Final Project Reports

Attacking Byte AI: Market Analysis
Deniz Sert, Laura Landon, William Yang
Scales of AI Covert Communication
Xiaoman Ding, Joshua Engels, Anna Yang
Secrets and Spies: Secure Multiparty Computation for Two Spies
Kosi Nwabueze, Felix Prasanna, and Frederick Tang
BLE
Caden Gradek, Yiqing Du, Rishab Parthasarathy, Arnold Su
Quantum Fully Homomorphic Encryption
Rebecca Chang, Thomas Guo, Evan Ren
Generalizing Yao’s XOR Lemma from Multicalibration
Rohan Goyal, Jaehyun Koo, John Kuszmaul, Alex Luchianov
PathDHES: Directed Hypergraph Encryption Scheme for Shortest B-Path Queries
Samuel Florin, Andrei Marginean, Lukas Rapp, Anastasiia Struss
Keyless Blockchain
Alex Zhao, Kshitij Sodani, Tony Wu, Thomas Liu
Impact of Generative AI on the Cyber Kill Chain
Cynthia Zhang, Darren Yao, Hyunwoo Lee, Luisa Pan
GIF Steganography by Manipulating Transparent Pixels
Aloysius Ng, Angelina Wu, Iris Shi, Tristan Kay
The Twisted Dual Elliptic Curve Deterministic Random Bit Generator
Holden Mui, Linus Tang, Noah Walsh
Hybrid Post-Quantum Variation of OpenID
Zitong Chen, Shreya Thipireddy, Chon Hou (Jophy) Ye
Encrypt What Matters: ROI-Guided FHE for CNN Inference
Ali Backour, Juan Reyes, Jaime Punyed, and Ana Onoprishvili
Anonymous Kerberos Authentication
Carol Chen, Evan Hong, Luis Turino
RADIUS Accounting Considered Harmful
Andrew Lee, Selena Qiao, Maggie Yao
Verifiable Audits of Large Language Models’ Chain-of-Thought
David Langus Rodriguez, Daniel Nurieli, Michael Gerovitch
Tiptoe++: A Learning-Augmented Protocol for Private Vector Search
Xiaochen Zhu, Vihan Lakshman, Dewei Feng, Sarah Mokhtar
Threshold voting protocol
Vlada Petrusenko, Liza Horokh, Pranjal Srivastava, Nyx Theos Haile

Course website design courtesy of PDOS and Katrina LaCurts.