Number Theory and Cryptography, Computer and Information Security, Algorithm Design and Analysis, Computational Complexity, Financial Mathematics

Size: px
Start display at page:

Download "Number Theory and Cryptography, Computer and Information Security, Algorithm Design and Analysis, Computational Complexity, Financial Mathematics"

Transcription

1 RESEARCH INTERESTS Number Theory and Cryptography, Computer and Information Security, Algorithm Design and Analysis, Computational Complexity, Financial Mathematics EXPERIENCE Assistant Professor, May Present C.R.Rao Advanced Institute of Mathematics, Statistics and Computer Science (AIMSCS), Hyderabad, India Visiting Faculty, Indian Institute of Technology, Hyderabad, India Honorary Lecturer, University of Hyderabad, Hyderabad, India August Present January Present Graduate Lecturer / Assistant, Aug May 2012 University of Minnesota (UMN), Minneapolis, MN, USA Lectured, held recitations and labs, and graded various advanced graduate and undergraduate courses including Probability, Calculus, Analysis (real & complex), Differential Equations, Algebra, Linear Algebra, Finite Fields, Mathematical Logic, Cryptography (classical & quantum), Error correcting codes, Mathematical Theory Applied to Finance, and Computation, Algorithms, & Coding in Finance Please visit for details. Mentor, June Aug 2010 Interdisciplinary Research Experience for Undergraduates, Institute of Mathematics and its Applications (IMA), UMN Research Assistant, May Aug 2007 Intelligent Storage Consortium, Digital Technology Center (DTC), UMN Research Visitor, July Aug 2006 Center for Discrete Mathematics and Theoretical Computer Science (DIMACS), Rutgers University, Piscataway, NJ Research Fellow, June Aug 2006 Minnesota Center for Industrial Mathematics (MCIM), UMN Research Scholar, Aug July 2003 Tata Institute of Fundamental Research (TIFR), Bombay Page 1 of 7

2 EDUCATION Ph.D. - Cryptography, GPA: 3.88/4.00, May 2012 University of Minnesota (UMN), Minneapolis, MN, USA Advisor : Prof. Andrew Odlyzko M.S. - Computer Science, GPA: 3.84/4.00, Aug 2007 Department of Computer Science and Engineering, UMN M.S. - Mathematics, GPA: 3.91/4.00, Aug 2007 School of Mathematics, UMN P.G.Certificate in Statistical Methods and Applications, First Class, July 2000 Indian Statistical Institute, Calcutta B.Sc. - Mathematics, with Honors, July 2000 St. Xavier's College, University of Calcutta, Calcutta PUBLICATIONS (INTERNATIONAL JOURNALS) Analysis-Preserving Protection of User Privacy against Information Leakage of Social-Network Likes with F.Buccafurri, L.Fotia, and G.Lax. Information Sciences 328, Elsevier An Anonymous Proxy Multi-signature with Accountability (Book chapter) with R.A.Sahu, E-Business and Telecommunications, CCIS 554, Springer, A Secure Anonymous Proxy Signcryption Scheme In submission PUBLICATIONS (INTERNATIONAL CONFERENCES) Public-Key Encryption with Searchable Keywords based on Jacobi Symbols with G.D.Crescenzo, IndoCrypt 2007, LNCS 4859, Springer, 2007 Anonymous Signatures Revisited with A.Yun, ProvSec 2009, LNCS 5848, Springer, 2009 Remote Cache-timing Attacks on AES with D.Feldman, D.F.Kune, and S.Das, CS2, HiPEAC 2014, ACM, 2014 A Secure Anonymous Proxy Multi-signature Scheme with R.A.Sahu, Secrypt 2014, SciTePress, 2014 How to Leak a Secret and Reap the Rewards too with S.K.Pandey, LatinCrypt 2014, LNCS 8895, Springer, 2014 Secure and Efficient Scheme for Delegation of Signing Rights with R.A.Sahu, ICICS 2014, LNCS 8958, Springer, 2014 Practical and Secure Integrated PKE+PEKS with Keyword Privacy with F.Buccafurri, G.Lax and R.A.Sahu. Secrypt 2015, SciTePress, 2015 Strengthening NTRU Against Message Recovery Attacks Arithmetic 2015: Elliptic curves, diophantine geometry, and arithmetic dynamics, Brown University, Providence, RI, USA, 2015 Efficient and Secure Many-to-One Signature Delegation (To appear) with R.A.Sahu, ICICS 2015, LNCS, Springer, 2015 Page 2 of 7

3 FUNDED PROJECTS / RESEARCH EXPEDITIONS Attacks on Elliptic Curve Discrete Log Problem, June Present Funding agency: Defence Research & Development Organisation, Govt. of India Post Quantum Cryptology, Oct Present Funding agency: Defence Research & Development Organisation, Govt. of India SUBMITTED PROJECTS / RESEARCH EXPEDITIONS Remote Cache Timing Attacks on AES Implementation of Attacks on Discrete Log Problem using Function Field Sieve OTHER CURRENT / RECENT PROJECTS Side Channel Cryptanalysis (of block/stream ciphers) Development of an Indigenous Lightweight Block Cipher May Present May Present Design of a Lattice Based Cryptosystem May Sep 2013 Software Methodologies for Lattice Based Cryptanalysis May Sep 2013 PAST PROJECTS Counterparty Credit Risk in Over-The-Counter Derivatives January 2012 Minnesota Center for Financial and Actuarial Mathematics (MCFAM), UMN Pursuit Evasion Games with Multiple Pursuers June Aug 2010 Institute of Mathematics and its Applications (IMA), UMN Secure and Efficient Long Term Data Management May May 2008 Intelligent Storage Consortium, Digital Technology Center, UMN Long Term Key Management May May 2008 Intelligent Storage Consortium, Digital Technology Center, UMN Applied Remote Cache-timing Attacks against AES Sept May 2007 Institute of Technology, UMN Cryptographic Multi-linear Maps Jan May 2005 Institute of Technology, UMN Basic Lie Theory Aug July 2003 School of Mathematics, Tata Institute of Fundamental Research, Bombay Engel Curve Analysis of Expenditure of Employees of ISI, Calcutta, Indian Statistical Institute, Kolkata Jan June 2003 Page 3 of 7

4 INVITED TALKS AND SEMINARS Invited Talk September 21-22, 2013 Refresher Course in Mathematical Sciences, UGC-Academic Staff College, University of Hyderabad, Hyderabad Invited Talk May 18-22, 2015 CRSI National Instructional Workshop on Cryptology, HPU, Shimla Invited Talk June 5-9, 2014 CRSI National Instructional Workshop on Cryptology, MNNIT, Allahabad Invited Talk March 10-15, 2014 Instructional Workshop on Graph Theory and its Applications to Visual Cryptography, Kalasalingam University, Krishnankoil Invited Seminar January 23, 2014 Birla Institute of Technology & Science, Pilani - Goa Invited Seminar January 01, 2014 B. V. Raju Institute of Technology, Hyderabad Invited Talk November 07, 2013 Cyber Security, ADHYAYAN 2013, AMSSOI, Hyderabad Invited Seminar October 25, 2013 School of Computer and Information Sciences, University of Hyderabad Invited Talk October 03, 2013 Faculty Development Program on Information Security and Cyber Forensics, GITAM Institute of Technology, Vishakhapatnam Invited Talk September 04-05, 2013 Refresher Course in Mathematical Sciences, UGC-Academic Staff College, University of Hyderabad, Hyderabad Invited Talk March 07-09, 2013 Refresher Course in Mathematical Sciences, UGC-Academic Staff College, University of Mysore, Mysore Invited Talk May 16, 2010 Young Researchers Meet on Mathematics and Computer Science, Brown University, Providence, RI, USA Invited Talk January 12, 2010 Workshop on Generic Ring Algorithms, Horst-Görtz Institute for IT Security, Ruhr-University-Bochum, Germany Invited Talk December 12, 2007 IndoCrypt 2007, 8th International Conference on Cryptology in India, Indian Institute of Technology, Chennai Page 4 of 7

5 WORKSHOPS AND SEMINARS ORGANIZED/CONDUCTED Code Based Crypto Workshop 2015 September 2015 International workshop jointly organized by CRRao AIMSCS and SAG DRDO Training on Elliptic Curves March 2015 for scientists of the Scientific Analysis Group (SAG, DRDO), New Delhi Training on Block Cipher Design July 2014 for scientists of the Cabinet Secretariat, New Delhi Training on Lattice-based Cryptosystems and Cryptanalysis March 2013 for scientists of Scientific Analysis Group (SAG, DRDO), New Delhi Training on Lattice-based Cryptosystems and Cryptanalysis January 2013 for scientists of Scientific Analysis Group (SAG, DRDO), New Delhi Training on Block Ciphers November 2012 for scientists of National Technical & Research Organization (NTRO), New Delhi Short course on Anonymous Identity-based Cryptosystem July-September 2012 for post-graduate research scholars at Student Number Theory Seminar School of Mathematics, University of Minnesota, USA IMPORTANT WORKSHOPS AND TRAINING SCHOOLS ATTENDED International Workshop on Lattice-Based Cryptography December 2013 Organized by Microsoft Research, Bangalore International View of the State-of-the-Art of Cryptography and Security and its Use in Practice December 2013 Organized by Intel, Bangalore, India Financial Mathematics Modelling Workshop January 2012 Minnesota Center for Financial and Actuarial Mathematics, UMN (MCFAM) CIMPA School of Number Theory in Cryptography & its Applications July 2010 Kathmandu University, Nepal Workshop on Generic Ring Algorithms January 2010 Horst-Görtz Institute for IT Security, Ruhr University Bochum, Germany Young Researchers Meet on Mathematics and Computer Science May 2010 Brown University, Providence, RI, USA IMA Workshop on Complexity, Coding, and Communications April 2007 Institute of Mathematics and it Applications, UMN, Minneapolis, USA Computational Number Theory and Applications to Cryptography July 2006 Organized by NSF and IMA and RMMS and Fields Institute. Conducted at University of Wyoming, USA Page 5 of 7

6 INTERNATIONAL CONFERENCES ATTENDED Mathematics of Cryptography Irvine, CA, USA, August-September 2015 Crypto 2015: 35th International Cryptology Conference Santa Barbara, CA, USA, August 2015 Arithmetic 2015: Elliptic curves, Diophantine geometry, & arithmetic dynamics Brown University, Providence, RI, USA, August 2015 First International Conference on Integrated Approach to Counter-Terrorism (CTC 2015) Jaipur March 2015 IndoCrypt 2014: 15th International Conference on Cryptology in India Delhi, December 2014 ECC 2014: 18th Workshop On Elliptic Curve Cryptography Chennai October 2014 SeCrypt 2014: 11th International Conference on Security and Cryptography Vienna, Austria August 2014 DSCI Annual Information Security Summit New Delhi, December 2013 IndoCrypt 2013: 14th International Conference on Cryptology in India Mumbai December 2013 AsiaCrypt 2013: 19th Annual International Conference on Theory and Application of Cryptology and Information Security Bangalore December 2013 DSCI Best Practices Meet on Cyber Security Chennai July 2013 Conference in Number Theory Kolkata December 2012 IndoCrypt 2012: 13th International Conference on Cryptology in India Kolkata December rd Worldwide Cyber Security Summit New Delhi October 2012 Crypto 2012: 32nd International Cryptology Conference Santa Barbara, CA, USA August 2012 Crypto 2009: 29th International Cryptology Conference Santa Barbara, CA, USA August 2009 Pairing: 6th International Conference on Pairing-Based Cryptography Palo Alto, CA, USA August 2009 Page 6 of 7

7 PROFESSIONAL MEMBERSHIPS Cryptology Research Society of India Life member AWARDS Full-tuition Scholarship and Assistantship Graduate School, University of Minnesota, USA TIFR Alumni Association Scholarship for Career Development School of Mathematics, Tata Institute of Fundamental Research, Bombay STUDENTS (CO)MENTORED V. Ram Chandra Prasad M.Tech Project, Indian Institute of Technology, Hyderabad Abhishek Shukla M.Tech Project, University of Hyderabad, Hyderabad Chetan Sharma M.Tech Project, Sardar Patel University of Police, Security & Criminal Justice, Jodhpur Nitish Vyas M.Tech Project, Sardar Patel University of Police, Security & Criminal Justice, Jodhpur Aaron Maurer IMA Interdisciplinary Research Experience for Undergraduates, 2010 Carleton College, Minnesota, USA John McCauleyIMA Interdisciplinary Research Experience for Undergraduates, 2010 Haverford College, Pennsylvania, USA Silviya Valeva IMA Interdisciplinary Research Experience for Undergraduates, 2010 Mount Holyoke College, Massachusetts, USA REFEREES Professor Andrew Odlyzko School of Mathematics, UMN Professor David Frank School of Mathematics, UMN Professor Fadil Santosa Institute of Mathematics and its Applications, UMN Professor Scott Adams Minnesota Center for Financial and Actuarial Mathematics, UMN Professor Nicholas Hopper Department of Computer Science and Engineering, UMN Page 7 of 7

Dr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses:

Dr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses: Dr. Shashank Srivastava Assistant Professor Department of Computer Science & Engineering Image Processing Department Building-First Floor Motilal Nehru National Institute of Technology Allahabad-211004,

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

Brian Alan Snyder, Ph. D.

Brian Alan Snyder, Ph. D. Brian Alan Snyder, Ph. D. Current work address Department of Mathematics and Computer Science Work phone: (906) 635-2658 Lake Superior State Home phone: (906) 253-9822 650 West Easterday Ave. Department

More information

http://educ.jmu.edu/~ohmx/ Harrisonburg, VA 22807

http://educ.jmu.edu/~ohmx/ Harrisonburg, VA 22807 Minah Oh CONTACT INFORMATION Department of Mathematics and Statistics 540-568-4929 305 Roop Hall, MSC 1911 ohmx@jmu.edu James Madison University http://educ.jmu.edu/~ohmx/ Harrisonburg, VA 22807 EDUCATION

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

ACM Survey on PhD Production in India in Computer Science

ACM Survey on PhD Production in India in Computer Science ACM Survey on PhD Production in India in Computer Science Pankaj Jalote Director and Professor, IIIT Delhi PhD production in India in computer science has been an issue of concern over the last many years.

More information

Curriculum Vitae. Assistant Professor, Indian Statistical Institute, New Delhi, India since July 2010.

Curriculum Vitae. Assistant Professor, Indian Statistical Institute, New Delhi, India since July 2010. Curriculum Vitae Objective I would like to pursue a career in an Institute or University or Organisational setting that will allow me to practice the skills I have begun to develop for research and for

More information

Curriculum Vitae Peter Andrews

Curriculum Vitae Peter Andrews Curriculum Vitae Peter Andrews Work Address: Mathematics Department Eastern Illinois University Charleston, IL 61920 Home Address: 513 Ashby Drive Charleston, IL 61920 Degrees B.Sc., University of Toronto

More information

Opportunities in Computer Science

Opportunities in Computer Science Opportunities in Computer Science Andrew Mertz William Slough Nancy Van Cleave Eastern Illinois University Department of Mathematics & Computer Science What is Computer Science? Computer science spans

More information

Nicholas J. Hopper. Thesis title: Toward A Computational Theory of Steganography

Nicholas J. Hopper. Thesis title: Toward A Computational Theory of Steganography Nicholas J. Hopper Computer Science Department (412) 216 5023 hopper@cs.cmu.edu http://www.cs.cmu.edu/~hopper/ Research Interests Theoretical Computer Science, specializing in Theoretical Cryptography,

More information

3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis. 4. Algorithms for linear algebra problems over principal ideal rings

3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis. 4. Algorithms for linear algebra problems over principal ideal rings 1. Faktorisierung großer Zahlen 2. On smooth ideals in number fields 3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis 4. Algorithms for linear algebra problems over principal

More information

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng.

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng. Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng.org RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions

More information

Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class.

Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class. Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class. He obtained his M.Tech. (Information Technology) degree from

More information

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

Faculty Details proforma for DU Web-site

Faculty Details proforma for DU Web-site Faculty Details proforma for DU Web-site Title Prof. Anand Prakash Photograph Designation PROFESSOR, and Dean, International Relations (Humanities and Arts) Department Psychology Address (Campus) Department

More information

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography Anca Nitulescu PhD Student Personal information Address: Ecole Normale Supérieure, DI Paris, France Email: anca.nitulescu@ens.fr Occupational field Cryptography: Provable Security for Protocols I have

More information

Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 jbelding@math.umd.edu www.math.umd.

Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 jbelding@math.umd.edu www.math.umd. Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 jbelding@math.umd.edu www.math.umd.edu/ jbelding EDUCATION Ph.D. in Mathematics, May 2008 (expected) University

More information

COMPUTER SCIENCE. Department of Mathematics & Computer Science

COMPUTER SCIENCE. Department of Mathematics & Computer Science Department of Mathematics & Computer Science COMPUTER SCIENCE This document is meant as a planning guide only. Students are advised to consult with the Chair of the Department if they have specific questions

More information

DEPARTMENT OF MATHEMATICS

DEPARTMENT OF MATHEMATICS DEPARTMENT OF MATHEMATICS SCHOOL OF NATURAL SCIENCES GRADUATE PROSPECTUS M.Sc. and Ph.D. in Mathematics 2015 16 www.snu.edu.in Contents Overview... 2 Faculty... 4 M.Sc. in Mathematics... 5 Ph.D. in Mathematics...

More information

GTEM TRAINING PROGRAM

GTEM TRAINING PROGRAM GTEM TRAINING PROGRAM 1. Overview The Training Program consist of five modules, which are given in Table 1. A broad description of Table 1: Training modules and dependencies T1: General mathematical skills

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

University of Sussex School of Mathematical and Physical Sciences. Mathematics. www.sussex.ac.uk/maths

University of Sussex School of Mathematical and Physical Sciences. Mathematics. www.sussex.ac.uk/maths University of Sussex School of Mathematical and Physical Sciences Mathematics www.sussex.ac.uk/maths Join the Department of Mathematics At Sussex we recognise that mathematics is the foundation of the

More information

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra

More information

INTERNSHIPS in SCIENCE, TECHNOLOGY and ENGINEERING

INTERNSHIPS in SCIENCE, TECHNOLOGY and ENGINEERING INTERNSHIPS in SCIENCE, TECHNOLOGY and ENGINEERING A Unique Opportunity for students from India to gain Research Experience in Germany This programme provides Bachelor-students in their 3rd and 4th years

More information

Graduate Programs. Dept of Computer Science. Dr. Weining Zhang

Graduate Programs. Dept of Computer Science. Dr. Weining Zhang Graduate in Dept of Computer Science Univ. of Texas at San Antonio Dr. Weining Zhang Overview Two graduate degrees: Master of Science (MS) in Computer Science PhD in Computer Science Currently, there are

More information

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1

More information

Curriculum Vitae. Rohini Kumar

Curriculum Vitae. Rohini Kumar Curriculum Vitae Rohini Kumar Contact Information University Address: Mathematics, 1150 Faculty/Administration Building 656 W. Kirby Detroit, MI 48202 Phone: 313.577.2479 email: rkumar@math.wayne.edu Personal

More information

DEPARTMENT OF ECONOMICS SCHOOL OF HUMANITIES AND SOCIAL SCIENCES SHIV NADAR UNIVERSITY. Graduate Prospectus M.Sc. and Ph.D.

DEPARTMENT OF ECONOMICS SCHOOL OF HUMANITIES AND SOCIAL SCIENCES SHIV NADAR UNIVERSITY. Graduate Prospectus M.Sc. and Ph.D. DEPARTMENT OF ECONOMICS SCHOOL OF HUMANITIES AND SOCIAL SCIENCES SHIV NADAR UNIVERSITY Graduate Prospectus M.Sc. and Ph.D. in Economics 2015-2016 CONTACT INFORMATION: Department of Economics, School of

More information

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics. Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 vzikas@cs.ucla.edu www.cs.ucla.edu/~vzikas Education 2006

More information

Ph.D. in Bioinformatics and Computational Biology Degree Requirements

Ph.D. in Bioinformatics and Computational Biology Degree Requirements Ph.D. in Bioinformatics and Computational Biology Degree Requirements Credits Students pursuing the doctoral degree in BCB must complete a minimum of 90 credits of relevant work beyond the bachelor s degree;

More information

C U R R I C U L U M V I T A E T R I V A N L E

C U R R I C U L U M V I T A E T R I V A N L E C U R R I C U L U M V I T A E T R I V A N L E Department of Computer Science, 253 Love Building Florida State University, Tallahassee, Florida 32306-4530, USA. Phone: (850) 345-6468, Fax: (850) 644-0058.

More information

CURRICULUM VITAE. NAME : S. MONIKANDAN DESIGNATION : Assistant Professor DATE OF BIRTH : 30-7-1974 MOBILE : 09751115699. EMAIL : monikandans@gmail.

CURRICULUM VITAE. NAME : S. MONIKANDAN DESIGNATION : Assistant Professor DATE OF BIRTH : 30-7-1974 MOBILE : 09751115699. EMAIL : monikandans@gmail. CURRICULUM VITAE NAME : S. MONIKANDAN DESIGNATION : Assistant Professor DATE OF BIRTH : 30-7-1974 MOBILE : 09751115699 EMAIL : monikandans@gmail.com ACADEMIC QUALIFICATIONS Ph.D (Mathematics) Manonmaniam

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs Software Engineering (B.S.S.E.) Goals of the Software Engineering Program The focus of the Software Engineering degree

More information

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,

More information

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus Graduate Council Document 03-24a Approved by the Graduate Council 11/20/03 Proposal for a Graduate Certificate in Information Assurance Education Track 2 Submitted by the School of Technology West Lafayette

More information

A SOFTWARE COMPARISON OF RSA AND ECC

A SOFTWARE COMPARISON OF RSA AND ECC International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138

More information

Study Program Handbook Mathematics

Study Program Handbook Mathematics Study Program Handbook Mathematics Bachelor of Science Jacobs University Undergraduate Handbook Math - Matriculation Fall 2015 Page: ii Contents 1 The Mathematics Study Program 1 1.1 Concept......................................

More information

COLLEGE OF PROFESSIONAL AND MATHEMATICAL STUDIES

COLLEGE OF PROFESSIONAL AND MATHEMATICAL STUDIES Dr. Mary Lesser, Dean COLLEGE OF PROFESSIONAL AND MATHEMATICAL STUDIES Dr. Timothy Goldberg, Chair DONALD AND HELEN SCHORT SCHOOL OF MATHEMATICS AND COMPUTING SCIENCES FACULTY: Professors Douglas Burkholder

More information

RICHARD KEVIN MAXWELL

RICHARD KEVIN MAXWELL RICHARD KEVIN MAXWELL EDUCATION Waynesburg College, Waynesburg, Pennsylvania Secondary Teacher Certification Program, August 1997 - May 1998 Student Teaching: West Greene Senior High School, Rogersville,

More information

CRYPTOGRAPHIC LONG-TERM SECURITY PERSPECTIVES FOR

CRYPTOGRAPHIC LONG-TERM SECURITY PERSPECTIVES FOR By JOHANNES BUCHMANN, ALEXANDER MAY, and ULRICH VOLLMER PERSPECTIVES FOR CRYPTOGRAPHIC LONG-TERM SECURITY Cryptographic long-term security is needed, but difficult to achieve. Use flexible cryptographic

More information

COMPUTER & INFORMATION TECHNOLOGY DEPARTMENT

COMPUTER & INFORMATION TECHNOLOGY DEPARTMENT COMPUTER & INFORMATION TECHNOLOGY DEPARTMENT Udvar-Hazy Business Building (435) 652-7723 http://cit.cs.dixie.edu/ To find faculty & staff phone numbers and email addresses, please consult the University

More information

University of Illinois at Chicago Office: SEO 521 Department of Mathematics, Statistics, (312) 413-2605 and Computer Science

University of Illinois at Chicago Office: SEO 521 Department of Mathematics, Statistics, (312) 413-2605 and Computer Science Andrew Suk Contact Information Research Interests Employment University of Illinois at Chicago Office: SEO 521 Department of Mathematics, Statistics, (312) 413-2605 and Computer Science suk@math.uic.edu

More information

Giulia Cereda. Mathematical Institute, Leiden University, Master thesis research project

Giulia Cereda. Mathematical Institute, Leiden University, Master thesis research project Giulia Cereda Personal Information Place and Date of Birth: Milano (Italy), April, 7 th 1988 Citizenship: Italian Current address: Av. de la Chabliere 21, 1004, Lausanne, Swizerland email: giulia.cereda@unil.ch

More information

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing S.Hemalatha, Dr.R.Manickachezian Ph.D Research Scholar, Department of Computer Science, N.G.M College, Pollachi,

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC

More information

Dong "Michelle" Li. Phone: +1 (413) 345-1278 Email: dongl@som.umass.edu

Dong Michelle Li. Phone: +1 (413) 345-1278 Email: dongl@som.umass.edu Dong "Michelle" Li Department of Operations & Information Management Isenberg School of Management University of Massachusetts Amherst Amherst, MA 01003, USA Phone: +1 (413) 345-1278 Email: dongl@som.umass.edu

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

More information

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst. Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.edu Overview Cryptanalysis Challenge Encryption: DES AES Message

More information

CURRICULUM VITAE Herbert L. Dershem

CURRICULUM VITAE Herbert L. Dershem CURRICULUM VITAE Visiting Professor of Computer Science United States Air Force Academy USAF Academy, CO 80840 Phone: (719) 472-3590 Education: B.S. University of Dayton, 1965 M.S. (Computer Science) Purdue

More information

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India

More information

A hard problem: Disclosing how to break public key cryptosystems

A hard problem: Disclosing how to break public key cryptosystems A hard problem: Disclosing how to break public key cryptosystems Audun Jøsang Abstract. New results in cryptanalysis are constantly being presented in the academic community, and this process poses no

More information

Erik Jonsson School of Engineering and Computer Science

Erik Jonsson School of Engineering and Computer Science Erik Jonsson School of Engineering and Computer Science Bachelor of Science in Computer Science (B.S.C.S.) Goals for the Computer Science Program The undergraduate Computer Science program is committed

More information

Stephanie A. Blanda 020 McAllister Building University Park, PA 16802 Email: sab466@psu.edu, Webpage: http://sblanda.weebly.com/

Stephanie A. Blanda 020 McAllister Building University Park, PA 16802 Email: sab466@psu.edu, Webpage: http://sblanda.weebly.com/ Stephanie A. Blanda 020 McAllister Building University Park, PA 16802 Email: sab466@psu.edu, Webpage: http://sblanda.weebly.com/ Education The Ph.D. Candidate in Mathematics with a minor in Computational

More information

Overview of CS Graduate Program Requirements. Jan Prins August 2015

Overview of CS Graduate Program Requirements. Jan Prins August 2015 Overview of CS Graduate Program Requirements Jan Prins August 2015 Types of Requirements The MS and PhD program have the following categories of requirements 1. Background 2. Course requirements (breadth

More information

DEPARTMENT OF ECONOMICS SCHOOL OF HUMANITIES AND SOCIAL SCIENCES SHIV NADAR UNIVERSITY. Graduate Prospectus Masters and Ph.D.

DEPARTMENT OF ECONOMICS SCHOOL OF HUMANITIES AND SOCIAL SCIENCES SHIV NADAR UNIVERSITY. Graduate Prospectus Masters and Ph.D. DEPARTMENT OF ECONOMICS SCHOOL OF HUMANITIES AND SOCIAL SCIENCES SHIV NADAR UNIVERSITY Graduate Prospectus Masters and Ph.D. in Economics 2014-2015 CONTACT INFORMATION: Department of Economics, School

More information

June Zhang (Zhong-Ju Zhang)

June Zhang (Zhong-Ju Zhang) (Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: junez@andrew.cmu.edu http://users.ece.cmu.edu/~junez

More information

Degree Type Bachelor of Interdisciplinary Studies (BIS) Degree Title Life Science with UTeach Certification (4-8)

Degree Type Bachelor of Interdisciplinary Studies (BIS) Degree Title Life Science with UTeach Certification (4-8) Degree Type Bachelor of Interdisciplinary Studies (BIS) Degree Title Life Science with UTeach Certification (4-8) The Department of Biology is committed to excellence in instruction, scholarly accomplishment,

More information

DEPARTMENT OF COMPUTER SCIENCE

DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF COMPUTER SCIENCE Faculty of Engineering DEPARTMENT OF COMPUTER SCIENCE MSc REGULATIONS AND PROCEDURES (Revised: September 2013) TABLE OF CONTENTS 1. MSC ADMISSION REQUIREMENTS 1.1 Application

More information

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology

More information

Heather C. Smith. Education. Publications. Academic Positions

Heather C. Smith. Education. Publications. Academic Positions Heather C. Smith +1 (803) 200 1624 smithhc5@mailbox.sc.edu people.math.sc.edu/smithhc5 My primary interests lie in combinatorics and graph theory. Current projects include topics of computational complexity,

More information

UML BASED MODELING OF ECDSA FOR SECURED AND SMART E-GOVERNANCE SYSTEM

UML BASED MODELING OF ECDSA FOR SECURED AND SMART E-GOVERNANCE SYSTEM UML BASED MODELING OF ECDSA FOR SECURED AND SMART E-GOVERNANCE SYSTEM Abhishek Roy [1] and Sunil Karforma [2] [1] Department of Computer Science, The University of Burdwan, W.B, INDIA. Department of Computer

More information

Courses and Seminars Taught. Jan van Leeuwen. Department of Information and Computing Science Utrecht University, Utrecht, the Netherlands

Courses and Seminars Taught. Jan van Leeuwen. Department of Information and Computing Science Utrecht University, Utrecht, the Netherlands Courses and Seminars Taught Jan van Leeuwen Department of Information and Computing Science Utrecht University, Utrecht, the Netherlands version: May 2013 1969-1971 Teaching assistance for graduate and

More information

CRYPTOG NETWORK SECURITY

CRYPTOG NETWORK SECURITY CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;

More information

A blind digital signature scheme using elliptic curve digital signature algorithm

A blind digital signature scheme using elliptic curve digital signature algorithm A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department

More information

Mobile Network Security Technology Research Center Kyungpook National University

Mobile Network Security Technology Research Center Kyungpook National University The sprit of Truth, Pride, and Service Mobile Network Security Technology Research Center Kyungpook National University June 2006 History June, 2000 August, 2000 Applied for the University Information

More information

Elizabeth A. Arnold. Academic Experience. Education

Elizabeth A. Arnold. Academic Experience. Education Elizabeth A. Arnold Department of Mathematics and Statistics James Madison University Harrisonburg, VA 22807 (540) 568-6532 http://www.math.jmu.edu/~arnoldea arnoldea@math.jmu.edu Academic Experience James

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Dr. (CA) Sanjib Kumar Basu

Dr. (CA) Sanjib Kumar Basu Dr. (CA) Sanjib Kumar Basu Qualification: M. Com, FCA, Ph. D Designation: Associate Professor Department: Commerce ( and Finance) Phone: 91-33-22551248 E-mail address: basu.sk@sxccal.edu Profile: Dr. Sanjib

More information

M.Sc. Program in Informatics and Telecommunications

M.Sc. Program in Informatics and Telecommunications M.Sc. Program in Informatics and Telecommunications at UoA-DIT Prof. Ioannis Stavrakakis Deputy Dept Chair, Director of Graduate Studies 1 Overview of Graduate Studies Initiated in 1993 Modified in 2000

More information

Teaching and Related Experience

Teaching and Related Experience Emese Kennedy May 2015 (Expected) Dec. 2013 May 2010 2013 present 2013 present Education Ph.D. Candidate, Applied Mathematics, North Carolina State University, Advisor: Dr. Hien Tran Dissertation Title:

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

MATHEMATICS. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Degree Requirements

MATHEMATICS. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Degree Requirements MATHEMATICS Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Paul Feit, PhD Dr. Paul Feit is Professor of Mathematics and Coordinator for Mathematics.

More information

Fully homomorphic encryption equating to cloud security: An approach

Fully homomorphic encryption equating to cloud security: An approach IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach

More information

WORKSHOP ON SUPPLY CHAIN MANAGEMENT 4 th February 2015 to 8 th February 2015 at IIT Kanpur, INDIA CONDUCTED BY

WORKSHOP ON SUPPLY CHAIN MANAGEMENT 4 th February 2015 to 8 th February 2015 at IIT Kanpur, INDIA CONDUCTED BY WORKSHOP ON SUPPLY CHAIN MANAGEMENT 4 th February 2015 to 8 th February 2015 at IIT Kanpur, INDIA CONDUCTED BY Industrial and Management Engineering (IME) Department, Indian Institute of Technology Kanpur,

More information

Department of Mathematical Sciences

Department of Mathematical Sciences Department of Mathematical Sciences http://www.utdallas.edu/nsm/math/ Faculty Professors: Larry P. Ammann, Sam Efromovich, M. Ali Hooshyar, Patrick L. Odell (Emeritus), Istvan Ozsvath, Viswanath Ramakrishna,

More information

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

Yevgeny Goncharov WORK EXPERIENCE

Yevgeny Goncharov WORK EXPERIENCE Yevgeny Goncharov Quantitative Risk Management 181 West Madison Street 41 st Floor Chicago, Illinois 60602 Phone: (312) 782-7716 yevgeny.goncharov@qrm.com WORK EXPERIENCE Academic Background 1998 2003

More information

Undergraduate Mathematics Programs at OSU April 2014

Undergraduate Mathematics Programs at OSU April 2014 1 Undergraduate Mathematics Programs at OSU April 2014 The Department of Mathematics at OSU offers a Bachelor of Science degree in mathematics, a minor in mathematics, and a minor in actuarial science.

More information

Review Of Secure And Privacy Preserving DRM Scheme

Review Of Secure And Privacy Preserving DRM Scheme International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Special Issue-2, April 2016 E-ISSN: 2347-2693 Review Of Secure And Privacy Preserving DRM Scheme Bhavana S.

More information

2015-2016 M.S. IN APPLIED PHYSICS AND COMPUTER SCIENCE

2015-2016 M.S. IN APPLIED PHYSICS AND COMPUTER SCIENCE 2015-2016 M.S. Dr. David Heddle, Graduate Program Coordinator Luter Hall 309 david.heddle@cnu.edu (757) 594-8434 The Master of Science in Applied Physics and Computer Science is built around a core of

More information

Curriculum Vitae. Education. Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, 5 56127 Pisa (Cosenza)

Curriculum Vitae. Education. Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, 5 56127 Pisa (Cosenza) Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, 5 56127 Pisa (Cosenza) paladino@mail.dm.unipi.it Curriculum Vitae Born in Cosenza on August 13, 1980 Education Dec 2008

More information

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a

More information

Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data

Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data V.Abinaya PG Scholar Kalasalingam Institute of Technology Krishnankoil. V.Ramesh Assistant professor Kalasalingam

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

More information

CSCE Undergraduate Advising Handbook 2014-2015

CSCE Undergraduate Advising Handbook 2014-2015 CSCE Undergraduate Advising Handbook 2014-2015 Departmental Contacts: Department Head Dr. Susan Gauch, sgauch@uark.edu Associate Department Head Dr. Gordon Beavers, gordonb@uark.edu Main Office 479-575-6197

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Curriculum Vitae of. Vicky G. Papadopoulou

Curriculum Vitae of. Vicky G. Papadopoulou Curriculum Vitae of Vicky G. Papadopoulou Personal Information Full Name: Vicky G. Papadopoulou Home Address: Odysseos 23, Strovolos, PO Box 2040, Nicosia, Cyprus Phones: Office: +357 22 713046 Email:

More information

Invited Conference Talk (20m), A Comparison of Heuristics for Solving Problems in Approximate

Invited Conference Talk (20m), A Comparison of Heuristics for Solving Problems in Approximate John P. May Department of Computer and Information Sciences University of Delaware, Newark, DE 1-302-831-1957 (work), 1-410-810-1825 (home) jpmay@udel.edu http://www.cis.udel.edu/ jpmay/ Born: August 5th,

More information

A Factoring and Discrete Logarithm based Cryptosystem

A Factoring and Discrete Logarithm based Cryptosystem Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques

More information

Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE.

Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE. Straddling the Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE. E R I C J O D O I N B S I D E S O T T A WA 2 0 1

More information

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf

More information

New in online. Ground Realities. admission table. DULEEP DEOSTHALE, PhD

New in online. Ground Realities. admission table. DULEEP DEOSTHALE, PhD admission table New in online Engineering marketing & India: Ground Realities admissiontable.com DULEEP DEOSTHALE, PhD Co Founder and Vice President International Education Co Founder and Vice President

More information

RESUME. Name : Pinaki Mitra. Date of birth : 1 st January, 1966

RESUME. Name : Pinaki Mitra. Date of birth : 1 st January, 1966 RESUME Name : Pinaki Mitra Date of birth : 1 st January, 1966 Address: Department of Computer Sc. & Engg. IIT Guwahati North Guwahati Guwahati 781039. Phone # (011-91-361) 258-4352 (Res) (011-91-361) 258-2352

More information