CS588: Cryptology - Principles and Applications, Fall 2001
Lectures |
Manifests |
Problem Sets |
Projects |
Resources |
Syllabus |
Challenges |
Calendar
|
Team 1: Timing Attacks on Elliptic Curve Cryptosystems (ECC) Project Presentations
Zhijian Lu, Matthew Mah, Michael Neve, Eric PeetersTeam 2: CipherChess
Adam Glaser, Emilio Lahr-Vivaz, Error McEachronTeam 3 - Security in Sensor Networks
Tracy Barger, David Friedman, and Stavan ParikhTeam 4 - SSH Keystrokes
Mike Hogye, Thad Hughes, Josh Sarfaty, Joe WolfTeam 5 - Steganography [requires Office XP for full animations]
Jon Erdman, Eric Hutchins, Stephen Liang, Portman WillsTeam 6 - De-Clawing Carnivore
Dante Guanlao, Mike Tashbook, Leonard Woody, Dana WortmanTeam 7 - UVa Healtcare System: Medical Privacy
Keen Browne, Allison Esclapez, Eugene Lebanidze, Haiyong Wang, Jim ZengTeam 8 - National ID Card
Saud Asad Khan Bangash, Michael Cuvelier, Chris Marinak, Adam SowersTeam 9 - Security Flaws in ITC's Public Labs [Note: slides hidden until ITC has a chance to fix these problems]
John Calandrino, Samir Roy, Brian WalshTeam 10 - Digital Watermarking for Music
Rob Farraher, Ken Pickering, Lim Vu
University of Virginia Department of Computer Science CS 588: Cryptology - Principles and Applications |
David Evans evans@virginia.edu |