Technology Category | Technology Development Task | Lab |
---|---|---|
AI/ML Technology | Cyber Defence & Cryptanalysis Automation | SAG |
Safety & security system using deep learning and computer vision | PXE | |
Application Security | Analysis of (Telecommunication Electronics Material Protected from Emanating Spurious Transmission) TEMPEST Attacks on PC Monitors and Mobile Devices | SAG |
Exploring Newer Micro-architectural Attacks | SAG | |
Development of PUF chips, security documentation and masks for production | CAIR | |
Screaming Channel Analysis on Mixed Signal Integrated Circuits | SAG | |
Blockchain Security | Blockchain for Defence Applications - Access Control & Trust Management | DYSL-AI |
Cryptography | Encryption for Military IoT | SAG |
Hackproof Cryptography based on Honey Encryption | SAG | |
Node encryption/ decryption based communication Security | CAIR | |
Post Quantum Cryptography | CAIR | |
Cryptology | Automation of Cryptanalysis and Traffic Analysis | SAG |
Bio-Inspired Cryptography Algorithms | SAG | |
Homographic Encryption Algorithms | SAG | |
Post Quantum Cryptosystems and Protocols | SAG | |
Side Channel Leakage Analysis on Quantum Key Distribution, Crypto Algoritms and Communication Channels | SAG | |
Security Evaluation | Security Analysis of Blockchain Networks | SAG |
Suite of tools for Network Security Assurance | SAG | |
AI-enabled Tools for Automating Security Assesment | SAG | |
Evaluation of Trustworthiness of AI-enabled Systems | SAG | |
Formal Methods for Information Security Testing and Assurance | SAG | |
Security Evaluation of Critical Information Storage Systems | SAG | |
Security Evaluation of Smart Devices on Public Networks | SAG |