27th to 29th May 2019 (3 Days)
1. Carry out Directed Basic Research and develop Tools and Techniques in the area of Cryptology and Secure Protocols.
2. Provide a Platform for translating basic research into Prototypes for data security and analysis.
3. Act as a bridge between Academia and Government organizations for collaborative R&D towards Product development.
4. Provide Consultancy Services and Training on Cyber Security matters for Business, Government and Critical Infrastructure Sectors.
Dillibabu Shanmugam and Suganya Annadurai, "Crypto Primitives IPCore Implementation susceptibility in Cyber Physical System," in IEEE International Symposium on Smart Electronic Systems (IEEE-iSES) 2018.
M. Sivapriya, N. Nalla Anandakumar and M. Nirmala Devi, "Key Retrieval from AES Architecture through Hardware Trojan Horse," in 6th international conference on Security in Computing and Communications (SSCC-2018), Pages 483—494.
Osmanbey Uzunkol and Jothi Rangasamy and Lakshmi Kuppusamy, "HideP: A secure non-interactive fully verifiable delegation scheme for modular exponentiations via CRT," in 21st Information Security Conference (ISC 2018), Pages 250-267.
N.Nalla Anandakumar, M.Prem Laxman Das, S.K. Sanadhya and M.S. Hashmi, "Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve," ACM Transactions on Reconfigurable Technology and Systems, 2018.
Sanjit Chatterjee and M Prem Laxman Das and Kabaleeshwaran, "Converting pairing-based cryptosystems from composite to prime order setting - a comparative analysis," Journal of Mathematical Cryptology, 2018.