MS/M.tech/M.sc THESIS SUPERVISION
S. No. |
Name |
Year of completion |
Title of the thesis |
University/ Institute |
MS /M.Tech / M.sc. |
Co-guides (if any) |
1. . |
Yun Zhou, Lu |
2008 |
A Variant of the Block
Cipher AES |
DCU, Ireland |
MS |
Prof. Martin Collier |
2. |
Zhang Yu |
2008 |
Pre Key-distribution for
DSNs |
DCU, Ireland |
MS |
Prof. Martin Collier |
3. |
Wei Wang |
2008 |
Improved
Cryptanalytic TMTO Algorithm Based on MS Method |
DCU, Ireland |
MS |
Prof. Martin Collier |
4. |
M. P. Ravikanth |
2011 |
Time-memory trade-off
cryptanalysis implementation |
IIT Kharagpur |
M.Tech |
NO |
5. |
S. Mondol |
2011 |
Cryptographic and
Combinatorial Properties of Boolean Functions and S-boxes |
IIT Kharagpur |
M.Tech |
NO |
6. |
V. K. Srivastava |
2011 |
Design and
implementation of new block chiper based on RC6 |
IIT Kharagpur |
M.Tech |
NO |
7. |
O. J. Babu |
2011 |
Design a secured
stream cipher based on RC4 |
IIT Kharagpur |
M.Tech |
NO |
8. |
S. Pritam |
2011 |
An introduction to pairing-based
cryptography |
IIT Kharagpur |
M.Sc. |
NO |
9. |
G.MAHESHWARI |
2011 |
Pedestrian Detection
for Video Surveillance |
IIT Kharagpur |
M.Sc. |
NO |
10. |
B. Dey |
2011 |
Making nonliear function using LFSRs |
IIT Kharagpur |
M.Sc. |
NO |
11. |
S. Kumar |
2011 |
The efficacy of
volatility forecasting models in Indian market |
IIT Kharagpur |
M.Sc. |
NO |
12. |
Rishikesh Sahay |
2011 |
Security in Digital Rights
Management |
IIIT, Bhubaneswar |
M.Tech |
YES |
13. |
Deepak Kumar |
2011 |
Digital Rights Management |
IIIT, Bhubaneswar |
M.Tech |
YES |
14. |
Maneesh
Kumar |
2012 |
Visual
cryptography for black and white images |
IIT Kharagpur |
M.Tech |
NO |
15. |
RAHUL KUMAR SHARMA |
2012 |
Proposal of
New Block Cipher Algorithm Based on AES |
IIT Kharagpur |
M.Tech |
NO |
16. |
Kul
Bhushan Mishra |
2012 |
Study and Implementation of
Search Engine |
IIT Kharagpur |
M.Tech |
NO |
17. |
Sanket
Deshmukh |
2012 |
Mergers, Acquisitions: An experience of Indian
Pharmaceuticals Industry |
IIT Kharagpur |
M.Tech |
YES |
18. |
Mikesh
Udani |
2012 |
Blind
Speaker Diarization: Segmentation and Clustering of
Speech Data using BIC and Independent Component Analysis |
IIT Kharagpur |
M.Sc. |
NO |
19. |
Kalyan
Asis Sahoo |
2012 |
Graphical Model and Forecasting of Stock Market Price |
IIT Kharagpur |
M.Sc. |
NO |
20. |
Ajay Kumar |
2012 |
On Primality of Numbers |
IIT Kharagpur |
M.Sc. |
NO |
21. |
Rohith
Mohan |
2012 |
A Mathematical Model for Market Share Maintenance Strategies
in an Oligopoly Competition |
IIT Kharagpur |
M.Sc. |
NO |
22. |
Sourav
Biswas |
2012 |
Usage of GPUs in Machine Learning
Algorithms and Implementation of a
Speech Recognizer |
IIT Kharagpur |
M.Sc. |
YES |
23. |
Pratish
Datta |
2012 |
CRYPTOGRAPHICALLY SECURE
BOOLEAN FUNCTION: ANALYSIS AND DESIGN |
IIT Kharagpur |
M.Sc. |
NO |
24. |
Sumit
Kumar Debnath |
2012 |
A NEW MODES OF OPERATION FOR BULK
ENCRYPTION |
IIT Kharagpur |
M.Sc. |
NO |
25. |
Piyali
Bhar |
2012 |
A study on RSA crypto
system |
IIT Kharagpur |
M.Sc. |
NO |
26. |
Sanny
Kumar |
2013 |
Face Recognition using PCA and Eigen face Approach |
IIT Kharagpur |
M.Sc. |
NO |
27. |
Tanuj Thakral |
2013 |
Customer Lead Scoring Analysis using Classification Tree |
IIT Kharagpur |
M.Sc. |
NO |
28. |
Ayushi
Singh Rathore |
2013 |
Financial Time Series Analysis Using ARCH and GARCH Modelling |
IIT Kharagpur |
M.Sc. |
NO |
29. |
Rakesh Inampudi |
2013 |
ANALYTICAL STUDY OF PORTFOLIO MANAGEMENT
&INVESTMENT DECISION |
IIT Kharagpur |
M.Sc. |
NO |
30. |
NISHANT KUMAR |
2013 |
Generation and
Distribution of Random and Unique Account number for Bank Account Portability |
IIT Kharagpur |
M.Sc. |
NO |
31. |
RAGHAV BASHAMBHU |
2013 |
Pre-Packed Floor Rule Recommender in Real-Time Bidding (with advertiser
level rules) |
IIT Kharagpur |
M.Sc. |
NO |
32. |
Aakash
Manpuria |
2013 |
A study on Visual Cryptography for
black and white images |
IIT Kharagpur |
M.Sc. |
NO |
33. |
rahul dalmia |
2013 |
Mathematical Model using Graphs
and Cross-Ownership Data to find Keiretsu |
IIT Kharagpur |
M.Sc. |
NO |
34. |
Tarun Rathi |
2013 |
Implementation and Improvisation of a Deterministic
Polynomial time Primality Testing Algorithm |
IIT Kharagpur |
M.Sc. |
NO |
35. |
shrestha Pratik |
2013 |
IMPLEMENTATION and ADVANTAGES of
ELLIPTIC CURVE Cryptosystem |
IIT Kharagpur |
M.Sc. |
NO |
36. |
Neeraj Daswani |
2013 |
Study & Appraisal of
Forecasting Techniques for Minimizing Total Supply Chain Costs |
IIT Kharagpur |
M.Sc. |
NO |
37. |
archisman sahoo |
2013 |
Towards Optimal
Double length Hash Functions |
IIT Kharagpur |
M.Sc. |
NO |
38. |
bipul karnani |
2013 |
Opinion Mining From Text |
IIT Kharagpur |
M.Sc. |
Yes |
39. |
Rimon Chandra |
2013 |
STUDY ON BENT &
NEGABENT FUNCTION |
IIT Kharagpur |
M.Sc. |
NO |
40. |
Lipi Baskey |
2013 |
Attacks on Stream Cipher |
IIT Kharagpur |
M.Sc. |
NO |
41. |
Moumita Mandal |
2013 |
POINTS ON ELLIPTIC
CURVE CRYPTOSYSTEM |
IIT Kharagpur |
M.Sc. |
NO |
42. |
Snigdha Karmakar |
2013 |
A Study on Knapsack
Cryptosystem |
IIT Kharagpur |
M.Sc. |
NO |
43. |
Pintu patra |
2013 |
Rijndael & Its Dual Ciphers |
IIT Kharagpur |
M.Tech |
NO |
44. |
Gaurav Tyagi |
2013 |
Making of Nonlinear
Generators for LFSR Based Stream Cipher using Boolean Function |
IIT Kharagpur |
M.Tech |
NO |
45. |
Vinod kumar Kashyap |
2013 |
A
PAIRING-FREE INDENTITY BASED AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING |
IIT Kharagpur |
M.Tech |
NO |
46. |
Ashish Kumar Garg |
2013 |
Study and Implementation of
a Search Engine |
IIT Kharagpur |
M.Tech |
NO |
47. |
Monika Tyagi |
2014 |
RSA Cryptosystem |
IIT Kharagpur |
M.Tech |
NO |
48. |
Sandeep Kumar |
2014 |
Making of Nonlinear Generators for LFSR Based Stream
Cipher using Boolean Function |
IIT Kharagpur |
M.Tech |
NO |
49. |
Mrinmoy Rakshit |
2014 |
Improvement of the security of the Diffie Hellman Key exchange algorithm |
IIT Kharagpur |
M.Tech |
NO |
50. |
Naba Kumar Sahoo |
2014 |
A
Modification of RC6 Block Cipher Algorithm for Data Security |
IIT Kharagpur |
M.Tech |
NO |
51. |
MINHAJUL ISLAM |
2014 |
A Deterministic Polynomial Time
Algorithm: (AKS Algorithm and its implementation) |
IIT Kharagpur |
M.Sc
(2Yr) |
NO |
52. |
Sunil Barman |
2014 |
Elliptic Curve Cryptography |
IIT Kharagpur |
M.Sc
(2Yr) |
NO |
53. |
SAUMYA SINHA |
2014 |
Natural Language Understanding And Intent Recognition In E-Commerce
Sites |
IIT Kharagpur |
M.Sc |
NO |
54. |
ROHIT KUMAR |
2014 |
Parallel
Implementation of the Push- Relabel Max Flow Algorithm |
IIT Kharagpur |
M.Sc |
NO |
55. |
VETSA SAI ANUROOP |
2014 |
AN EXPOSITION
AND IMPLEMENTATION OF AKS ALGORITHM |
IIT Kharagpur |
M.Sc |
NO |
56. |
RAHUL SHARMA |
2014 |
Development
of a Framework for
a Personalized Semantic Search Engine |
IIT Kharagpur |
M.Sc |
NO |
57. |
NITESH KUMAR |
2014 |
Named
Entity Recognition in MASC-1 with SVM |
IIT Kharagpur |
M.Sc |
NO |
58. |
SIDDHARTH HEMBROM |
2014 |
Enterprise
Resource Planning System (ERP System) using JAVA and SQL |
IIT Kharagpur |
M.Sc |
NO |
59. |
UTKARSH
AKHOURI |
2014 |
DERIVATIVE PRICING USING HIDDEN MARKOV MODELLING |
IIT Kharagpur |
M.Sc |
NO |
60. |
Jangkhohao Haokip |
2014 |
SECURE SMS SOFTWARE |
IIT Kharagpur |
M.Sc |
NO |
61. |
TEDDU KRANTHI KUMAR |
2015 |
MULTI- FACTOR
CUED CLICK POINT GRAPHICAL PASSWORD AUTHENTICATION SYSTEM |
IIT Kharagpur |
M.Sc
(5Yr.) |
NO |
62. |
BOLLAM VINAY KUMAR |
2015 |
Mining Public
Consumer Forums to Analyze Market Structure |
IIT Kharagpur |
M.Sc
(5Yr.) |
NO |
63. |
SUMIT CHANDANI |
2015 |
Link Prediction
Problem in Social Networks & Recommendations |
IIT Kharagpur |
M.Sc
(5Yr.) |
NO |
64. |
BHANESHWAR SINGH |
2015 |
EME with
Linear Mixing: A Misuse Resistant Parallel Authenticated Encryption |
IIT Kharagpur |
M.Tech |
NO |
65. |
DHARMINDER |
2015 |
Advanced
Encryption Standard Modes of Operation |
IIT Kharagpur |
M.Tech |
NO |
66. |
RAKES MANNA |
2015 |
ANALYSIS AND
PROPOSED MODIFICATION ON A STREAM CIPHER: GRAIN |
IIT Kharagpur |
M.Tech |
NO |
67. |
RINTU MAITY |
2015 |
IMPLEMENTATION
OF STREAM CIPHERS USING T-FUNCTION |
IIT Kharagpur |
M.Tech |
NO |
Last
updated in 2015