Dr. Kirill Morozov
Associate Professor
University of North Texas
Department of Computer Science and Engineering
(940) 565-2268
Email: Kirill.Morozov@unt.edu
Education
-
PhD, University of Aarhus, 2005
Major: Science
Specialization: Computer Science/Cryptography
Dissertation: On Cryptographic Primitives Based on Noisy Channels -
MSc, Saint-Petersburg State University of Telecommunications, Russia, 1998
Major: Radiophysics and Electronics
Dissertation: Implementation of the RSA Public-Key Cryptosystem (in Russian)
Professional Memberships
- International Association for Cryptologic Research. (November 1, 2009 - Present).
- The Institute of Electronics, Information and Communication Engineers. (July 1, 2007 - Present).
Teaching
Teaching Experience
- CSCE 3550 - Introduction to Computer Security, 10 courses.
- CSCE 4050 - Applications of Cryptography, 9 courses.
- CSCE 4890 - Directed Study, 1 course.
- CSCE 4930 - Topics in Computer Science and Engineering, 1 course.
- CSCE 4999 - Senior Thesis, 5 courses.
- CSCE 5050 - Applications of Cryptography, 14 courses.
- CSCE 5550 - Introduction to Computer Security, 10 courses.
- CSCE 5900 - Special Problems, 1 course.
- CSCE 5933 - Topics in Computer Science and Engineering, 1 course.
- CSCE 5934 - Directed Study, 3 courses.
- CSCE 5950 - Master's Thesis, 5 courses.
- CSCE 6940 - Individual Research, 6 courses.
- CSCE 6950 - Doctoral Dissertation, 6 courses.
University of North Texas
Directed Student Learning
- Major Professor, Computer Science and Engineering. (January 8, 2021).
- Major Professor, Computer Science and Engineering. (December 18, 2020).
- Major Professor, Computer Science and Engineering. (November 23, 2020).
- Major Professor, Computer Science and Engineering. (November 1, 2020).
- Major Professor, Computer Science and Engineering. (October 1, 2020).
- Major Professor, Computer Science and Engineering. (October 1, 2020).
- Doctoral Advisory Committee Member, Computer Science and Engineering. (July 15, 2020).
- Major Professor, Computer Science and Engineering. (April 20, 2020).
- Major Professor, Computer Science and Engineering. (April 20, 2020).
- Major Professor, Computer Science and Engineering. (March 27, 2020).
- Doctoral Advisory Committee Member, Computer Science and Engineering. (February 1, 2020).
- Major Professor, Computer Science and Engineering. (January 17, 2020).
- Doctoral Advisory Committee Member, Computer Science and Engineering. (July 1, 2019).
- Doctoral Advisory Committee Chair, Computer Science and Engineering. (September 1, 2018).
- Doctoral Advisory Committee Member, Computer Science and Engineering. (August 10, 2018).
- Major Professor, Computer Science and Engineering. (December 15, 2020).
- Major Professor, Computer Science and Engineering. (December 15, 2020).
- Major Professor, Computer Science and Engineering. (August 20, 2020 - December 15, 2020).
- Major Professor, Computer Science and Engineering. (August 1, 2020 - December 15, 2020).
- Major Professor, Computer Science and Engineering. (August 1, 2020 - December 15, 2020).
- Doctoral Advisory Committee Member, Computer Science and Engineering. (September 1, 2019 - November 24, 2020).
- Master's Thesis Committee Chair, "Encrypted Collaborative Editing Software," Computer Science and Engineering. (January 15, 2020 - May 31, 2020).
- Major Professor, Computer Science and Engineering. (February 6, 2020 - May 15, 2020).
- Major Professor, Computer Science and Engineering. (February 6, 2020 - May 15, 2020).
- Major Professor, Computer Science and Engineering. (January 6, 2020 - May 15, 2020).
- Doctoral Advisory Committee Member, Computer Science and Engineering. (March 1, 2019 - April 26, 2020).
- Dissertation Committee Member, "Privacy Preserving Machine Learning As a Service," Computer Science and Engineering. (September 9, 2019 - March 16, 2020).
- Major Professor, Computer Science and Engineering. (August 30, 2018 - December 15, 2019).
- Internship Advisor, "Implementation of the IND-CCA1 variant of the McEliece cryptosystem," Computer Science and Engineering. (June 3, 2019 - July 26, 2019).
Research
Published Intellectual Contributions
- Morozov, K., Anada, H., Suga, Y. (2018). Cryptographic Technologies for Securing Network Storage. 80 116. Fukuoka, Kijima Publishing. https://www.imi.kyushu-u.ac.jp/eng/files/imipublishattachment/file/math_5acd77b7a56ce.pdf
- Morozov, K. (2018). Code-Based Zero-Knowledge Protocols and Their Applications. Mathematical Modelling for Next-Generation Cryptography. 43-62. Springer Singapore. http://dx.doi.org/10.1007/978-981-10-5065-7_3
- Morozov, K. (2014). Code-Based Public-Key Encryption. Mathematics for Industry. 47-55. Springer Japan. http://dx.doi.org/10.1007/978-4-431-55060-0_4
- Zaccagni, Z., Dantu, R., Morozov, K. (2023). Proof of Review: Trust Me, It's Been Reviewed. 11 pages. New York, ACM. UNT Discovery Park 3940 North Elm Street (Department of Computer Science and Engineering)
- Zaccagni, Z., Dantu, R., Morozov, K. (2023). Proof of Review: Trust Me, It's Been Reviewed. 23–34. New York NY, ACM. https://dl.acm.org/doi/10.1145/3625078.3625082
- Chiapputo, N., Desmedt, Y., Morozov, K. (2023). Using Untrusted and Unreliable Cloud Providers to Obtain Private Email. 171-182. SECRYPT 2023. https://www.scitepress.org/Link.aspx?doi=10.5220/0012090700003555
- Zaccagni, Z., Dantu, R., Morozov, K. (2023). Maintaining Review Credibility Using NLP, Reputation, and Blockchain. 58-66. IEEE. https://ieeexplore.ieee.org/document/10063712
- Salau, A., Dantu, R., Morozov, K., Upadhyay, K., Badruddoja, S. (2023). Multi-Tier Reputation for Data Cooperatives. 253-273. Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-031-18679-0_14
- Salau, A., Dantu, R., Morozov, K., Badruddoja, S., Upadhyay, K. (2022). Making Blockchain Validators Honest. IEEE. https://doi.org/10.1109/BCCA55292.2022.9921952
- Salau, A., Dantu, P., Morozov, K., Upadhyay, K., Badruddoja, S. (2022). Towards a Threat Model and Security Analysis for Data Cooperatives. 707-713. SECRYPT 2022.
- Salau, A., Dantu, R., Morozov, K., Badruddoja, S., Upadhyay, K. (2022). Towards a Threat Model and Security Analysis for Data Cooperatives. 707-713. Lisbon,, Proceedings of the 19th International Conference on Security and Cryptography,(SECRYPT)}.
- Dockendorf, M., Dantu, P., Morozov, K., Bhowmick, S. (2021). Investing Data with Untrusted Parties using HE. 845-853. Richardson, SECRYPT 2021.
- Talkington, J., Dantu, R., Morozov, K. (2020). Detecting Devices and Protocols on VPN-Encrypted Networks. Other. 8. IEEE.
- Talkington, J., Morozov, K., Dantu, R. (2020). Why Protocols Fail to Transition to Mobile Domains. Other. 12. IEEE. https://ieeexplore.ieee.org/document/9042951
- Sen, N., Dantu, R., Morozov, K. (2020). EW256357 : A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security. 291-310. Springer. https://link.springer.com/chapter/10.1007%2F978-3-030-63095-9_19
- Bucuti, T.H., Dantu, R., Morozov, K. (2019). CMCAP: Ephemeral Sandboxes for Adaptive Access Control. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19. ACM Press. http://dx.doi.org/10.1145/3322431.3325414
- Desmedt, Y., Dutta, S., Morozov, K. (2019). Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing. Cryptology and Network Security. 291-307. Springer International Publishing. http://dx.doi.org/10.1007/978-3-030-31578-8_16
- Aguirre Farro, F., Morozov, K. (2019). On IND-CCA1 Security of Randomized McEliece Encryption in the Standard Model. Code-Based Cryptography. 137-148. Springer International Publishing. http://dx.doi.org/10.1007/978-3-030-25922-8_8
- Roy, P., Morozov, K., Fukushima, K., Kiyomoto, S., Takagi, T. (2019). Security Analysis and Efficient Implementation of Code-based Signature Schemes. Proceedings of the 5th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications. http://dx.doi.org/10.5220/0007259102130220
- Desmedt, Y., Morozov, K. (2019). VSS Made Simpler. Advances in Information and Computer Security. 329-342. Springer International Publishing. http://dx.doi.org/10.1007/978-3-030-26834-3_19
- Talkington, J., Dantu, R., Morozov, K. (2019). Verifying OAuth Implementations Through Encrypted Network Analysis. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19. ACM Press. http://dx.doi.org/10.1145/3322431.3326449
- Roy, P.S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S., Sakurai, K. (2018). Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings. 578--594. https://doi.org/10.1007/978-3-319-99807-7\_37
- Ranganthan, V.P., Dantu, R., Paul, A., Mears, P., Morozov, K. (2018). A Decentralized Marketplace Application on the Ethereum Blockchain. 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). IEEE. http://dx.doi.org/10.1109/cic.2018.00023
- Yoshida, Y., Morozov, K., Tanaka, K. (2017). CCA2 Key-Privacy for Code-Based Encryption in the Standard Model. Post-Quantum Cryptography. 35-50. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-59879-6_3
- Morozov, K., Roy, P.S., Sakurai, K. (2017). On unconditionally binding code-based commitment schemes. Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication - IMCOM '17. ACM Press. http://dx.doi.org/10.1145/3022227.3022327
- Xu, R., Morozov, K., Basu, A., Rahman, M.S., Kiyomoto, S. (2017). Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. Advances in Information and Computer Security. 159-178. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-64200-0_10
- Ke, C., Anada, H., Kawamoto, J., Morozov, K., Sakurai, K. (2016). Cross-group Secret Sharing for Secure Cloud Storage Service. Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication - IMCOM '16. ACM Press. http://dx.doi.org/10.1145/2857546.2857610
- Adhikari, A., Morozov, K., Obana, S., Roy, P.S., Sakurai, K., Xu, R. (2016). Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters. Lecture Notes in Computer Science. 3-23. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-49175-2_1
- Xu, R., Morozov, K., Yang, Y., Zhou, J., Takagi, T. (2016). Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database. Information Security and Privacy. 181-197. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-40253-6_11
- Desmedt, Y., Morozov, K. (2015). Parity Check based redistribution of secret shares. 2015 IEEE International Symposium on Information Theory (ISIT). IEEE. http://dx.doi.org/10.1109/isit.2015.7282597
- Roy, P.S., Adhikari, A., Xu, R., Morozov, K., Sakurai, K. (2014). An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency. Security, Privacy, and Applied Cryptography Engineering. 47-58. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-12060-7_4
- Xu, R., Morozov, K., Takagi, T. (2014). Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication. Advances in Information and Computer Security. 72-87. Springer International Publishing. http://dx.doi.org/10.1007/978-3-319-09843-2_6
- Xu, R., Morozov, K., Takagi, T. (2013). On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary. Advances in Information and Computer Security. 258-271. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-41383-4_17
- Hu, R., Morozov, K., Takagi, T. (2013). Proof of plaintext knowledge for code-based public-key encryption revisited. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13. ACM Press. http://dx.doi.org/10.1145/2484313.2484385
- Hu, R., Morozov, K., Takagi, T. (2013). On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding. 2013 Eighth Asia Joint Conference on Information Security. IEEE. http://dx.doi.org/10.1109/asiajcis.2013.10
- Morozov, K., Takagi, T. (2012). Zero-Knowledge Protocols for the McEliece Encryption. Information Security and Privacy. 180-193. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-31448-3_14
- Nishi, R., Morozov, K., Hori, Y., Sakurai, K. (2011). Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter. 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks. IEEE. http://dx.doi.org/10.1109/msn.2011.40
- Morozov, K., Savvides, G. (2011). Efficient computational oblivious transfer using interactive hashing. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11. ACM Press. http://dx.doi.org/10.1145/1966913.1966977
- Cui, Y., Morozov, K., Kobara, K., Imai, H. (2009). Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. 159-168. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-02181-7_17
- Imai, H., Morozov, K., Nascimento, A.C. (2009). Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation. Lecture Notes in Computer Science. 183-194. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-10230-1_16
- Kobara, K., Morozov, K., Overbeck, R. (2008). Coding-Based Oblivious Transfer. Mathematical Methods in Computer Science. 142-156. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-540-89994-5_12
- Oggier, F., Morozov, K. (2008). A practical scheme for string commitment based on the Gaussian channel. 2008 IEEE Information Theory Workshop. IEEE. http://dx.doi.org/10.1109/itw.2008.4578679
- Imai, H., Morozov, K., A. Nascimento, A., Winter, A. (2006). Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations. 2006 IEEE International Symposium on Information Theory. IEEE. http://dx.doi.org/10.1109/isit.2006.262083
- Imai, H., Morozov, K., A. Nascimento, A. (2006). On the Oblivious Transfer Capacity of the Erasure Channel. 2006 IEEE International Symposium on Information Theory. IEEE. http://dx.doi.org/10.1109/isit.2006.262082
- Crépeau, C., Morozov, K., Wolf, S. (2005). Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. Security in Communication Networks. 47-59. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-540-30598-9_4
- Damgård, I., Fehr, S., Morozov, K., Salvail, L. (2004). Unfair Noisy Channels and Oblivious Transfer. Theory of Cryptography. 355-373. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-540-24638-1_20
- Korjik, V., Morozov, K. (2001). Generalized Oblivious Transfer Protocols Based on Noisy Channels. Information Assurance in Computer Networks. 219-229. Springer Berlin Heidelberg. http://dx.doi.org/10.1007/3-540-45116-1_22
- Xu, R., Wang, X., Morozov, K., Cheng, C., Ding, J. (2022). Revisiting group oriented secret sharing schemes. Information Sciences. 589 751-769. Amsterdam, Elsevier. https://www.sciencedirect.com/science/article/abs/pii/S0020025521012743
- Xu, R., Wang, X., Morozov, K. (2021). Group authentication for cloud-to-things computing: Review and improvement. 198 (108374) 8. Amsterdam, Elsevier. https://www.sciencedirect.com/science/article/abs/pii/S138912862100356X
- Morozov, K., Roy, P.S., Steinwandt, R., Xu, R. (2018). On the security of the Courtois-Finiasz-Sendrier signature. Other. 16 161-167.
- Anada, H., Kawamoto, J., Ke, C., Morozov, K., Sakurai, K. (2017). Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions. Journal of Supercomputing. 73 (10) 4275-4301.
- Xu, R., Morozov, K., Takagi, T. (2017). Secret Sharing with Cheaters Using Multi-Receiver Authentication. Other. E100A (1) 115-125.
- Xu, R., Morozov, K., Yang, Y., Zhou, J., Takagi, T. (2017). Efficient outsourcing of secure k -nearest neighbour query over encrypted database. Computers & Security. 69 65-83. Elsevier BV. http://dx.doi.org/10.1016/j.cose.2016.11.012
- Zhang, M., Xia, Y., Yuan, O., Morozov, K. (2016). Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services. Other. 29 (12) 1863-1872.
- Xu, R., Morozov, K., Takagi, T. (2015). Note on Some Recent Cheater Identifiable Secret Sharing Schemes. Other. E98A (8) 1814-1819.
- Hu, R., Morozov, K., Takagi, T. (2015). Zero-Knowledge Protocols for Code-Based Public-Key Encryption. Other. E98A (10) 2139-2151.
- Zhang, M., Morozov, K., Takagi, T. (2014). Generic Constructions and Transformations of Decryption Consistent Encryption. Other. 60 (3) 218-228.
- Zhang, M., Wang, C., Morozov, K. (2014). LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces. Journal of Supercomputing. 70 (3) 1405-1432.
- Zhang, M., Morozov, K., Takagi, T. (2014). Revisits and Transformations Among Functional Encryption Systems. Other. 31 (1) 103-114.
- Pinto, Adriana C. B., Dowsley, R., Morozov, K., Nascimento, Anderson C. A. (2011). Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model. IEEE Transactions on Information Theory. 57 (8) 5566-5571.
- Nojima, R., Imai, H., Kobara, K., Morozov, K. (2008). Semantic security for the McEliece cryptosystem without random oracles. Other. 49 (1-3) 289-305.
- Damgård, I.B., Fehr, S., Morozov, K., Salvail, L. (2003). Unfair Noisy Channels and Oblivious Transfer. Other. 10 (36) Aarhus University Library. http://www.brics.dk/RS/03/36/
Book
Book Chapter
Conference Proceeding
Journal Article
Technical Report
Presentations Given
- Morozov, K. (Author & Presenter), Salau, A. (Author), Dantu, R. (Author), Upadhyay, K. (Author), Badruddoja, S. (Author), 16th International Conference on Mathematical Sciences for Advancement of Science and Technology (MSAST 2022), Multi-Tier Reputation for Data Cooperatives, The Institute for Mathematics, Bioinformatics, Information Technology and Computer Science (IMBIC), Kolkata, India, India. (2022 - 2022).
- Morozov, K. (Author & Presenter), Desmedt, Y. (Author), Dutta, S. (Author), IMI Workshop: Exploring Mathematical and Practical Principles of Secure Computation and Secret Sharing, Evolving Secret Sharing From Evolving Perfect Hash Families, Institute of Mathematics for Industry, Kyushu University, Japan, Fukuoka, Japan, Japan. (2021 - 2021).
- Morozov, K. (Author & Presenter), 14th International Conference on Mathematical Sciences for Advancement of Science and Technology (MSAST 2020), Recent Results in Secret Sharing: Cheater Identification, Robustness, and More, The Institute for Mathematics, Bioinformatics, Information Technology and Computer Science (IMBIC), Kolkata, India, India. (2020 - 2020).
- Morozov, K. (Author & Presenter), Maulana Abul Kalam Azad University of Technology (MAKAUT) Webinar Series on Cryptography, Network Security and Cybersecurity (Session VII), Code-Based Cryptography: Introduction and Recent Results, Maulana Abul Kalam Azad University of Technology (MAKAUT), Kolkata, India, India. (2020 - 2020).
- Morozov, K. (Author & Presenter), IEEE MetroCon 2019, Post-Quantum Cryptography: Recent Results and Trends, IEEE, Hurst, TX, United States of America. (2019 - 2019).
- Morozov, K. (Author & Presenter), 6th Code-Based Cryptography Workshop (CBC 2018), Code-Based Zero-Knowledge Proofs, Signatures and More, Florida Atlantic University, Davie, FL, United States of America. (2018 - 2018).
- Dantu, R. (Author & Presenter), Morozov, K. (Author), Bhowmick, S. (Author), Computing Research Association Symposium, Locating Super-Spreaders Through Partnership of Anonymization and Encryption., CRA, Virtual, United States of America. (2020).
- Morozov, K. (Author & Presenter), Chiapputo, N. (Author), Desmedt, Y. (Author), Texas Crypto Day, Using Untrusted and Unreliable Cloud Providers to Obtain Private Email, University of Texas at Dallas, Richardson, TX, United States of America. (2023 - 2023).
- Morozov, K. (Author & Presenter), Salau, A. (Author), Dantu, R. (Author), Upadhyay, K. (Author), Badruddoja, S. (Author), Texas Crypto Day, Multi-Tier Reputation for Data Cooperatives, Texas A&M University, College Station, TX, United States of America. (2022 - 2022).
- Chiapputo, N. (Author), Desmedt, Y. (Author), Morozov, K. (Author & Presenter), 20th International Conference on Security and Cryptography (SECRYPT 2023), Using Untrusted and Unreliable Cloud Providers to Obtain Private Email, SECRYPT Secretariat, Virtual, Italy. (2023 - 2023).
- Morozov, K. (Author & Presenter), TxDOT and Transportation Research Alignment and Collaboration (TRAC) Meeting, Research Introduction, Texas A&M Transportation Institute, Bryan TX, United States of America. (2023 - 2023).
- Morozov, K. (Author & Presenter), Get to Know Your Fellow CAE-Rs E meeting, Recent Research Results, NSA, Virtual, United States of America. (2023 - 2023).
Invited Talk
Oral Presentation
Paper
Professional Meeting Contribution
Symposium
Contracts, Grants, Sponsored Research
- Do, H. (Principal), Morozov, K. (Co-Principal), Bryce, R.C. (Other), Hochstetler, J. (Other), "GenCyber Teachers Camp: GenCyber Academy," sponsored by National Security Agency (NSA), Federal, $149900 Funded. (2023 - 2025).
- Dantu, R. (Principal), Morozov, K. (Co-Principal), Dantu, S. (Co-Principal), "PrivacyPreserving Analytics on a Data Cooperative for Comprehensive Threat Prevention," sponsored by National Security Agency, Federal, $750000 Funded. (2021 - 2024).
- Fu, S. (Principal), Morozov, K. (Co-Principal), "North Texas GenCyber Academy," sponsored by National Security Agency and National Science Foundation, Federal, $139042 Funded. (2022 - 2024).
- Dantu, R. (Principal), Morozov, K., Bhowmick, S. (Co-Principal), "Locating Super-Spreaders Through Partnership of Anonymization and Encryption," sponsored by NSA, Federal, $299944 Funded. (2020 - 2023).
- Morozov, K. (Co-Principal), Dantu, R. (Principal), Bhowmick, S. (Co-Principal), "2021 NCAE-C-002- University of North Texas," sponsored by National Security Agency, FED, Funded. (2021 - 2024).
- Bhowmick, S. (Co-Principal), Dantu, R. (Principal), Morozov, K., "Locating Super-Spreaders Through Partnership of Anonymization and Encryption," sponsored by NSA, Federal, Funded. (2020 - 2022).
- Morozov, K. (Co-Principal), Dantu, R. (Principal), Bhowmick, S. (Co-Principal), "2020 University of North Texas NCAE- C Research Grant," sponsored by National Security Agency, FED, Funded. (2020 - 2022).
Grant - Research
Service
University Service
- Faculty Advisor, UNT Cybersecurity Club (Student organization). (October 2019 - Present).
- Member, Retention Committee. (September 2018 - Present).
- Member, Chair Search Committee. (October 13, 2021 - November 30, 2023).
- Member, Faculty Search Committee. (November 23, 2021 - May 12, 2022).
- Member, Research Roadmap Committee. (September 5, 2021 - October 26, 2021).
- Member, Faculty Search Committee. (October 2020 - March 2021).
- Member, Faculty Search Committee. (June 2020 - September 2020).
- Member, Faculty Search Committee. (December 2019 - March 2020).
- Member, Faculty Search Committee. (September 2018 - December 2018).
Public Service
- Other (Volunteer stuff), HackUNT 2023 Hackathon. Denton, TX. (November 12, 2023 - November 12, 2023).
- Other (Volunteer stuff), NSBEHack 2023 Hackathon. Denton, TX. (October 13, 2023 - October 14, 2023).
- Other (Volunteer stuff), HackUNT 2022 Hackathon. Denton, TX. (April 24, 2022 - April 24, 2022).
- Other (Volunteer stuff), HackUNT 2020 Hackathon. Denton, TX. (February 15, 2020 - February 15, 2020).
- Other (Volunteer stuff), HackUNT 2018 Hackathon. Denton, TX. (April 7, 2018 - April 7, 2018).
Professional Service
- Workshop Organizer (Volunteer), Organizing committee of Texas Crypto Day Workshop. TX. (December 2, 2022 - Present).
- Committee Member, Program Committee of the 16th IEEE/ACM International Conference on Utility and Cloud Computing (UCC2023). Denton, TX. (September 17, 2023 - October 21, 2023).
- Committee Member, Program Committee of the 19th International Conference on Information Security and Cryptology (Inscrypt 2023). Denton, TX. (July 15, 2023 - October 15, 2023).
- Committee Member, Program Committee of the 5th International Conference on Blockchain Computing and Applications (BCCA 2023). Denton, TX. (June 15, 2023 - July 31, 2023).
- Committee Member, Program Committee of the 18th International Workshop on Security (IWSEC 2023). Denton, TX. (April 3, 2023 - May 30, 2023).
- Committee Member, Program Committee of the 17th International Conference on Provable and Practical Security (ProvSec 2023). Denton, TX. (April 2, 2023 - May 15, 2023).
- Committee Member, Program Committee of the 29th Australasian Conference on Information Security and Privacy (ACISP 2023). Denton, TX. (February 13, 2023 - April 15, 2023).
- Committee Member, Program Committee of the 4th International Workshop on Code-Based Cryptography (CBCrypto 2023). Denton, TX. (March 1, 2023 - April 1, 2023).
- Reviewer, Ad Hoc Reviewer, 3rd Annual TAMS Fair. Denton, TX. (January 28, 2023 - January 28, 2023).
- Committee Member, Program Committee of the 15th IEEE/ACM International Conference on Utility and Cloud Computing (UCC2022). Denton, TX. (September 19, 2022 - October 15, 2022).
- Committee Member, Program Committee of the 17th International Workshop on Security (IWSEC 2022). Denton, TX. (April 13, 2022 - May 29, 2022).
- Committee Member, Program Committee of the 28th Australasian Conference on Information Security and Privacy (ACISP 2022). Denton, TX. (February 21, 2022 - May 10, 2022).
- Committee Member, Program Committee of the 3nd International Workshop on Code-Based Cryptography (CBCrypto 2022). Denton, TX. (April 19, 2022 - April 29, 2022).
- Reviewer, Ad Hoc Reviewer, 2nd Annual TAMS Fair. Denton, TX. (January 29, 2022 - January 29, 2022).
- Editor, Guest Editor, Special Issue “Cryptographic Systems Based on Coding Theory” in “Cryptography” journal by MDPI. Denton, TX. (September 6, 2020 - December 20, 2021).
- Committee Member, Program Committee of the 15th International Conference on Provable and Practical Security (ProvSec 2021). Denton, TX. (July 10, 2021 - August 25, 2021).
- Committee Member, Program Committee of the 22nd World Conference on Information Security Applications (WISA 2021). Denton, TX. (June 30, 2021 - July 31, 2021).
- Committee Member, Program Committee of the 2nd International Workshop on Code-Based Cryptography (CBCrypto 2021). Denton, TX. (May 10, 2021 - June 8, 2021).
- Committee Member, Program Committee of the 26th Australasian Conference on Information Security and Privacy (ACISP 2021). Denton, TX. (February 25, 2021 - April 25, 2021).
- Committee Member, Program Committee of the 2020 IEEE Cloud Summit. Denton, TX. (September 14, 2020 - October 5, 2020).
- Committee Member, Program Committee of the 14th International Conference on Provable and Practical Security (ProvSec 2020). Denton, TX. (July 15, 2020 - August 31, 2020).
- Committee Member, Program Committee of the 21st World Conference on Information Security Applications (WISA 2020). Denton, TX. (May 31, 2020 - July 10, 2020).
- Committee Member, Program Committee of the International Workshop on Code-Based Cryptography (CBCrypto 2020). Denton, TX. (February 8, 2020 - March 4, 2020).
- Committee Member, Program Committee of the 6th International Conference on Information Systems Security and Privacy (ICISSP 2020). Denton, TX. (October 25, 2019 - December 20, 2019).
- Committee Member, Program Committee of the 20th World Conference on Information Security Applications (WISA 2019). Denton, TX. (June 26, 2019 - July 29, 2019).
- Committee Member, Program Committee of the 13th International Conference on Provable and Practical Security (ProvSec 2019). Denton, TX. (June 24, 2019 - July 15, 2019).
- Committee Member, Program Committee of the 14th International Workshop on Security (IWSEC 2019). Denton, TX. (April 2, 2019 - May 27, 2019).
- Committee Member, Program Committee of the 24th Australasian Conference on Information Security and Privacy (ACISP 2019). Denton, TX. (March 1, 2019 - April 1, 2019).
- Committee Member, Program Committee of the 1st International Conference on Frontiers in Cyber Security (FCS 2018). Denton, TX. (June 20, 2018 - August 10, 2018).
- Committee Member, Program Committee of the 12th International Conference on Provable Security (Provsec 2018). DENTON, TX. (June 30, 2018 - August 3, 2018).
- Committee Member, Program Committee of the 13th International Workshop on Security (IWSEC 2018). Denton, TX. (April 2, 2018 - May 23, 2018).