Bit
slice technique for implementing AES in Intel Core-2
Implementing Poly1305 using floating
point registers of
Athlon64
Stream cipher implementations using the SMID instructions
Implement the PELICAN MAC
Implement Shamirs Authentication for RFID Tags (meet
me for the paper)
Outsourced Data-Bases
Study the
algorithms, their feasibility and come up with an implementation
Privacy
Preserving Queries on Encrypted Data
Efficiently Searchable and
Deterministic Searchable Encryption Scheme
Stinsons Visual Cryptology Page