Bit
slice technique for implementing AES in Intel Core-2
Implementing Poly1305 using floating
point registers of�
Athlon64
Stream cipher implementations using the SMID instructions
Implement the PELICAN MAC
Implement Shamirs Authentication for RFID Tags (meet
me for the paper)
Outsourced Data-Bases
Study the
algorithms, their feasibility and come up with an implementation
Privacy
Preserving Queries on Encrypted Data
Efficiently Searchable and
Deterministic Searchable Encryption Scheme
Stinsons Visual Cryptology Page