Students pursuing research in field of Cryptography |
Full Time Students |
S.No. | Student | Research Topic | Institution Name |
1
| Swati Maurya | Cyber Security | Guru Gobind Singh Indraprastha University, Delhi |
2
| Barnana Baruah | Reliability of Third Party in Security Protocols | Indian Institute of Information Technology, Guwahati |
3
| SAHASRANAND K R | Distributed Statistical Inference with Interactive Communication | Indian Institute of Science, Bangalore |
4
| Nikhil Krishnan Muralee Krishnan | Application of coding theory to distributed storage | Indian Institute of Science, Bangalore |
5
| MYNA VAJHA | Coding in the time of Big Data | Indian Institute of Science, Bangalore |
6
| SONALI | Performance Enhancement of Wireless Optical Communication Systems using Error Correcting Codes | Indian Institute of Technology, Delhi |
7
| AMITESH SINGH RAJPUT | Color transfer in encrypted domain for multi-view image and video stitching | Indian Institute of Technology, Roorkee |
8
| Renu Mary Daniel | Design and Cryptanalysis of Public Key Cryptosystems based on Elliptic and Conic Curves | Karunya Institute of Technology and Sciences, Coimbatore |
9
| Dave Jay | Secure Data Deduplication for Cloud Based Storage | Malaviya National Institute of Technology, Jaipur |
10
| Apurva S Kittur | Batch Verification of Digital Signatures in IoT | National Institute of Technology, Karnataka, Surathkal |
11
| Routhu Srinivasa Rao | Study on Website Phishing and their Countermeasures | National Institute of Technology, Karnataka, Surathkal |
12
| Mamta | Secure Searchable Encryption | National Institute of Technology, Kurukshetra |
13
| Aakanksha Tewari | Security and Privacy in IoT Networks and its Applications | National Institute of Technology, Kurukshetra |
14
| Somya Ranjan Sahoo | INFORMATION AND CYBER SECURITY | National Institute of Technology, Kurukshetra |
15
| Kavita Sharma | Defense Mechanisms against Various attacks in Mobile Devices | National Institute of Technology, Kurukshetra |
16
| Sharmistha Adhikari | Content Centric Network (CCN): Its security aspects and design of some security solutions using Elliptic Curve Cryptography (ECC) | National Institute of Technology, Sikkim |
17
| Hem Kumar D | Privacy Preserving in Trajectory Data Publishing | National Institute of Technology, Warangal |
18
| Subhrajyoti Deb | Design and Analysis of Lightweight Stream Ciphers | North Eastern Hill University, Shillong |
19
| Mohammad Faiz Iqbal Faiz | Android App Collusion Detection | North Eastern Regional Institute of Science and Technology, Arunachal Pradesh |
20
| Mukti Kaushal Shah | Searchable Encryption | Sardar Vallabhbhai National Institute of Technology, Surat |
21
| Birru Srinivas | A Novel Key Management Schemes for Wireless Sensor Networks | University of Hyderabad, Hyderabad |
22
| Nallabothu Shiva Krishna | SECRET SHARING SCHEMES : A MODERN APPROACH | University of Hyderabad, Hyderabad |
23
| Mohit Gupta | Authentication and key agreement protocol for mobile network | Visvesvaraya National Institute of Technology, Nagpur |
Part Time Students |
S.No. | Student | Research Topic | Institution Name |
1
| Salim Istyaq | NOVEL HYBRID GRAPHICAL USER AUTHENTICATION SCHEMES | Aligarh Muslim University, Aligarh |
2
| Mohd. Imran | A Novel Hybrid Crypto-Biometric Authentication System | Aligarh Muslim University, Aligarh |
3
| Anupam Pattanayak | Scheduling of Wireless Body Area Network enabled User to Hospital Service Provider | Indian Institute of Information Technology, Guwahati |
4
| Vishesh Pratap Gaikwad | Authentication Technique for Telecare Medicine Information System | Indian Institute of Information Technology, Nagpur |
5
| OM PAL | Study of Cryptographic Key Management in perspective of Cyber Security | Jamia Millia Islamia, Delhi |
6
| B.ida Seraphim | Data Stream Based Intrusion Detection System | Sri Ramaswamy Memorial Institute of Science and Technology, Tamil Nadu |