Number Theory and Cryptography, Computer and Information Security, Algorithm Design and Analysis, Computational Complexity, Financial Mathematics



Similar documents
Dr. Shashank Srivastava. Contact. Telephone: Teaching. Courses Taught: Current Courses: Past Courses:

Information Security and Cryptography

Brian Alan Snyder, Ph. D.

Harrisonburg, VA 22807

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

ACM Survey on PhD Production in India in Computer Science

Curriculum Vitae. Assistant Professor, Indian Statistical Institute, New Delhi, India since July 2010.

Curriculum Vitae Peter Andrews

Opportunities in Computer Science

Nicholas J. Hopper. Thesis title: Toward A Computational Theory of Steganography

3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis. 4. Algorithms for linear algebra problems over principal ideal rings

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA (857)

Dr. Mohammad Amjad has obtained his B.Tech. in Computer Engineering from Aligarh Muslim University Aligarh, India in 1997 with first class.

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

Faculty Details proforma for DU Web-site

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography

Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD

COMPUTER SCIENCE. Department of Mathematics & Computer Science

DEPARTMENT OF MATHEMATICS

GTEM TRAINING PROGRAM

Table of Contents. Bibliografische Informationen digitalisiert durch

University of Sussex School of Mathematical and Physical Sciences. Mathematics.

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

INTERNSHIPS in SCIENCE, TECHNOLOGY and ENGINEERING

Graduate Programs. Dept of Computer Science. Dr. Weining Zhang

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

Curriculum Vitae. Rohini Kumar

DEPARTMENT OF ECONOMICS SCHOOL OF HUMANITIES AND SOCIAL SCIENCES SHIV NADAR UNIVERSITY. Graduate Prospectus M.Sc. and Ph.D.

Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

Ph.D. in Bioinformatics and Computational Biology Degree Requirements

C U R R I C U L U M V I T A E T R I V A N L E

CURRICULUM VITAE. NAME : S. MONIKANDAN DESIGNATION : Assistant Professor DATE OF BIRTH : MOBILE : monikandans@gmail.

Evaluating The Performance of Symmetric Encryption Algorithms

2. Cyber security research in the Netherlands

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

A SOFTWARE COMPARISON OF RSA AND ECC

Study Program Handbook Mathematics

COLLEGE OF PROFESSIONAL AND MATHEMATICAL STUDIES

RICHARD KEVIN MAXWELL

CRYPTOGRAPHIC LONG-TERM SECURITY PERSPECTIVES FOR

COMPUTER & INFORMATION TECHNOLOGY DEPARTMENT

University of Illinois at Chicago Office: SEO 521 Department of Mathematics, Statistics, (312) and Computer Science

Giulia Cereda. Mathematical Institute, Leiden University, Master thesis research project

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

CPSC 467b: Cryptography and Computer Security

Dong "Michelle" Li. Phone: +1 (413)

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

CURRICULUM VITAE Herbert L. Dershem

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme

A hard problem: Disclosing how to break public key cryptosystems

Erik Jonsson School of Engineering and Computer Science

Stephanie A. Blanda 020 McAllister Building University Park, PA Webpage:

Overview of CS Graduate Program Requirements. Jan Prins August 2015

DEPARTMENT OF ECONOMICS SCHOOL OF HUMANITIES AND SOCIAL SCIENCES SHIV NADAR UNIVERSITY. Graduate Prospectus Masters and Ph.D.

June Zhang (Zhong-Ju Zhang)

Degree Type Bachelor of Interdisciplinary Studies (BIS) Degree Title Life Science with UTeach Certification (4-8)

DEPARTMENT OF COMPUTER SCIENCE

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Heather C. Smith. Education. Publications. Academic Positions

UML BASED MODELING OF ECDSA FOR SECURED AND SMART E-GOVERNANCE SYSTEM

Courses and Seminars Taught. Jan van Leeuwen. Department of Information and Computing Science Utrecht University, Utrecht, the Netherlands

CRYPTOG NETWORK SECURITY

A blind digital signature scheme using elliptic curve digital signature algorithm

Mobile Network Security Technology Research Center Kyungpook National University

Elizabeth A. Arnold. Academic Experience. Education

MEng, BSc Applied Computer Science

Dr. (CA) Sanjib Kumar Basu

M.Sc. Program in Informatics and Telecommunications

Teaching and Related Experience

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

MATHEMATICS. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Degree Requirements

Fully homomorphic encryption equating to cloud security: An approach

WORKSHOP ON SUPPLY CHAIN MANAGEMENT 4 th February 2015 to 8 th February 2015 at IIT Kanpur, INDIA CONDUCTED BY

Department of Mathematical Sciences

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

COURSE TITLE COURSE DESCRIPTION

Yevgeny Goncharov WORK EXPERIENCE

Undergraduate Mathematics Programs at OSU April 2014

Review Of Secure And Privacy Preserving DRM Scheme

M.S. IN APPLIED PHYSICS AND COMPUTER SCIENCE

Curriculum Vitae. Education. Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, Pisa (Cosenza)

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CSCE Undergraduate Advising Handbook

Strengthen RFID Tags Security Using New Data Structure

Curriculum Vitae of. Vicky G. Papadopoulou

Invited Conference Talk (20m), A Comparison of Heuristics for Solving Problems in Approximate

A Factoring and Discrete Logarithm based Cryptosystem

Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE.

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME

Dept. of Financial Information Security

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

New in online. Ground Realities. admission table. DULEEP DEOSTHALE, PhD

RESUME. Name : Pinaki Mitra. Date of birth : 1 st January, 1966

Transcription:

RESEARCH INTERESTS Number Theory and Cryptography, Computer and Information Security, Algorithm Design and Analysis, Computational Complexity, Financial Mathematics EXPERIENCE Assistant Professor, May 2012 - Present C.R.Rao Advanced Institute of Mathematics, Statistics and Computer Science (AIMSCS), Hyderabad, India Visiting Faculty, Indian Institute of Technology, Hyderabad, India Honorary Lecturer, University of Hyderabad, Hyderabad, India August 2013 - Present January 2013 - Present Graduate Lecturer / Assistant, Aug 2003 - May 2012 University of Minnesota (UMN), Minneapolis, MN, USA Lectured, held recitations and labs, and graded various advanced graduate and undergraduate courses including Probability, Calculus, Analysis (real & complex), Differential Equations, Algebra, Linear Algebra, Finite Fields, Mathematical Logic, Cryptography (classical & quantum), Error correcting codes, Mathematical Theory Applied to Finance, and Computation, Algorithms, & Coding in Finance Please visit http://www.math.umn.edu/~vishal/teaching/ for details. Mentor, June 2010 - Aug 2010 Interdisciplinary Research Experience for Undergraduates, Institute of Mathematics and its Applications (IMA), UMN Research Assistant, May 2007 - Aug 2007 Intelligent Storage Consortium, Digital Technology Center (DTC), UMN Research Visitor, July 2006 - Aug 2006 Center for Discrete Mathematics and Theoretical Computer Science (DIMACS), Rutgers University, Piscataway, NJ Research Fellow, June 2006 - Aug 2006 Minnesota Center for Industrial Mathematics (MCIM), UMN Research Scholar, Aug 2000 - July 2003 Tata Institute of Fundamental Research (TIFR), Bombay Page 1 of 7

EDUCATION Ph.D. - Cryptography, GPA: 3.88/4.00, May 2012 University of Minnesota (UMN), Minneapolis, MN, USA Advisor : Prof. Andrew Odlyzko M.S. - Computer Science, GPA: 3.84/4.00, Aug 2007 Department of Computer Science and Engineering, UMN M.S. - Mathematics, GPA: 3.91/4.00, Aug 2007 School of Mathematics, UMN P.G.Certificate in Statistical Methods and Applications, First Class, July 2000 Indian Statistical Institute, Calcutta B.Sc. - Mathematics, with Honors, July 2000 St. Xavier's College, University of Calcutta, Calcutta PUBLICATIONS (INTERNATIONAL JOURNALS) Analysis-Preserving Protection of User Privacy against Information Leakage of Social-Network Likes with F.Buccafurri, L.Fotia, and G.Lax. Information Sciences 328, Elsevier 2015 http://dx.doi.org/10.1016/j.ins.2015.08.046 An Anonymous Proxy Multi-signature with Accountability (Book chapter) with R.A.Sahu, E-Business and Telecommunications, CCIS 554, Springer, 2015 http://dx.doi.org/10.1007/978-3-319-25915-4 A Secure Anonymous Proxy Signcryption Scheme In submission PUBLICATIONS (INTERNATIONAL CONFERENCES) Public-Key Encryption with Searchable Keywords based on Jacobi Symbols with G.D.Crescenzo, IndoCrypt 2007, LNCS 4859, Springer, 2007 Anonymous Signatures Revisited with A.Yun, ProvSec 2009, LNCS 5848, Springer, 2009 Remote Cache-timing Attacks on AES with D.Feldman, D.F.Kune, and S.Das, CS2, HiPEAC 2014, ACM, 2014 A Secure Anonymous Proxy Multi-signature Scheme with R.A.Sahu, Secrypt 2014, SciTePress, 2014 How to Leak a Secret and Reap the Rewards too with S.K.Pandey, LatinCrypt 2014, LNCS 8895, Springer, 2014 Secure and Efficient Scheme for Delegation of Signing Rights with R.A.Sahu, ICICS 2014, LNCS 8958, Springer, 2014 Practical and Secure Integrated PKE+PEKS with Keyword Privacy with F.Buccafurri, G.Lax and R.A.Sahu. Secrypt 2015, SciTePress, 2015 Strengthening NTRU Against Message Recovery Attacks Arithmetic 2015: Elliptic curves, diophantine geometry, and arithmetic dynamics, Brown University, Providence, RI, USA, 2015 Efficient and Secure Many-to-One Signature Delegation (To appear) with R.A.Sahu, ICICS 2015, LNCS, Springer, 2015 Page 2 of 7

FUNDED PROJECTS / RESEARCH EXPEDITIONS Attacks on Elliptic Curve Discrete Log Problem, June 2015 - Present Funding agency: Defence Research & Development Organisation, Govt. of India Post Quantum Cryptology, Oct 2014 - Present Funding agency: Defence Research & Development Organisation, Govt. of India SUBMITTED PROJECTS / RESEARCH EXPEDITIONS Remote Cache Timing Attacks on AES Implementation of Attacks on Discrete Log Problem using Function Field Sieve OTHER CURRENT / RECENT PROJECTS Side Channel Cryptanalysis (of block/stream ciphers) Development of an Indigenous Lightweight Block Cipher May 2012 - Present May 2012 - Present Design of a Lattice Based Cryptosystem May 2012 - Sep 2013 Software Methodologies for Lattice Based Cryptanalysis May 2012 - Sep 2013 PAST PROJECTS Counterparty Credit Risk in Over-The-Counter Derivatives January 2012 Minnesota Center for Financial and Actuarial Mathematics (MCFAM), UMN Pursuit Evasion Games with Multiple Pursuers June 2010 - Aug 2010 Institute of Mathematics and its Applications (IMA), UMN Secure and Efficient Long Term Data Management May 2007 - May 2008 Intelligent Storage Consortium, Digital Technology Center, UMN Long Term Key Management May 2007 - May 2008 Intelligent Storage Consortium, Digital Technology Center, UMN Applied Remote Cache-timing Attacks against AES Sept 2006 - May 2007 Institute of Technology, UMN Cryptographic Multi-linear Maps Jan 2005 - May 2005 Institute of Technology, UMN Basic Lie Theory Aug 2000 - July 2003 School of Mathematics, Tata Institute of Fundamental Research, Bombay Engel Curve Analysis of Expenditure of Employees of ISI, Calcutta, Indian Statistical Institute, Kolkata Jan 2000 - June 2003 Page 3 of 7

INVITED TALKS AND SEMINARS Invited Talk September 21-22, 2013 Refresher Course in Mathematical Sciences, UGC-Academic Staff College, University of Hyderabad, Hyderabad Invited Talk May 18-22, 2015 CRSI National Instructional Workshop on Cryptology, HPU, Shimla Invited Talk June 5-9, 2014 CRSI National Instructional Workshop on Cryptology, MNNIT, Allahabad Invited Talk March 10-15, 2014 Instructional Workshop on Graph Theory and its Applications to Visual Cryptography, Kalasalingam University, Krishnankoil Invited Seminar January 23, 2014 Birla Institute of Technology & Science, Pilani - Goa Invited Seminar January 01, 2014 B. V. Raju Institute of Technology, Hyderabad Invited Talk November 07, 2013 Cyber Security, ADHYAYAN 2013, AMSSOI, Hyderabad Invited Seminar October 25, 2013 School of Computer and Information Sciences, University of Hyderabad Invited Talk October 03, 2013 Faculty Development Program on Information Security and Cyber Forensics, GITAM Institute of Technology, Vishakhapatnam Invited Talk September 04-05, 2013 Refresher Course in Mathematical Sciences, UGC-Academic Staff College, University of Hyderabad, Hyderabad Invited Talk March 07-09, 2013 Refresher Course in Mathematical Sciences, UGC-Academic Staff College, University of Mysore, Mysore Invited Talk May 16, 2010 Young Researchers Meet on Mathematics and Computer Science, Brown University, Providence, RI, USA Invited Talk January 12, 2010 Workshop on Generic Ring Algorithms, Horst-Görtz Institute for IT Security, Ruhr-University-Bochum, Germany Invited Talk December 12, 2007 IndoCrypt 2007, 8th International Conference on Cryptology in India, Indian Institute of Technology, Chennai Page 4 of 7

WORKSHOPS AND SEMINARS ORGANIZED/CONDUCTED Code Based Crypto Workshop 2015 September 2015 International workshop jointly organized by CRRao AIMSCS and SAG DRDO Training on Elliptic Curves March 2015 for scientists of the Scientific Analysis Group (SAG, DRDO), New Delhi Training on Block Cipher Design July 2014 for scientists of the Cabinet Secretariat, New Delhi Training on Lattice-based Cryptosystems and Cryptanalysis March 2013 for scientists of Scientific Analysis Group (SAG, DRDO), New Delhi Training on Lattice-based Cryptosystems and Cryptanalysis January 2013 for scientists of Scientific Analysis Group (SAG, DRDO), New Delhi Training on Block Ciphers November 2012 for scientists of National Technical & Research Organization (NTRO), New Delhi Short course on Anonymous Identity-based Cryptosystem July-September 2012 for post-graduate research scholars at Student Number Theory Seminar 2004-2006 School of Mathematics, University of Minnesota, USA IMPORTANT WORKSHOPS AND TRAINING SCHOOLS ATTENDED International Workshop on Lattice-Based Cryptography December 2013 Organized by Microsoft Research, Bangalore International View of the State-of-the-Art of Cryptography and Security and its Use in Practice December 2013 Organized by Intel, Bangalore, India Financial Mathematics Modelling Workshop January 2012 Minnesota Center for Financial and Actuarial Mathematics, UMN (MCFAM) CIMPA School of Number Theory in Cryptography & its Applications July 2010 Kathmandu University, Nepal Workshop on Generic Ring Algorithms January 2010 Horst-Görtz Institute for IT Security, Ruhr University Bochum, Germany Young Researchers Meet on Mathematics and Computer Science May 2010 Brown University, Providence, RI, USA IMA Workshop on Complexity, Coding, and Communications April 2007 Institute of Mathematics and it Applications, UMN, Minneapolis, USA Computational Number Theory and Applications to Cryptography July 2006 Organized by NSF and IMA and RMMS and Fields Institute. Conducted at University of Wyoming, USA Page 5 of 7

INTERNATIONAL CONFERENCES ATTENDED Mathematics of Cryptography Irvine, CA, USA, August-September 2015 Crypto 2015: 35th International Cryptology Conference Santa Barbara, CA, USA, August 2015 Arithmetic 2015: Elliptic curves, Diophantine geometry, & arithmetic dynamics Brown University, Providence, RI, USA, August 2015 First International Conference on Integrated Approach to Counter-Terrorism (CTC 2015) Jaipur March 2015 IndoCrypt 2014: 15th International Conference on Cryptology in India Delhi, December 2014 ECC 2014: 18th Workshop On Elliptic Curve Cryptography Chennai October 2014 SeCrypt 2014: 11th International Conference on Security and Cryptography Vienna, Austria August 2014 DSCI Annual Information Security Summit New Delhi, December 2013 IndoCrypt 2013: 14th International Conference on Cryptology in India Mumbai December 2013 AsiaCrypt 2013: 19th Annual International Conference on Theory and Application of Cryptology and Information Security Bangalore December 2013 DSCI Best Practices Meet on Cyber Security Chennai July 2013 Conference in Number Theory Kolkata December 2012 IndoCrypt 2012: 13th International Conference on Cryptology in India Kolkata December 2012 3rd Worldwide Cyber Security Summit New Delhi October 2012 Crypto 2012: 32nd International Cryptology Conference Santa Barbara, CA, USA August 2012 Crypto 2009: 29th International Cryptology Conference Santa Barbara, CA, USA August 2009 Pairing: 6th International Conference on Pairing-Based Cryptography Palo Alto, CA, USA August 2009 Page 6 of 7

PROFESSIONAL MEMBERSHIPS Cryptology Research Society of India Life member AWARDS Full-tuition Scholarship and Assistantship 2003-2012 Graduate School, University of Minnesota, USA TIFR Alumni Association Scholarship for Career Development 2002-2003 School of Mathematics, Tata Institute of Fundamental Research, Bombay STUDENTS (CO)MENTORED V. Ram Chandra Prasad M.Tech Project, 2014-2015 Indian Institute of Technology, Hyderabad Abhishek Shukla M.Tech Project, 2014-2015 University of Hyderabad, Hyderabad Chetan Sharma M.Tech Project, 2014-2015 Sardar Patel University of Police, Security & Criminal Justice, Jodhpur Nitish Vyas M.Tech Project, 2014-2015 Sardar Patel University of Police, Security & Criminal Justice, Jodhpur Aaron Maurer IMA Interdisciplinary Research Experience for Undergraduates, 2010 Carleton College, Minnesota, USA John McCauleyIMA Interdisciplinary Research Experience for Undergraduates, 2010 Haverford College, Pennsylvania, USA Silviya Valeva IMA Interdisciplinary Research Experience for Undergraduates, 2010 Mount Holyoke College, Massachusetts, USA REFEREES Professor Andrew Odlyzko <odlyzko@umn.edu>, School of Mathematics, UMN Professor David Frank <frank@umn.edu>, School of Mathematics, UMN Professor Fadil Santosa <santosa@umn.edu>, Institute of Mathematics and its Applications, UMN Professor Scott Adams <adams005@umn.edu>, Minnesota Center for Financial and Actuarial Mathematics, UMN Professor Nicholas Hopper <hopper@cs.umn.edu>, Department of Computer Science and Engineering, UMN Page 7 of 7