Students pursuing research in field of Cryptography
Full Time Students
S.No.StudentResearch TopicInstitution Name
1
Swati MauryaCyber SecurityGuru Gobind Singh Indraprastha University, Delhi
2
Barnana BaruahReliability of Third Party in Security ProtocolsIndian Institute of Information Technology, Guwahati
3
SAHASRANAND K RDistributed Statistical Inference with Interactive CommunicationIndian Institute of Science, Bangalore
4
Nikhil Krishnan Muralee KrishnanApplication of coding theory to distributed storageIndian Institute of Science, Bangalore
5
MYNA VAJHACoding in the time of Big DataIndian Institute of Science, Bangalore
6
SONALIPerformance Enhancement of Wireless Optical Communication Systems using Error Correcting CodesIndian Institute of Technology, Delhi
7
AMITESH SINGH RAJPUTColor transfer in encrypted domain for multi-view image and video stitchingIndian Institute of Technology, Roorkee
8
Renu Mary DanielDesign and Cryptanalysis of Public Key Cryptosystems based on Elliptic and Conic CurvesKarunya Institute of Technology and Sciences, Coimbatore
9
Dave JaySecure Data Deduplication for Cloud Based StorageMalaviya National Institute of Technology, Jaipur
10
Apurva S KitturBatch Verification of Digital Signatures in IoTNational Institute of Technology, Karnataka, Surathkal
11
Routhu Srinivasa RaoStudy on Website Phishing and their CountermeasuresNational Institute of Technology, Karnataka, Surathkal
12
MamtaSecure Searchable EncryptionNational Institute of Technology, Kurukshetra
13
Aakanksha TewariSecurity and Privacy in IoT Networks and its ApplicationsNational Institute of Technology, Kurukshetra
14
Somya Ranjan SahooINFORMATION AND CYBER SECURITYNational Institute of Technology, Kurukshetra
15
Kavita SharmaDefense Mechanisms against Various attacks in Mobile DevicesNational Institute of Technology, Kurukshetra
16
Sharmistha AdhikariContent Centric Network (CCN): Its security aspects and design of some security solutions using Elliptic Curve Cryptography (ECC)National Institute of Technology, Sikkim
17
Hem Kumar DPrivacy Preserving in Trajectory Data PublishingNational Institute of Technology, Warangal
18
Subhrajyoti DebDesign and Analysis of Lightweight Stream CiphersNorth Eastern Hill University, Shillong
19
Mohammad Faiz Iqbal FaizAndroid App Collusion DetectionNorth Eastern Regional Institute of Science and Technology, Arunachal Pradesh
20
Mukti Kaushal ShahSearchable EncryptionSardar Vallabhbhai National Institute of Technology, Surat
21
Birru SrinivasA Novel Key Management Schemes for Wireless Sensor NetworksUniversity of Hyderabad, Hyderabad
22
Nallabothu Shiva KrishnaSECRET SHARING SCHEMES : A MODERN APPROACHUniversity of Hyderabad, Hyderabad
23
Mohit GuptaAuthentication and key agreement protocol for mobile networkVisvesvaraya National Institute of Technology, Nagpur
Part Time Students
S.No.StudentResearch TopicInstitution Name
1
Salim IstyaqNOVEL HYBRID GRAPHICAL USER AUTHENTICATION SCHEMESAligarh Muslim University, Aligarh
2
Mohd. ImranA Novel Hybrid Crypto-Biometric Authentication SystemAligarh Muslim University, Aligarh
3
Anupam PattanayakScheduling of Wireless Body Area Network enabled User to Hospital Service ProviderIndian Institute of Information Technology, Guwahati
4
Vishesh Pratap GaikwadAuthentication Technique for Telecare Medicine Information SystemIndian Institute of Information Technology, Nagpur
5
OM PALStudy of Cryptographic Key Management in perspective of Cyber SecurityJamia Millia Islamia, Delhi
6
B.ida SeraphimData Stream Based Intrusion Detection SystemSri Ramaswamy Memorial Institute of Science and Technology, Tamil Nadu
Back to Top