent Composition?
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
Limits on the Power of Cryptogaphic Cheap Talk
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
On the Security of the TLS Protocol: A Systematic Analysis
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRF
The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries
Everlasting Multi-Party Computation
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking
Other topics
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
A topic chosen from the textbook
A topic of your own ---must be approved
Biometric Crypto: please email me details! (Tueday 4/15)
Cloud computing
Computer Forensics: Brian Finelli, Alekhya Gade (Thursday 4/10)
Cryptographic Attacks
Database Security: P.Jagadeesh - jp13ab Ritesh Puri - rp13t (Tuesday 4/22)
Digital Forensics
DOS (& DDOS) Attacks: please email me details! (Tuesday 4/8)
Elliptic Curve Cryptography: Anisha Kamble (ak12t) Sinduri Shayamala (ss13w) (Thursday 4/3*)
11. ID based Crypto: Shiva Krishna Imminni (si13f) Pradeep Reddy Konreddy (pk13h) Susheel Kumar Pogaku (sp13ab) (Thursday 4/3*)
12.
13.
14.
15.
16.
17.
Internet Security
Intrusion Detection Systems: Akshara Dendi ad13r@my.fsu.edu, Lehari Saggam ls13d@my.fsu.edu (Tuesday 4/15)
Linux Security
Merkle Trees
Public Key Infrastructure
PGP
19.
20.
21.
22.
23.
24.
25.
26.
27.
Public Key Crypto for WSN
Secure Software engineering: Omar Azhar Michael (Seth) Kerr (Thursday 4/17)
Sensor Networks
SSL: David Lafontant (dl10f@my.fsu.edu) Manik Saini (ms13ad@my.fsu.edu) (Thursday 4/3*)
Steganography: Anshul Varma(av13v) & Faisal Qureshi(fq13b) (Thursday 4/3*)
Trust Computing
Trust Management
Visual Cryptography: Insoo Lee, Sangmun Kim, and Wondong Lee. (Tuesday 4/15)
Malware Analysis: Krishna Sainath Meda (km13w), Priyatham Kadali (pk13), Poornachandra Veladi ( pv13b )
18. Public Key Infrastructure—Risk Analysis, Achyuth Reddy Jangannagari(aj13h), Kranthi Kumar Chittipolu (kc13x), Shalini Tangella(st13h)
LAST DAY FOR HANDING IN PROJECT REPORTS: Thursday 4/17
Peer grading
1. Email your grades to the TA
2. You must attend a presentation to grade it.
3. Each presentation is graded 1-10.
4. The final grade will take into account the written report as well.
Download