Help-Project INSE 6110:Foundations of Cryptography

Help-Project INSE 6110:Foundations of Cryptography Due:Last class
1 Project paper Choose one of the pre-approved topics below,or you may suggest other topics (either as a survey or a novel contribution) but they must be approved by me.Projects are to be done individually or in groups of 2.You may suggest a group project that involves 3 or more people but it must be approved by me.All group members receive the same mark for the project. For this project,research the topic and write a paper (max 8 pages) explaining the subject,with ref- erences to the related literature,using the following template: Your paper should summarize the subject with an introduction, explaining very clearly what the research problem is and how the subject addresses it. You should then explain the solution with technical detail. You should understand and cite at least 3 academic papers that appear at good quality venues. To find papers and understand the concepts,try: If the paper does not appear at a conference in the first 50 on this list,it is not likely a good quality venue: 2&last=0&orderby=1 In all cases,you can use your discretion (e.g.,papers at specialized workshops can be high quality, non-academic resources can be as well) and if you have any questions,ask me during the lecture break or during office hours. Be sure to cite all sources you use. You may do citations in a conversational way (e.g., “Boneh et allist the five essential properties of blah as follows [9].”) Under no circumstance can you use someone else’s text as your own (even if you modify the grammar).Review Concordia’s plagiarism policy and understand it: pdf
2 Pre-approved Topics Cryptographic Primitives and Protocols • Attribute-based Encryption • Blind Signatures • Bilinear Pairings • Bitcoin • Cryptographic Accumulators • Direct Anonymous Attestation (used by TPMs) • Dining Cryptographers • Fair Exchange • Fully Homomorphic Encryption • Garbled Circuits • GCMMode of Operation • Group Signatures • Indistinguishability Obfuscation • Identity-based Cryptography • Mix Networks • Oblivious Transfer • Off-the-Record Messaging • Post-Quantum Cryptography • Ring Signatures • Timed-Release Encryption • Universal Composability Cryptanalysis and Attacks • Differential Cryptanalysis • Boomerang Attack • Biclique Cryptanalysis News-worthy Events • RC4 biases in SSL/TLS • NSAbackdoor in Dual ECDRGB


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: