CSE P 590TU Final Projects
- Abbas, Samar, Cryptanalysis of Modern Ciphers (paper)
- Alaganandam, Hemavathy, Database Encryptions (paper)
- Ali, Imran, Software Watermarking (paper, slides)
- Anandam, Parvez, Introduction to Braid Group Cryptography (paper, slides)
- Anson, Scott, Threshold RSA Cryptography (paper, slides)
- Aseef, Nilkund, Analysis of standard OCSP protocol and an approach to improve it (paper)
- Babale, Bachir, Cryptographics: cryptography on graphical processing units (paper, slides)
- Baker, Caleb, Fingerprint Security (paper)
- Balikov, Alexander, Design and Analysis of Security Protocols (paper)
- Banerjee, Somnath, Steganography and Digital Watermarking (paper, slides)
- Bare, Christopher, The Attestation Mechanism in Trusted Computing (paper, slides)
- Bilger, Jeff, The role of cryptography in combating software piracy (paper, slides)
- Chakraborty, Amlan, Steganography and Digital Watermarking -- Applications, Attacks and Countermeasures (paper)
- Christensen, D.G., The Cracking of Enigma (paper, slides)
- Coleman, David, DRM and Key Revocation (paper, slides)
- Cosand, Holly, WPA Security and Exploits (paper)
- Dorwin, David, Cryptographic Features of the Trusted Platform Module (paper)
- DuPuis, Christopher, Anonymity and friends: Keeping the act of communication private (paper, slides)
- El-Gammal, Mohammed, 802.16 security architecture (paper)
- Fathalla, Mohamed, Analysis of Remote Timing Attacks against OpenSSL (paper)
- Galvin, Dennis, Cryptography and RFID: Analysis of the TI DST40 (paper, slides)
- Hogg, Jason, Distributed Authorization Models (paper)
- Howbert, Jeffry, Factoring RSA Moduli: Current State of the Art (paper, slides)
- Howe, Michael, Cracking Enigma (paper)
- Huang, Lin, E-Money (paper, slides)
- Hullender, Greg, Estimating a Lower Bound on the Entropy of HTTPS Public Keys (paper)
- Iyer, Vidya, WS Secure Conversation - Let's Talk In Private (paper, slides)
- Kar, Ansuman, Secure Real Time Communication (paper)
- Kerner, Matther, "Uncoercible and deniable encryption, or lying with impunity" (paper, slides)
- Kong, Dave, Overview of Electronic Cash (paper)
- Krassovsky, Slavik, Security flaws of the existing electronic voting systems (paper, slides)
- Lu, Jingwei, Using Graphics Processing Unit in Block Cipher (paper)
- Marshall, Anne, Elliptic Curve Cryptography: What is it good for? (paper)
- Mazahir, Osama, 802.11b Security (paper, slides)
- Mazumder, Shuvro, Privacy Preserving Data Mining (paper)
- Musick, Grant, Origin and Nature of Allied Cryptographic Advantage in WWII (paper, slides)
- Myers, Grayson, Poking holes in knapsack cryptosystems (paper, slides)
- Nagapuram, Damodar, Digital Cash (paper, slides)
- Nelson, Scott, Attacks on the RSA Cryptosystem (paper)
- Patel, Sachin, File System and Full Volume Encryption (paper, slides)
- Pillai, Avinash, Quantum Cryptography (paper)
- Raghavan, Shankar, Biometric Encryption and Authentication (paper, slides)
- Razzaq, Shahid, Code Obfuscation and its limits in todays software & hardware (paper, slides)
- Reeves, Chuck, WS-Trust (paper)
- Shearer, James, In the CA I Trust - A look at Certification Authorities (paper, slides)
- Smith, Frederick, A Brief History of Factorization Techniques (paper, slides)
- Stritzel, Adam, Practical Aspects of Modern Steganography (paper)
- Suarez, Carlos, The Content Scrambling System (paper, slides)
- Thong, Lavina, Smart Cards' Onboard Cryptographic Functions (paper, slides)
- Tsunoda, Koichi, Digital Watermarking (paper)
- Wolfson, Roger, Implementations of Challenge-Response Authentication (paper)
- Wu, Bing, "Chinese" Attacks on Hashes (paper, slides)
- Youngblood, Carl, An Introduction to Identity-Based Cryptography (paper, slides)
- Zethelius, Sven, Random Bit Generators (paper)
- Zolfaghari, Eiman, Cryptography gone Mobile: Current Research on Limiting Factors (paper)