A three day National Workshop on Cryptology was held during September 6-8, 2007 at Amrita Vishwa Vidyapeetham Coimbatore. The event was co sponsored by CRSI, Kolkota and was organized by AMRITA TIFAC-CORE in Cyber Security.
Prof. Bimal Roy, Dean, Indian Statistical Institute mentioned about how Authorized users (traitors) can create pirate copies and distribute them to unauthorized users. The highlights were preventing authorized users to produce unauthorized copies and to trace the source of piracy if unauthorized copies are created.
Dr. Sanjay Burman , CAIR discussed about the issues in realizing secure systems for real world. He pointed out the insufficiency of using standard compliant strong cryptographic primitives to build real life systems. Muralee Krishnan,Kerala spoke about the generic stream cipher which uses mathematically modified password immune to conventional attacks.
Bhupendra Singh, CAIR, Bangalore presented “A Class of Cryptographically Significant Large Bijective Mappings That Have Practical Hardware Realization”. Sushmita Ruj, ISI, Kolkata spoke on “Key Predistribution Using Block Designs In Wireless Sensor Networks “. Prof. Rajendra Hegadi, Rajiv Gandhi Institute of Technology, Bangalore presented “Encoding Access Control Mechanism Key Using Tribes of Gaussian or Rational Farey Fractions”
Prof.R.Balasubramanian, Director, IMSc talked about Elliptic Curve Cryptology and Prof. Bimal Roy on Stream Ciphers
Prof. Dipanwita Roy Choudhury, IIT Kharagpur presented a talk on New Paradigms for key mixings in Ciphers
Radhika K.,IISc, Bangalore spoke on the topic Anonymity with individuality. Dhiman Saha, IIT Kharagpur discussed about Side Channel Attack Setup - Different Issues for SPA and DPA. Debdeep Mukhopadhyay, IIT Kharagpur, spoke about An Efficient Architecture for Cryptographically Robust n X k (k > n/2) Mappings.
Jaydeb Bhaumik, IIT Kharagpur, highlighted An Integrated Approach for Message Authenticated Error Correction Code. Vadiraja Bhatta G. R., MACS, Surathkal mentioned about Permutations of Finite Fields and Finite Rings as Generators of Pseudorandom Numbers. Prof. Dipanwita Roy Choudhury spoke about Effect of Timing and Simple Power Analysis Attacks on Elliptic Curve Crypto Devices. Mahabir Prasad Jhanwar, ISI, Kolkata talked about A Public Key Encryption Scheme without Random Oracles.Prasad J.C., FISAT, Ernakulam presented Grid Security System.
Prof. C. Pandu Rangan, IIT Chennai gave a talk on Perfect Secure Message Transmission. Sampath Kumar, TCS focused on Triple I and Cryptography.
Chungath Srinivasan, Amrita Vishwa Vidyapeetham presented Joint Linear Complexity and k-error Joint Linear Complexity of Multisequences. Divya Anand, Amrita Vishwa Vidyapeetham discussed Study of Identity Management Systems.