-Security and Trust of Public Key Cryptography Options for HIP
-Opportunities in White-Box Cryptography -Security of entanglement based version of BB84 protocol for Quantum Cryptograph y -Implementation of secure key distribution based on quantum cryptography -Finite Field Arithmetic for Cryptography -Teaching Cryptography-based Software Developing with Open-source Software -Fidelity analysis of quantum cloning based attacks in quantum cryptography -Chaos theory and its application in modern cryptography -Multilevel access control in defense messaging system using Elliptic curve cryp tography -Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Base d Cryptography -Taking Flexible and Diverse Approaches to Get Undergraduate Students Interested in Cryptography Course -TIBC: Trade-off between Identity-Based and Certificateless Cryptography for fut ure internet -Error correction over wireless channels using symmetric cryptography -A Provably Secure Threshold Ring Signature Scheme in Certificateless Cryptograp hy -9866318017