Students pursuing research in field of Cryptography
Full Time Students
S.No.StudentResearch TopicInstitution Name
1
Swati MauryaCyber SecurityGuru Gobind Singh Indraprastha University, Delhi
2
Barnana BaruahReliability of Third Party in Security ProtocolsIndian Institute of Information Technology, Guwahati
3
MYNA VAJHACoding in the time of Big DataIndian Institute of Science, Bangalore
4
SAHASRANAND K RDistributed Statistical Inference with Interactive CommunicationIndian Institute of Science, Bangalore
5
Nikhil Krishnan Muralee KrishnanApplication of coding theory to distributed storageIndian Institute of Science, Bangalore
6
Amit GoyalFormal Approaches for Realizing Robust Secure Software SystemsIndian Institute of Technology, Bombay
7
SONALIPerformance Enhancement of Wireless Optical Communication Systems using Error Correcting CodesIndian Institute of Technology, Delhi
8
AMITESH SINGH RAJPUTColor transfer in encrypted domain for multi-view image and video stitchingIndian Institute of Technology, Roorkee
9
Renu Mary DanielDesign and Cryptanalysis of Public Key Cryptosystems based on Elliptic and Conic CurvesKarunya Institute of Technology and Sciences, Coimbatore
10
Dave JaySecure Data Deduplication for Cloud Based StorageMalaviya National Institute of Technology, Jaipur
11
Apurva S KitturBatch Verification of Digital Signatures in IoTNational Institute of Technology, Karnataka, Surathkal
12
Routhu Srinivasa RaoStudy on Website Phishing and their CountermeasuresNational Institute of Technology, Karnataka, Surathkal
13
Aakanksha TewariSecurity and Privacy in IoT Networks and its ApplicationsNational Institute of Technology, Kurukshetra
14
MamtaSecure Searchable EncryptionNational Institute of Technology, Kurukshetra
15
Kavita SharmaDefense Mechanisms against Various attacks in Mobile DevicesNational Institute of Technology, Kurukshetra
16
Somya Ranjan SahooINFORMATION AND CYBER SECURITYNational Institute of Technology, Kurukshetra
17
Sharmistha AdhikariContent Centric Network (CCN): Its security aspects and design of some security solutions using Elliptic Curve Cryptography (ECC)National Institute of Technology, Sikkim
18
Hem Kumar DPrivacy Preserving in Trajectory Data PublishingNational Institute of Technology, Warangal
19
Subhrajyoti DebDesign and Analysis of Lightweight Stream CiphersNorth Eastern Hill University, Shillong
20
Mohammad Faiz Iqbal FaizAndroid App Collusion DetectionNorth Eastern Regional Institute of Science and Technology, Arunachal Pradesh
21
Mukti Kaushal ShahSearchable EncryptionSardar Vallabhbhai National Institute of Technology, Surat
22
Nallabothu Shiva KrishnaSECRET SHARING SCHEMES : A MODERN APPROACHUniversity of Hyderabad, Hyderabad
23
Birru SrinivasA Novel Key Management Schemes for Wireless Sensor NetworksUniversity of Hyderabad, Hyderabad
24
Mohit GuptaAuthentication and key agreement protocol for mobile networkVisvesvaraya National Institute of Technology, Nagpur
Part Time Students
S.No.StudentResearch TopicInstitution Name
1
Salim IstyaqNOVEL HYBRID GRAPHICAL USER AUTHENTICATION SCHEMESAligarh Muslim University, Aligarh
2
Mohd. ImranA Novel Hybrid Crypto-Biometric Authentication SystemAligarh Muslim University, Aligarh
3
Anupam PattanayakScheduling of Wireless Body Area Network enabled User to Hospital Service ProviderIndian Institute of Information Technology, Guwahati
4
Vishesh Pratap GaikwadAuthentication Technique for Telecare Medicine Information SystemIndian Institute of Information Technology, Nagpur
5
OM PALStudy of Cryptographic Key Management in perspective of Cyber SecurityJamia Millia Islamia, Delhi
6
B.ida SeraphimData Stream Based Intrusion Detection SystemSri Ramaswamy Memorial Institute of Science and Technology, Tamil Nadu
Back to Top