Skip to main content

Cross-Cutting Thrusts: Cryptography

Projects List

Automatic Code Generation for Block Ciphers
Cross Cutting Thrusts: Cryptography
Researchers: Markus PĆ¼schel

Contractual Anonymity
Research Area: Trustworthy Computing Platforms and Devices | Privacy Protection
Cross Cutting Thrusts: Cryptography
Researchers: David Brumley, Jonathan McCune

Data Confidentiality, Privacy, and Security
Research Area: Privacy Protection
Cross Cutting Thrusts: Cryptography
Researcher: Stephen Fienberg

Efficient, Secure Encryption Implementations
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher: Ken Mai

Fast Correlation Filtering for Biometric Recognition
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Cryptography
Researcher: Vijayakumar Bhagavatula

Improved Biometric Encryption by Using Correlation Filters
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Cryptography
Researcher: Vijayakumar Bhagavatula

Inherently Trojan-Resistant Integrated Circuit Architectures
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher: Ken Mai

Malicious Fault-Immune Cryptographic Hardware Implementation
Cross Cutting Thrusts: Cryptography
Researcher: Diana Marculescu

On Privacy and Compliance
Research Area: Privacy Protection
Cross Cutting Thrusts: Cryptography
Researchers: Anupam Datta, Zeliha Dilsun Kaynar

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security | Cryptography
Researchers: Michael Farb, Adrian Perrig, Jonathan McCune, Tiffany Hyun-Jin Kim, Yue-Hsun Lin

Secure, Reliable, Efficient Physical Unclonable Functions
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Cryptography
Researcher: Ken Mai

Verifiable Properties of Computations Outsourced to the Cloud
Cross Cutting Thrusts: Cryptography
Researchers: Virgil Gligor, Anupam Datta, Amit Vasudevan