A three day National Workshop on Cryptology was held during September 6-8, 2007 at Amrita Vishwa Vidyapeetham Coimbatore. The event was co sponsored by CRSI, Kolkota and was organized by AMRITA TIFAC-CORE in Cyber Security.

DAY – 1: September 6, 2007

Session 1:

Prof. Bimal Roy, Dean, Indian Statistical Institute mentioned about how Authorized users (traitors) can create pirate copies and distribute them to unauthorized users. The highlights were preventing authorized users to produce unauthorized copies and to trace the source of piracy if unauthorized copies are created.

Session 2:

Dr. Sanjay Burman , CAIR discussed about the issues in realizing secure systems for real world. He pointed out the insufficiency of  using standard compliant strong cryptographic primitives to build real life systems. Muralee Krishnan,Kerala spoke about the generic stream cipher which uses mathematically modified password immune to conventional attacks.

Session 3:

Bhupendra Singh, CAIR, Bangalore presented “A Class of Cryptographically Significant Large Bijective Mappings That Have Practical Hardware Realization”. Sushmita Ruj, ISI, Kolkata spoke on “Key Predistribution Using Block Designs In Wireless Sensor Networks “. Prof. Rajendra Hegadi, Rajiv Gandhi Institute of Technology, Bangalore presented “Encoding Access Control Mechanism Key Using Tribes of Gaussian or Rational Farey Fractions”

DAY – 2: September 7, 2007 

Session 4:

Prof.R.Balasubramanian, Director, IMSc talked about Elliptic Curve Cryptology and Prof. Bimal Roy on Stream Ciphers

Session 5:

Prof. Dipanwita Roy Choudhury, IIT Kharagpur presented a talk on New Paradigms for key mixings in Ciphers

Session 6:

Radhika K.,IISc, Bangalore spoke on the topic Anonymity with individuality. Dhiman Saha, IIT Kharagpur discussed about  Side Channel Attack Setup - Different Issues for SPA and DPA. Debdeep Mukhopadhyay, IIT Kharagpur, spoke about An Efficient Architecture for Cryptographically Robust n X k (k > n/2) Mappings.

Session 7:

Jaydeb Bhaumik, IIT Kharagpur, highlighted An Integrated Approach for Message Authenticated Error Correction Code. Vadiraja Bhatta G. R., MACS, Surathkal mentioned about Permutations of Finite Fields and Finite Rings as Generators of Pseudorandom Numbers. Prof. Dipanwita Roy Choudhury spoke about Effect of Timing and Simple Power Analysis Attacks on Elliptic Curve Crypto Devices. Mahabir Prasad Jhanwar, ISI, Kolkata talked about A Public Key Encryption Scheme without Random Oracles.Prasad J.C., FISAT, Ernakulam presented Grid Security System.

DAY – 3: September 8, 2007

Session 8:
Prof. C. Pandu Rangan, IIT Chennai gave a talk on Perfect Secure Message Transmission. Sampath Kumar, TCS focused on Triple I and Cryptography.

Chungath Srinivasan, Amrita Vishwa Vidyapeetham presented Joint Linear Complexity and k-error Joint Linear Complexity of Multisequences. Divya Anand, Amrita Vishwa Vidyapeetham discussed Study of Identity Management Systems.

Event Details
Date: 
2007-09-06 09:00 to 2007-09-08 16:30
ORGANIZED BY:
Center: 
TIFAC CORE in Cyber Security
Campus: 
Coimbatore
207
PROGRAMS
OFFERED
6
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS