AI/ML Technology | Cyber Defence & Cryptanalysis Automation | SAG |
Safety & security system using deep learning and computer vision | PXE |
Application Security | Analysis of (Telecommunication Electronics Material Protected from Emanating Spurious Transmission) TEMPEST Attacks on PC Monitors and Mobile Devices | SAG |
Exploring Newer Micro-architectural Attacks | SAG |
Screaming Channel Analysis on Mixed Signal Integrated Circuits | SAG |
Blockchain Security | Blockchain for Defence Applications - Access Control & Trust Management | DYSL-AI |
Cryptography | Encryption for Military IoT | SAG |
Hackproof Cryptography based on Honey Encryption | SAG |
Node encryption/ decryption based communication Security | CAIR |
Post Quantum Cryptography | CAIR |
Cryptology | Automation of Cryptanalysis and Traffic Analysis | SAG |
Bio-Inspired Cryptography Algorithms | SAG |
Homographic Encryption Algorithms | SAG |
Post Quantum Cryptosystems and Protocols | SAG |
Side Channel Leakage Analysis on Quantum Key Distribution, Crypto Algoritms and Communication Channels | SAG |
Security Evaluation | Security Analysis of Blockchain Networks | SAG |
Suite of tools for Network Security Assurance | SAG |
AI-enabled Tools for Automating Security Assesment | SAG |
Evaluation of Trustworthiness of AI-enabled Systems | SAG |
Formal Methods for Information Security Testing and Assurance | SAG |
Security Evaluation of Critical Information Storage Systems | SAG |
Security Evaluation of Smart Devices on Public Networks | SAG |
Application Security | Development of PUF chips, security documentation and masks for production | CAIR |