Final Project Reports
- Attacking Byte AI: Market Analysis
- Deniz Sert, Laura Landon, William Yang
- Scales of AI Covert Communication
- Xiaoman Ding, Joshua Engels, Anna Yang
- Secrets and Spies: Secure Multiparty Computation for Two Spies
- Kosi Nwabueze, Felix Prasanna, and Frederick Tang
- BLE
- Caden Gradek, Yiqing Du, Rishab Parthasarathy, Arnold Su
- Quantum Fully Homomorphic Encryption
- Rebecca Chang, Thomas Guo, Evan Ren
- Generalizing Yao’s XOR Lemma from Multicalibration
- Rohan Goyal, Jaehyun Koo, John Kuszmaul, Alex Luchianov
- PathDHES: Directed Hypergraph Encryption Scheme for Shortest B-Path Queries
- Samuel Florin, Andrei Marginean, Lukas Rapp, Anastasiia Struss
- Keyless Blockchain
- Alex Zhao, Kshitij Sodani, Tony Wu, Thomas Liu
- Impact of Generative AI on the Cyber Kill Chain
- Cynthia Zhang, Darren Yao, Hyunwoo Lee, Luisa Pan
- GIF Steganography by Manipulating Transparent Pixels
- Aloysius Ng, Angelina Wu, Iris Shi, Tristan Kay
- The Twisted Dual Elliptic Curve Deterministic Random Bit Generator
- Holden Mui, Linus Tang, Noah Walsh
- Hybrid Post-Quantum Variation of OpenID
- Zitong Chen, Shreya Thipireddy, Chon Hou (Jophy) Ye
- Encrypt What Matters: ROI-Guided FHE for CNN Inference
- Ali Backour, Juan Reyes, Jaime Punyed, and Ana Onoprishvili
- Anonymous Kerberos Authentication
- Carol Chen, Evan Hong, Luis Turino
- RADIUS Accounting Considered Harmful
- Andrew Lee, Selena Qiao, Maggie Yao
- Verifiable Audits of Large Language Models’ Chain-of-Thought
- David Langus Rodriguez, Daniel Nurieli, Michael Gerovitch
- Tiptoe++: A Learning-Augmented Protocol for Private Vector Search
- Xiaochen Zhu, Vihan Lakshman, Dewei Feng, Sarah Mokhtar
- Threshold voting protocol
- Vlada Petrusenko, Liza Horokh, Pranjal Srivastava, Nyx Theos Haile
Course website design courtesy of PDOS and Katrina LaCurts.