Term Paper Topics CAP606

  • Published on
    15-Nov-2015

  • View
    216

  • Download
    4

Embed Size (px)

DESCRIPTION

networks

Transcript

Sheet1SerialNoRegisterationNumberNameRollNumberCryptovirology111308259Amit ThakurRD1E32A01Genetic Cryptography211308546Ravi KumarRD1E32A02Block cipher Modes of Operation311300812Mohd AmirRD1E32A03Random Number Generation411308798Charanpreet SinghRD1E32A04Elliptic Curve cryptography511309074Shruti MahajanRD1E32A05KERBEROS611303654Bhavna SharmaRD1E32A06Different types of cryptanalysis711303695Nitesh ParbhakarRD1E32A07Data Compression Using ZIP811306042Manjit SinghRD1E32A08Rotational Cryptanalysis911306408Anil Kumar SinghRD1E32A09Differential cryptanalysis1011400286Tarun Manhas RD1E32A23SSL and TLS1111400939Rahul ThakkarRD1E32A27Elliptic Curve cryptography1211401690Samuel LallawmzualaRD1E32A35quantum cryptography1311401712Subhash Pal SinghRD1E32A36Different types of attack made on AES1411401783Rohan KumarRD1E32A41Different types of attack made on Twofish1511401788Sushant KumarRD1E32A42Different types of attack made on MARS1611401816Sunita RD1E32A43Different types of attack made on Serpent1711401852Pandav Kishan RameshbhaiRD1E32A44Different types of attack made on RC61811402039Manoj KumarRD1E32A45Rational Cryptography1911402273NarinderRD1E32A46ID based cryptography2011402723Abee SinglaRD1E32A48Anti-Phishing Techniques2111403850Mandeep Kaur RD1E32A49SHA-3 competition and Sha-3 finalist2211405694Embok Paia RamdeRD1E32A50biclique cryptanalysis2311405931Baljeet Kaur RD1E32A51boomerang attack2411405939ShilpaRD1E32A52Rainbow table2511406324Monika BhallaRD1E32A53Anonymous internet banking2611407709GurpreetRD1E32A54AEAD block cipher modes of operation2711408582Ravi TiwariRD1E32A55birthday attack2811409125Gurinder Kaur RD1E32A58bit flipping attack2911412331Vikrant KumarRD1E32A60Bit-torrent protocol encryption3011404839Suthar Dilipkumar MangarambhaiRD1E32A61Working of TLS protocol3111102072Gaurav PalRD1E32B10DiffieHellman key exchange3211103012Dheeraj Kumar PandeyRD1E32B11Digital timestamping3311108212Parvej AkhtarRD1E32B12Digital watermarking3411108568Abhishek RD1E32B13Integral cryptanalysis3511108985Shashank Chandra SamaiyarRD1E32B14Internet key exchange3611109373Akarsh TiwariRD1E32B15pairing based cryptography3711110152Anuj Kumar SahuRD1E32B16Robot certificate authority3811111934Rahul KumarRD1E32B17related key attack3911112151Sakesh KumarRD1E32B18replay attack4011112261Ashutosh KumarRD1E32B19Secure remote password protocol4111114176Gagan ChoudhuryRD1E32B20Undeniable signature4211000517Amritansh Shankar SinghRD1E32B21Zero-knowledge password proof 4311400441Kaniz Zohra AjmaliRD1E32B24XML Encryption4411400471Rimi BiswasRD1E32B25Cryptovirology4511400523Harpreet KaurRD1E32B26Genetic Cryptography4611401062Agresh PandeyRD1E32B29Block cipher Modes of Operation4711401163Ravi Bhushan SinghRD1E32B30Random Number Generation4811401232Mayank BhandariRD1E32B31Elliptic Curve cryptography4911401252Aman TyagiRD1E32B32Bit-torrent protocol encryption5011401492Mohd. AmirRD1E32B33Working of TLS protocol5111401498Rohan SunejaRD1E32B34related key attack5211401744Gautam MarwahaRD1E32B37replay attack5311401749Palvi VermaRD1E32B38Secure remote password protocol5411401752Sandeep Ohri RD1E32B39Bitcoin and cryptocurrency5511401755Anurag BatraRD1E32B40quantum cryptography5611402526Manpreet Kaur RD1E32B47Different types of attack made on AES5711408710Maninder Singh RD1E32B56Digital Certificates5811408713Varinderjit Singh DoadRD1E32B57Different types of cryptanalysis5911411977Akash BhartiRD1E32B59side Channel Attack

Recommended

View more >