{"id":16,"date":"2019-05-01T20:25:10","date_gmt":"2019-05-02T00:25:10","guid":{"rendered":"https:\/\/research.ece.ncsu.edu\/aaysu-dev\/?page_id=16"},"modified":"2020-12-28T08:54:26","modified_gmt":"2020-12-28T13:54:26","slug":"research","status":"publish","type":"page","link":"https:\/\/research.ece.ncsu.edu\/aaysu\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span>\r\n<p><\/p>\r\n\r\n\r\n\r\n<div id=\"wrapper\">\r\n<div id=\"main\">\r\n<div id=\"research\" class=\"page\">\r\n\r\n\r\n<script>\r\nfunction showMore1() {\r\n  var dots1 = document.getElementById(\"dots1\");\r\n  var moreText1 = document.getElementById(\"more1\");\r\n  var btnText1 = document.getElementById(\"myBtn1\");\r\n\r\n  if (dots1.style.display === \"none\") {\r\n    dots1.style.display = \"inline\";\r\n    btnText1.innerHTML = \"Read more\"; \r\n    moreText1.style.display = \"none\";\r\n  } else {\r\n    dots1.style.display = \"none\";\r\n    btnText1.innerHTML = \"Read less\"; \r\n    moreText1.style.display = \"inline\";\r\n  }\r\n}\r\n<\/script>\r\n<script>\r\nfunction showMore2() {\r\n  var dots2 = document.getElementById(\"dots2\");\r\n  var moreText2 = document.getElementById(\"more2\");\r\n  var btnText2 = document.getElementById(\"myBtn2\");\r\n\r\n  if (dots2.style.display === \"none\") {\r\n    dots2.style.display = \"inline\";\r\n    btnText2.innerHTML = \"Read more\"; \r\n    moreText2.style.display = \"none\";\r\n  } else {\r\n    dots2.style.display = \"none\";\r\n    btnText2.innerHTML = \"Read less\"; \r\n    moreText2.style.display = \"inline\";\r\n  }\r\n}\r\n<\/script>\r\n<script>\r\nfunction showMore3() {\r\n  var dots3 = document.getElementById(\"dots3\");\r\n  var moreText3 = document.getElementById(\"more3\");\r\n  var btnText3 = document.getElementById(\"myBtn3\");\r\n\r\n  if (dots3.style.display === \"none\") {\r\n    dots3.style.display = \"inline\";\r\n    btnText3.innerHTML = \"Read more\"; \r\n    moreText3.style.display = \"none\";\r\n  } else {\r\n    dots3.style.display = \"none\";\r\n    btnText3.innerHTML = \"Read less\"; \r\n    moreText3.style.display = \"inline\";\r\n  }\r\n}\r\n<\/script>\r\n<script>\r\nfunction showMore4() {\r\n  var dots4 = document.getElementById(\"dots4\");\r\n  var moreText4 = document.getElementById(\"more4\");\r\n  var btnText4 = document.getElementById(\"myBtn4\");\r\n\r\n  if (dots4.style.display === \"none\") {\r\n    dots4.style.display = \"inline\";\r\n    btnText4.innerHTML = \"Read more\"; \r\n    moreText4.style.display = \"none\";\r\n  } else {\r\n    dots4.style.display = \"none\";\r\n    btnText4.innerHTML = \"Read less\"; \r\n    moreText4.style.display = \"inline\";\r\n  }\r\n}\r\n<\/script>\r\n<script>\r\nfunction showMore5() {\r\n  var dots5 = document.getElementById(\"dots5\");\r\n  var moreText5 = document.getElementById(\"more5\");\r\n  var btnText5 = document.getElementById(\"myBtn5\");\r\n\r\n  if (dots5.style.display === \"none\") {\r\n    dots5.style.display = \"inline\";\r\n    btnText5.innerHTML = \"Read more\"; \r\n    moreText5.style.display = \"none\";\r\n  } else {\r\n    dots5.style.display = \"none\";\r\n    btnText5.innerHTML = \"Read less\"; \r\n    moreText5.style.display = \"inline\";\r\n  }\r\n}\r\n<\/script>\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/4.7.0\/css\/font-awesome.min.css\">\r\n<style>\r\n#more {display: none;}\r\n#more1 {display: none;}\r\n#more2 {display: none;}\r\n#more3 {display: none;}\r\n#more4 {display: none;}\r\n#more5 {display: none;}\r\n<\/style>\r\n<style>\r\n\/* sidebar\r\n **************************************************\/\r\n#nav-container {\r\n\tposition: relative;\r\n\tpadding-bottom: 15px;\r\n\tbottom: 0;\r\n\theight: 100%;\r\n}\r\n\r\n#profile {\r\n\ttext-align: center;\r\n\tpadding: 30px 10px;\r\n\tposition: relative;\r\n}\r\n\r\n#profile .portrate {\r\n\tbackground-image: url(\"https:\/\/research.ece.ncsu.edu\/wp-content\/uploads\/sites\/8\/2019\/08\/personal-image.jpg\");\r\n\twidth: 12px;\r\n\tmargin: 0 auto;\r\n\theight: 25px;\r\n\tborder-radius: 10%;\r\n\r\n\t-webkit-background-size: cover;\r\n\t-moz-background-size: cover;\r\n\tbackground-size: cover;\r\n}\r\n\r\n#profile .title h2 {\r\n\tfont-size: 28px;\r\n\tfont-weight: 300;\r\n\tcolor: #fff;\r\n\tmargin: 20px 0 10px 0;\r\n}\r\n\r\n\r\n#profile .title h3 {\r\n\tfont-size: 38px;\r\n\tfont-weight: 100;\r\n\tcolor: #aaa;\r\n\tmargin: 0px 0 10px 0;\r\n}\r\n\r\nul#navigation {\r\n\tpadding: 0;\r\n\tmargin: 0;\r\n}\r\n\r\nul#navigation > li {\r\n\tdisplay: block;\r\n\tfloat: none;\r\n\tclear: both;\r\n\tbackground: #303030;\r\n\tborder-top: 1px solid #373737;\r\n\tborder-bottom: 1px solid #2B2B2B;\r\n\tcursor: pointer;\r\n\t-webkit-transition: background 0.5s;\r\n\t-moz-transition: background 0.5s;\r\n\t-o-transition: background 0.5s;\r\n\t-ms-transition: background 0.5s;\r\n\ttransition: background 0.5s;\r\n}\r\n\r\nul#navigation > li > a {\r\n\tcolor: #ccc;\r\n\tfont-size: 14px;\r\n}\r\n\r\nul#navigation li:hover,ul#navigation li:focus {\r\n\tbackground: #363636;\r\n}\r\n\r\nul#navigation li:hover a,ul#navigation li:focus a {\r\n\tcolor: #f7f7f7;\r\n}\r\n\r\nul#navigation .currentmenu {\r\n\tfont-weight: bold;\r\n}\r\n\r\nul#navigation li.currentmenu a {\r\n\tcolor: #fff;\r\n}\r\n\r\n\/*ul#navigation li.external:hover .fa, ul#navigation li.currentmenu .fa{\r\n\tcolor: #03cc85;\r\n}*\/\r\n\r\nul#navigation li.currentmenu {\r\n\tbackground: #363636;\r\n\tborder-top: 1px solid #3d3d3d;\r\n\tborder-bottom: 1px solid #252525;\r\n}\r\n\r\n\r\nul#navigation li .text {\r\n\tpadding-left: 5%;\r\n\tmargin-left: 20px;\r\n\tline-height: 45px;\r\n\r\n\t-webkit-box-shadow: -3px 0 5px -4px #000;\r\n\tbox-shadow: -3px 0 5px -4px #000;\r\n}\r\n\r\nul#navigation li .fa {\r\n\tfloat: left;\r\n\tline-height: 45px;\r\n\twidth: 50px;\r\n\ttext-align: center;\r\n\tfont-size: 27px;\r\n}\r\n\r\n#sidebar-footer{\r\n\tposition: absolute;\r\n\tbottom: 0;\r\n\tleft: 0;\r\n\twidth: 100%;\r\n\tbackground: #202020;\r\n\tborder-top: 1px solid #1A1A1A;\r\n\ttext-align: center;\r\n  \toverflow: hidden;\r\n}\r\n\r\n.social-icons ul {\r\n\tpadding: 0 20px;\r\n\tmargin: 0;\r\n\tlist-style: none;\r\n\ttext-align: center;\r\n}\r\n\r\n.social-icons li {\r\n\t\/* float: left; *\/\r\n\t\/* width: 33%; *\/\r\n\tpadding: 5px;\r\n\ttext-align: center;\r\n\tdisplay: inline-block;\r\n}\r\n\r\n.social-icons a {\r\n\tcolor: #ccc;\r\n}\r\n\r\n.social-icons a:hover,.social-icons a:focus {\r\n\tcolor: #fff;\r\n}\r\n\r\n.social-icons i {\r\n\tfont-size: 16px;\r\n}\r\n\r\n#copyright{\r\n\ttext-align:center;\r\n\tfont-size:0.7em;\r\n\tcolor: #8E8E8E;\r\n\tmargin-bottom: 5px;\r\n}\r\n\/* page specifics\r\n **************************************************\/\r\n.page-container {\r\n\tposition: relative;\r\n}\r\n\r\n.pageheader {\r\n\tbackground: #f0f0f0;\r\n\tposition: relative;\r\n\tpadding: 15px 0 15px 0;\r\n}\r\n\r\n.pageheader:after {\r\n\ttop: 80%;\r\n\tborder: solid transparent;\r\n\tcontent: \"\";\r\n\theight: 0;\r\n\twidth: 0;\r\n\tposition: absolute;\r\n\tpointer-events: none;\r\n\tborder-color: rgba(8, 4, 13, 0);\r\n\tborder-top-color: #f3f3f3;\r\n\tborder-width: 0px;\r\n\tleft: 10%;\r\n\tmargin-left: -0px;\r\n\tz-index: 1;\r\n}\r\n\r\n.headercontent .title {\r\n\tfont-size: 20px;\r\n\tmargin-bottom: 5px;\r\n\tborder-bottom: 1px solid #ccc;\r\n\tpadding: 0 0 20px 0;\r\n}\r\n.headercontent .title.noborder{\r\n\tborder:none;\r\n}\r\n.headercontent .subtitle {\r\n\tborder-bottom: 1px solid #ccc;\r\n\tmargin: 0 0 10px 0;\r\n\tpadding: 5px 0;\r\n}\r\n\r\n.headercontent .subtitle h3 {\r\n\tmargin: 0;\r\n\tpadding: 0;\r\n}\r\n\r\n.page .section{\r\n\tpadding: 10px 0;\r\n\tposition: relative;\r\n}\r\n\r\n.section-container {\r\n\tpadding: 0 5%;\r\n}\r\n\r\n.color-1 {\r\n\tbackground: #fcfcfc;\r\n}\r\n\r\n.color-2 {\r\n\tbackground: #f7f7f7;\r\n}\r\n\r\n.color-3 {\r\n\tbackground: #2c2c2d;\r\n\tcolor: #fff;\r\n}\r\n\r\n.color-4 {\r\n\tbackground: #000;\r\n}\r\n\r\n.section .title {\r\n\tborder-bottom: 1px solid #ccc;\tmargin: 0 0 20px 0;\r\n\tpadding: 20px 0;\r\n}\r\n\r\n.section .title h3 {\r\n\tpadding: 0;\r\n\tmargin: 0;\r\n\tfont-size: 26px;\r\n}\r\n\r\n\r\n.biothumb{position: relative;}\r\n.biothumb .overlay{\r\n\tposition: absolute;\r\n\twidth: 100%;\r\n\tcolor:#fff;\r\n\tbottom: 0;\r\n\tbackground-color: black;\r\n\tbackground-color: rgba(0,0,0,0.5);\r\n\tpadding:25px;\r\n}\r\n.biothumb .overlay h1{\r\n\tfont-size: 45px;\r\n}\r\n\r\n.fixedbg{\r\n\tpadding: 70px 0;\r\n    position: relative;\r\n    margin: 0;\r\n\tbackground-position: center;\r\n    background-repeat: no-repeat;\r\n    background-size: cover !important;\r\n}\r\n\r\n.fixedbg.parallax{\r\n    background-attachment: fixed !important;\r\n}\r\n\r\n.fixedbg .heading{\r\n\tfont-size: 28px;\r\n    color: #ffffff;\r\n    line-height: 1.2;\r\n    text-align: center;\r\n    font-weight: 700;\r\n    font-style: normal;\r\n}\r\n\r\n\/*************************************************\r\n *  uls\r\n **************************************************\/\r\n.ul-bolded li {\r\n\tfont-weight: bold;\r\n}\r\n\r\n.ul-boxed li {\r\n\tpadding: 5px;\r\n\tbackground-color: #FdFdFd;\r\n\tmargin-bottom: 10px;\r\n\t-webkit-box-shadow: 0px 3px 3px -3px #ccc;\r\n\tbox-shadow: 0px 3px 3px -3px #ccc;\r\n\tborder-radius: 0px;\r\n\tborder-left: 5px solid;\r\n}\r\n\r\n\/* ul-card\r\n **************************************************\/\r\nul.ul-card {\r\n\tpadding: 0;\r\n\tmargin: 0;\r\n\tlist-style: none;\r\n}\r\n\r\nul.ul-card li {\r\n\tposition: relative;\r\n\tpadding: 20px 15px 20px 15px;\r\n\tbackground-color: #fff;\r\n\tmargin-bottom: 15px;\r\n\t-webkit-box-shadow: 0px 3px 3px -3px #ccc;\r\n\tbox-shadow: 0px 3px 3px -3px #ccc;\r\n\tborder-radius: 3px;\r\n\tmargin-left: 10px;\r\n\tcolor: #333;\r\n}\r\n\r\nul.ul-card li .dy {\r\n\tposition: absolute;\r\n\ttop: 10px;\r\n\tleft: -10px;\r\n\tborder-radius: 0px;\r\n\tpadding: 0;\r\n\tcolor: white;\r\n}\r\n\r\nul.ul-card li .dy span {\r\n\tpadding: 7px 10px;\r\n\tline-height: 30px;\r\n\tmargin: 0;\r\n}\r\n\r\n\/*ul.ul-card li .dy .degree {\r\n\tbackground-color: #03bb7a;\r\n}*\/\r\n\r\nul.ul-card li .dy .year {\r\n\t\/*background-color: #03cc85;*\/\r\n\t-webkit-box-shadow: -3px 0px 7px -3px rgba(68, 68, 68, 0.5);\r\n\tbox-shadow: -3px 0px 7px -3px rgba(68, 68, 68, 0.5);\r\n\tmargin-left: -3px !important;\r\n}\r\n\r\nul.ul-card li .description p {\r\n\tfont-size: 16px;\r\n\tmargin: 0;\r\n}\r\n\r\nul.ul-card li .description p.where {\r\n\tfont-weight: 300;\r\n\tfont-size: 14px;\r\n}\r\n\r\n\/* ul-dates\r\n **************************************************\/\r\nul.ul-dates,ul.ul-dates-gray {\r\n\tmargin: 0;\r\n\tpadding: 0;\r\n\tlist-style: none;\r\n}\r\n\r\nul.ul-dates li,ul.ul-dates-gray li {\r\n\tmargin-bottom: 15px; \/*margin-left:  20px;\r\n\t*\/\r\n}\r\n\r\nul.ul-dates div.dates,ul.ul-dates-gray div.dates {\r\n\tfloat: left;\r\n\twidth: 75px;\r\n}\r\n\r\nul.ul-dates div.dates span,ul.ul-dates-gray div.dates span {\r\n\t\/*background-color: #03cc85;*\/\r\n\tpadding: 6px;\r\n\tdisplay: block;\r\n\ttext-align: center;\r\n\tcolor: #fff;\r\n\tposition: relative;\r\n}\r\n\r\nul.ul-dates-gray div.dates span {\r\n\tbackground-color: #BBBBBB !important;\r\n}\r\n\r\n\/*ul.ul-dates div.dates span:last-child {\r\n\tbackground-color: #03bb7a;\r\n}*\/\r\n\r\nul.ul-dates-gray div.dates span:last-child {\r\n\tbackground-color: #979797 !important;\r\n}\r\n\r\nul.ul-dates-gray div.dates span:first-child,\r\nul.ul-dates div.dates span:first-child {\r\n\t-webkit-box-shadow: 0px 2px 6px -3px rgba(68, 68, 68, 0.5);\r\n\tbox-shadow: 0px 2px 6px -3px rgba(68, 68, 68, 0.5);\r\n\tz-index: 3;\r\n\tposition: relative;\r\n}\r\n\r\nul.ul-dates div.content,ul.ul-dates-gray div.content {\r\n\tmargin-left: 90px;\r\n\tmin-height: 70px;\r\n\tpadding-top: 10px;\r\n}\r\n\r\nul.ul-dates div.content h4,ul.ul-dates-gray div.content h4 {\r\n\tfont-weight: 400;\r\n\tfont-size: 16px;\r\n\tmargin-top: 0;\r\n}\r\n\r\nul.ul-dates div.content p,ul.ul-dates-gray div.content p {\r\n\tfont-size: 13px;\r\n}\r\n\r\n\r\n\r\n\/* ul-timeline\r\n **************************************************\/\r\nul.timeline {\r\n\tborder-left: 8px solid #FFF;\r\n\tlist-style: none;\r\n\tpadding: 1px 0;\r\n\tmargin-left: 100px;\r\n}\r\n\r\nul.timeline li .date {\r\n\tfloat: left;\r\n\tpadding: 10px 15px 10px 10px;\r\n\tmargin-top: 10px;\r\n\tmargin-left: -115px;\r\n\tfont-size: 15px;\r\n\twidth: 110px;\r\n\ttext-align: center;\r\n\t\/*background: #03cc85;*\/\r\n\tcolor: #fff;\r\n}\r\n\r\n\/*ul.timeline li.open .data {\r\n\tbackground: #03bb7a;\r\n}*\/\r\n\r\nul.timeline li .circle {\r\n\tfloat: left;\r\n\tmargin: 20px 0;\r\n\tmargin-left: -14px;\r\n\twidth: 20px;\r\n\theight: 20px;\r\n\tborder: 4px solid #FFFFFF;\r\n\tborder-radius: 10px;\r\n\tbackground-color: #d5d5d5;\r\n}\r\n\r\nul.timeline li.open .circle {\r\n\t\/*background-color: #03bb7a;*\/\r\n\t-webkit-box-shadow: 0px 2px 6px -3px rgba(68, 68, 68, 0.5);\r\n\tbox-shadow: 0px 2px 6px -3px rgba(68, 68, 68, 0.5);\r\n}\r\n\r\nul.timeline li .data {\r\n\tbackground: #fdfdfd;\r\n\tmargin: 10px 0px 10px 20px;\r\n\tborder-left: 10px solid;\r\n\tpadding: 18px 20px;\r\n\tfont-size: 16px;\r\n\r\n\t-webkit-box-shadow: 0px 3px 3px -3px #ccc;\r\n\tbox-shadow: 0px 3px 3px -3px #ccc;\r\n\tborder-radius: 3px;\r\n}\r\n\r\nul.timeline li.open .data {\r\n\t\/*border-color: #03bb7a;*\/\r\n\tbackground: #fff;\r\n}\r\n\r\nul.timeline li .data .subject {\r\n\tcursor: pointer;\r\n\tcolor: #777;\r\n\tfont-size: 18px;\r\n}\r\n\r\nul.timeline li .data .text {\r\n\tdisplay: none;\r\n\tmargin-top: 15px;\r\n\tfont-size: 14px;\r\n}\r\n\r\n\/* ul-withdetails\r\n **************************************************\/\r\n.ul-withdetails {\r\n\tlist-style: none;\r\n\tpadding: 0;\r\n}\r\n\r\n.ul-withdetails li {\r\n\tbackground-color: #FdFdFd;\r\n\tmargin-bottom: 15px;\r\n\r\n\t-webkit-box-shadow: 0px 3px 3px -3px #ccc;\r\n\tbox-shadow: 0px 3px 3px -3px #ccc;\r\n\tborder-radius: 3px;\r\n}\r\n\r\n.ul-withdetails li .image {\r\n\tposition: relative;\r\n\toverflow: hidden;\r\n}\r\n\r\n.ul-withdetails li .imageoverlay {\r\n\tposition: absolute;\r\n\ttop: 0;\r\n\tleft: -100%;\r\n\twidth: 100%;\r\n\theight: 100%;\r\n\t\/*background: #03cc85;*\/\r\n\tcursor: pointer;\r\n\t-ms-filter: \"progid:DXImageTransform.Microsoft.Alpha(Opacity=70)\";\r\n\tfilter: alpha(opacity=70);\r\n\topacity: 0.7;\r\n\r\n\t-webkit-transition: all 0.3s ease-out;\r\n\t   -moz-transition: all 0.3s ease-out;\r\n\t    -ms-transition: all 0.3s ease-out;\r\n\t     -o-transition: all 0.3s ease-out;\r\n\t        transition: all 0.3s ease-out;\r\n}\r\n\r\n.ul-withdetails li .imageoverlay i {\r\n\tcolor: #fff;\r\n\tposition: absolute;\r\n\ttop: 40%;\r\n\tleft: 45%;\r\n\tfont-size: 30px;\r\n}\r\n\r\n.ul-withdetails li .meta {\r\n\toverflow: hidden;\r\n\tpadding:  10px;\r\n\tcursor: pointer;\r\n}\r\n\r\n.ul-withdetails li .details {\r\n\tdisplay: none;\r\n\tpadding: 20px;\r\n\tbackground: #fff;\r\n\r\n\t-webkit-box-shadow: inset 0px 3px 5px -3px #ccc;\r\n\tbox-shadow: inset 0px 3px 5px -3px #ccc;\r\n}\r\n\r\n\/*************************************************\r\n * lab partnerts\r\n **************************************************\/\r\n#labp-heads-wrap {\r\n\t\/*background-color: #03bb7a;*\/\r\n\tposition: relative;\r\n\theight: 180px; \r\n}\r\n\r\n#labp-heads-wrap:after {\r\n\ttop: 100%;\r\n\tborder: solid transparent;\r\n\tcontent: \" \";\r\n\theight: 0;\r\n\twidth: 0;\r\n\tposition: absolute;\r\n\tpointer-events: none;\r\n\tborder-color: rgba(247, 103, 103, 0);\r\n\t\/*border-top-color: #03bb7a;*\/\r\n\tborder-width: 15px;\r\n\tleft: 50%;\r\n\tmargin-left: -15px;\r\n}\r\n\r\n#lab-carousel {\r\n\twidth: 100%;\r\n\theight: 200px;\r\n\tposition: absolute;\r\n\ttop: 0;\r\n\tleft: 0;\r\n}\r\n\r\n#lab-carousel div {\r\n\tfloat: left;\r\n\twidth: 100px;\r\n\theight: 100px;\r\n}\r\n\r\n#lab-carousel img {\r\n\tborder: none;\r\n\tposition: relative;\r\n\r\n\t-webkit-box-shadow: 0 0 10px #000;\r\n\tbox-shadow: 0 0 10px #000;\r\n}\r\n\r\n.caroufredsel_wrapper {\r\n\tmargin-top: -10px !important;\r\n\tpadding-top: 20px !important;\r\n\tpadding-bottom: 20px !important;\r\n}\r\n\r\n#labp-heads-wrap #next,#labp-heads-wrap #prev {\r\n\tposition: absolute;\r\n\ttop: 0;\r\n\theight: 100%;\r\n\tline-height: 180px;\r\n\tpadding: 0 10px;\r\n\tcolor: #f7f7f7;\r\n\tfont-size: 30px;\r\n\tz-index: 4;\r\n}\r\n\r\n#labp-heads-wrap #next {\r\n\tright: 0;\r\n}\r\n\r\n#labp-heads-wrap #prev {\r\n\tleft: 0;\r\n}\r\n\r\n#labp-heads-wrap #prev.disabled,#labp-heads-wrap #next.disabled {\r\n\tcolor: #ccc;\r\n\tcursor: default;\r\n}\r\n\r\n#lab-details {\r\n\tbackground-color: #fff;\r\n\tpadding: 20px;\r\n\tpadding-top: 40px;\r\n\ttext-align: center;\r\n\tmin-height: 150px;\r\n\r\n\t-webkit-box-shadow: 0px 3px 3px -3px #ccc;\r\n\tbox-shadow: 0px 3px 3px -3px #ccc;\r\n\tborder-radius: 2px;\r\n}\r\n\r\n#lab-details div {\r\n\tdisplay: none;\r\n}\r\n\r\n#lab-details h3 {\r\n\tmargin-top: 0;\r\n}\r\n\r\n\/* filter dropdowns\r\n **************************************************\/\r\n#filters,.filters,#pub-grid {\r\n\tpadding: 20px 0 30px 0 !important;\r\n}\r\n\r\n#filters h3,.filters h3,div#sort {\r\n\tmargin-top: 30px;\r\n}\r\n\r\n#sort span {\r\n\tline-height: 30px;\r\n}\r\n\r\n.stuck {\r\n\tposition: fixed !important;\r\n\tz-index: 1001;\r\n\ttop: 0;\r\n\tright: 0;\r\n\r\n\t-webkit-box-shadow: 0px 2px 4px 0px #cecece;\r\n\tbox-shadow: 0px 2px 4px 0px #cecece;\r\n}\r\n\r\n.cd-dropdown,.cd-select {\r\n\tposition: relative;\r\n\tmargin: 20px auto;\r\n\tdisplay: block;\r\n}\r\n\r\n.cd-dropdown > span {\r\n\twidth: 100%;\r\n\theight: 40px;\r\n\tline-height: 40px;\r\n\tcolor: #999;\r\n\tfont-weight: 700;\r\n\tfont-size: 16px;\r\n\tbackground: #fff;\r\n\tdisplay: block;\r\n\tpadding: 0 10px 0 30px;\r\n\tposition: relative;\r\n\tcursor: pointer;\r\n}\r\n\r\n.cd-dropdown > span:after {\r\n\tcontent: '';\r\n\tposition: absolute;\r\n\tright: 0px;\r\n\ttop: 0px;\r\n\twidth: 50px;\r\n\ttext-align: center;\r\n\tfont-size: 12px;\r\n\tpadding: 8px;\r\n\theight: 70%;\r\n\tline-height: 24px;\r\n}\r\n\r\n.cd-dropdown.cd-active > span:after {\r\n\tcontent: '';\r\n}\r\n\r\n.cd-dropdown ul {\r\n\tlist-style-type: none;\r\n\tmargin: 0;\r\n\tpadding: 0;\r\n\tdisplay: block;\r\n\tposition: relative;\r\n}\r\n\r\n.cd-dropdown > span,.cd-dropdown ul li:nth-last-child(-n+3) span {\r\n\t-webkit-box-shadow: 0 1px 1px rgba(0,0,0,0.1);\r\n\tbox-shadow: 0 1px 1px rgba(0,0,0,0.1);\r\n}\r\n\r\n.cd-dropdown ul {\r\n\tposition: absolute;\r\n\ttop: 0px;\r\n\twidth: 100%;\r\n}\r\n\r\n.cd-dropdown ul li {\r\n\tposition: absolute;\r\n\twidth: 100%;\r\n}\r\n\r\n\/*.cd-active.cd-dropdown > span {\r\n\tcolor: #03cc85;\r\n}*\/\r\n\r\n.cd-active.cd-dropdown > span,.cd-active.cd-dropdown ul li span {\r\n\t-webkit-box-shadow: 0 1px 1px rgba(0,0,0,0.1);\r\n\tbox-shadow: 0 1px 1px rgba(0,0,0,0.1);\r\n}\r\n\r\n.cd-active.cd-dropdown ul li span {\r\n\t-webkit-transition: all 0.2s linear 0s;\r\n\t-moz-transition: all 0.2s linear 0s;\r\n\t-o-transition: all 0.2s linear 0s;\r\n\t-ms-transition: all 0.2s linear 0s;\r\n\ttransition: all 0.2s linear 0s;\r\n}\r\n\r\n.cd-active.cd-dropdown ul li span:hover {\r\n\t\/*background: #03cc85;*\/\r\n\tcolor: #fff;\r\n}\r\n\r\n.cd-dropdown ul li span {\r\n\twidth: 100%;\r\n\tbackground: #fafafa;\r\n\tline-height: 40px;\r\n\tpadding: 0 10px 0 30px;\r\n\tdisplay: block;\r\n\tcolor: #bcbcbc;\r\n\tcursor: pointer;\r\n\tfont-weight: 700;\r\n}\r\n\r\n\/* publications\r\n **************************************************\/\r\n#pub-grid .mix {\r\n\t-ms-filter: \"progid:DXImageTransform.Microsoft.Alpha(Opacity=0)\";\r\n\tfilter: alpha(opacity=0);\r\n\topacity: 0;\r\n\tdisplay: none;\r\n}\r\n\r\n.pitems .item {\r\n\tmargin-bottom: 20px;\r\n\twidth: 100%;\r\n}\r\n\r\n.pitems .pubmain {\r\n\tbackground: #fefefe;\r\n\tpadding: 25px 25px 35px 25px;\r\n\tmin-height: 130px;\r\n\tposition: relative;\r\n\r\n\t-webkit-box-shadow: 0px 3px 3px -3px #ccc;\r\n\tbox-shadow: 0px 3px 3px -3px #ccc;\r\n\tcursor: pointer;\r\n}\r\n\r\n.pitems .pubtitle {\r\n\tmargin: 0;\r\n\tpadding: 0 0 15px 0;\r\n\tfont-size: 20px;\r\n\tfont-weight: 300;\r\n}\r\n\r\n.pitems .pubmain div {\r\n\tfont-size: small;\r\n}\r\n\r\n.pitems .pubmain .label {\r\n\tmargin-right: 10px;\r\n}\r\n\r\n.pitems .pubmain .pubassets {\r\n\tposition: absolute;\r\n\tbottom: 0;\r\n\tright: 0;\r\n\tbackground: #fafafa;\r\n\ttext-align: center;\r\n\tborder-top: 2px solid;\r\n}\r\n\r\n.pitems .pubmain .pubassets a {\r\n\tcolor: #9b9b9b;\r\n\tpadding: 5px 15px;\r\n\tfloat: right;\r\n\tfont-size: 18px;\r\n}\r\n\r\n.pitems .pubmain .pubassets a:hover,.pitems .pubmain .pubassets a:focus,.pitems .pubmain .pubassets a.pubcollapse {\r\n\t\/*background: #03cc85;*\/\r\n\tcolor: #fff;\r\n}\r\n\r\n.pitems .pubdetails {\r\n\tbackground: #fff;\r\n\tpadding: 25px;\r\n\tdisplay: none;\r\n}\r\n\/* Gallery\r\n **************************************************\/\r\n#gallery-header {\r\n\t_color: #f7f7f7;\r\n}\r\n\r\n#gallery-header h2 {\r\n\tfont-size: 50px;\r\n\ttext-align: center;\r\n}\r\n\r\n#gallery-large {\r\n\t_background: #303030;\r\n\tpadding-top: 20px;\r\n}\r\n\r\nul.grid {\r\n\tmax-width: 69em;\r\n\tlist-style: none;\r\n\tmargin: 30px auto;\r\n\tpadding: 0;\r\n}\r\n\r\nul.grid li {\r\n\tdisplay: block;\r\n\tfloat: left;\r\n\tpadding: 15px;\r\n\twidth: 33%;\r\n}\r\n\r\n@media screen and (max-width: 900px) {\r\n\tul.grid li {\r\n\t\twidth: 50%;\r\n\t}\r\n\r\n}\r\n\r\n@media screen and (max-width: 400px) {\r\n\tul.grid li {\r\n\t\twidth: 100%;\r\n\t}\r\n\r\n}\r\n\r\nul.grid li >div {\r\n\t-webkit-box-shadow: 0 0 8px -1px #000;\r\n\tbox-shadow: 0 0 8px -1px #000;\r\n\toverflow: hidden;\r\n\tposition: relative;\r\n}\r\n\r\nul.grid li .over {\r\n\tposition: absolute;\r\n\tbottom: -100%;\r\n\twidth: 102%;\r\n\tright: -1%;\r\n\tleft: -1%;\r\n\tcolor: #fff;\r\n}\r\n\r\nul.grid li .comein {\r\n\tposition: relative;\r\n\tz-index: 1;\r\n\tpadding: 15px;\r\n\theight: 100%;\r\n}\r\n\r\nul.grid li .comein i {\r\n\tdisplay: block;\r\n\twidth: 60px;\r\n\theight: 60px;\r\n\tposition: absolute;\r\n\ttop: 50%;\r\n\tmargin-top: -30px;\r\n\tleft: 50%;\r\n\tmargin-left: -30px;\r\n\tfont-size: 22px;\r\n\tcolor: #FFF;\r\n\r\n\t-webkit-box-shadow: 0 0 60px #fff;\r\n\tbox-shadow: 0 0 60px #fff;\r\n\tborder: 1px solid #fff;\r\n\ttext-align: center;\r\n\tpadding-top: 17px;\r\n\tborder-radius: 50%;\r\n}\r\n\r\nul.grid li .comein-bg {\r\n\t-khtml-opacity: .70;\r\n\t-moz-opacity: .70;\r\n\t-ms-filter: \u201dalpha(opacity=70)\u201d;\r\n\tfilter: progid:DXImageTransform.Microsoft.Alpha(opacity=0.7);\r\n\tfilter: alpha(opacity=70);\r\n\topacity: .70;\r\n\tposition: absolute;\r\n\ttop: 0;\r\n\tbottom: 0;\r\n\tright: 0;\r\n\tleft: 0;\r\n\tbackground: #000;\r\n\tz-index: -1;\r\n}\r\n\r\nul.grid li a,ul.grid li img {\r\n\toutline: none;\r\n\tborder: none;\r\n\tdisplay: block;\r\n\tmax-width: 100%;\r\n}\r\n\r\n\/* at start *\/\r\n.my-mfp-slide-bottom .mfp-content {\r\n\t-ms-filter: \"progid:DXImageTransform.Microsoft.Alpha(Opacity=0)\";\r\n\tfilter: alpha(opacity=0);\r\n\topacity: 0;\r\n\r\n\t-webkit-transition: all 0.7s ease-out;\r\n\t-moz-transition: all 0.7s ease-out;\r\n\t-o-transition: all 0.7s ease-out;\r\n\t-ms-transition: all 0.7s ease-out;\r\n\ttransition: all 0.7s ease-out;\r\n\r\n\t-webkit-transform: translateY(-20px) perspective( 600px ) rotateX( 10deg );\r\n\t-moz-transform: translateY(-20px) perspective( 600px ) rotateX( 10deg );\r\n\t-o-transform: translateY(-20px) perspective( 600px ) rotateX( 10deg );\r\n\t-ms-transform: translateY(-20px) perspective( 600px ) rotateX( 10deg );\r\n\ttransform: translateY(-20px) perspective( 600px ) rotateX( 10deg );\r\n}\r\n\r\n\/* animate in *\/\r\n.my-mfp-slide-bottom.mfp-ready .mfp-content {\r\n\t-ms-filter: \"progid:DXImageTransform.Microsoft.Alpha(Opacity=100)\";\r\n\tfilter: alpha(opacity=100);\r\n\topacity: 1;\r\n\r\n\t-webkit-transform: translateY(0) perspective( 600px ) rotateX( 0 );\r\n\t-moz-transform: translateY(0) perspective( 600px ) rotateX( 0 );\r\n\t-o-transform: translateY(0) perspective( 600px ) rotateX( 0 );\r\n\t-ms-transform: translateY(0) perspective( 600px ) rotateX( 0 );\r\n\ttransform: translateY(0) perspective( 600px ) rotateX( 0 );\r\n}\r\n\r\n\/* animate out *\/\r\n.my-mfp-slide-bottom.mfp-removing .mfp-content {\r\n\t-ms-filter: \"progid:DXImageTransform.Microsoft.Alpha(Opacity=0)\";\r\n\tfilter: alpha(opacity=0);\r\n\topacity: 0;\r\n\r\n\t-webkit-transform: translateY(-10px) perspective( 600px ) rotateX( 10deg );\r\n\t-moz-transform: translateY(-10px) perspective( 600px ) rotateX( 10deg );\r\n\t-o-transform: translateY(-10px) perspective( 600px ) rotateX( 10deg );\r\n\t-ms-transform: translateY(-10px) perspective( 600px ) rotateX( 10deg );\r\n\ttransform: translateY(-10px) perspective( 600px ) rotateX( 10deg );\r\n}\r\n\r\n\/* Dark overlay, start state *\/\r\n.my-mfp-slide-bottom.mfp-bg {\r\n\t-ms-filter: \"progid:DXImageTransform.Microsoft.Alpha(Opacity=0)\";\r\n\tfilter: alpha(opacity=0);\r\n\topacity: 0;\r\n\r\n\t-webkit-transition: opacity 0.3s ease-out;\r\n\t-moz-transition: opacity 0.3s ease-out;\r\n\t-o-transition: opacity 0.3s ease-out;\r\n\t-ms-transition: opacity 0.3s ease-out;\r\n\ttransition: opacity 0.3s ease-out;\r\n}\r\n\r\n\/* animate in *\/\r\n.my-mfp-slide-bottom.mfp-ready.mfp-bg {\r\n\t-ms-filter: \"progid:DXImageTransform.Microsoft.Alpha(Opacity=80)\";\r\n\tfilter: alpha(opacity=80);\r\n\topacity: 0.8;\r\n}\r\n\r\n\/* animate out *\/\r\n.my-mfp-slide-bottom.mfp-removing.mfp-bg {\r\n\t-ms-filter: \"progid:DXImageTransform.Microsoft.Alpha(Opacity=0)\";\r\n\tfilter: alpha(opacity=0);\r\n\topacity: 0;\r\n}\r\n\r\n\r\n\/* contanct\r\n **************************************************\/\r\n.contact-office {\r\n\tbackground: #fff url('..\/img\/contact-bg-1.png') no-repeat;\r\n}\r\n\r\n.contact-lab {\r\n\tbackground: #fff url('..\/img\/contact-bg-2.png') no-repeat;\r\n\tcolor: #fff;\r\n}\r\n\r\n\/*.contact-office .icon-huge, .contact-lab .icon-huge{\r\n\tcolor: #03cc85;\r\n}*\/\r\n\r\n\r\n.icon-huge {\r\n\tfont-size: 170px;\r\n\ttext-align: center;\r\n\t-ms-filter: \"progid:DXImageTransform.Microsoft.Alpha(Opacity=30)\";\r\n\tfilter: alpha(opacity=30);\r\n\topacity: 0.3;\r\n\tdisplay: block;\r\n\tpadding-top: 30px;\r\n}\r\n\r\n@media (max-width: 500px) {\r\n\tul.timeline {\r\n\t\tmargin: 0;\r\n\t\tborder-left: none;\r\n\t}\r\n\r\n\tul.timeline .circle {\r\n\t\tdisplay: none;\r\n\t}\r\n\r\n\tul.timeline .data {\r\n\t\tmargin: 0 !important;\r\n\t\tmargin-bottom: 10px !important;\r\n\t\tpadding-top: 65px !important;\r\n\t}\r\n\r\n\tul.timeline .date {\r\n\t\tmargin-left: 0 !important;\r\n\t}\r\n\r\n\t#sidebar{\r\n\t\twidth: 100%;\r\n\t}\r\n\r\n\t#sidebar-wrapper{\r\n\t\toverflow: auto;\r\n\t}\r\n\r\n}\r\n\r\n@media (max-width: 991px) {\r\n\t.mobilemenu {\r\n\tdisplay: block;\r\n\t}\r\n\r\n\t.social-icons,#main-nav {\r\n\t\tleft: 0px;\r\n\t\tz-index: 0;\r\n\t}\r\n\r\n\t#main {\r\n\t\tleft: 0;\r\n\t}\r\n\r\n}\r\n\r\n\r\n\/* fix for mobile view of pages *\/\r\n@media screen and (max-width: 770px) {\r\n\t \r\n\t #blog-content{\r\n\t \twidth:100% !important;\r\n\t }\r\n\t .page{\r\n\t \twidth:100% !important;\r\n\t \tleft:0 !important;\r\n\t}\r\n\r\n\t.headercontent .title{\r\n\t\tfont-size: 20px;\r\n\t}\r\n\t\r\n}\r\n\r\n\r\n\r\n\r\nul#navigation li.external:hover .fa, ul#navigation li.currentmenu .fa {\r\n  color: #03cc85;\r\n}\r\n\r\n.ul-boxed li {\r\n  border-left-color: #03cc85;\r\n}\r\n\r\nul.ul-card li .dy .year {\r\n  background-color: #03cc85;\r\n}\r\n\r\nul.ul-dates div.dates span {\r\n  background-color: #03cc85;\r\n}\r\n\r\nul.timeline li .date {\r\n  background-color: #03cc85;\r\n  background-image: none;\r\n  background-repeat: repeat;\r\n  background-attachment: scroll;\r\n  background-position: 0% 0%;\r\n}\r\n\r\nul.timeline li .data {\r\n  border-left-color: #03cc85;\r\n}\r\n\r\n.ul-withdetails li .imageoverlay {\r\n  background-color: #03cc85;\r\n  background-image: none;\r\n  background-repeat: repeat;\r\n  background-attachment: scroll;\r\n  background-position: 0% 0%;\r\n}\r\n\r\n.cd-active.cd-dropdown > span {\r\n  color: #03cc85;\r\n}\r\n\r\n.cd-active.cd-dropdown ul li span:hover {\r\n  background-color: #03cc85;\r\n  background-image: none;\r\n  background-repeat: repeat;\r\n  background-attachment: scroll;\r\n  background-position: 0% 0%;\r\n}\r\n\r\n.pitems .pubmain .pubassets {\r\n  border-top-color: #03cc85;\r\n}\r\n\r\n.pitems .pubmain .pubassets a:hover, .pitems .pubmain .pubassets a:focus, .pitems .pubmain .pubassets a.pubcollapse {\r\n  background-color: #03cc85;\r\n  background-image: none;\r\n  background-repeat: repeat;\r\n  background-attachment: scroll;\r\n  background-position: 0% 0%;\r\n}\r\n\r\n.contact-office .icon-huge, .contact-lab .icon-huge {\r\n  color: #03cc85;\r\n}\r\n\r\nul.ul-card li .dy .degree {\r\n  background-color: #03bb7a;\r\n}\r\n\r\nul.ul-dates div.dates span:last-child {\r\n  background-color: #03bb7a;\r\n}\r\n\r\nul.timeline li.open .circle {\r\n  background-color: #03bb7a;\r\n}\r\n\r\nul.timeline li.open .data {\r\n  border-top-color: #03bb7a;\r\n  border-right-color: #03bb7a;\r\n  border-bottom-color: #03bb7a;\r\n  border-left-color: #03bb7a;\r\n}\r\n\r\n#labp-heads-wrap {\r\n  background-color: #03bb7a;\r\n}\r\n\r\n#labp-heads-wrap::after {\r\n  border-top-color: #03bb7a;\r\n}\r\n\r\n#test {\r\n  font-size: larger;\r\n}\r\n\r\n#test1 {\r\n  font-size: x-large;\r\n}\r\n\r\n#test2 {\r\n  font-size: larger;\r\n}\r\n\r\n\r\n <\/style> <style>\r\n    ul#navigation li.external:hover .fa, ul#navigation li.currentmenu .fa {\r\n  color: #03cc85;\r\n}\r\n\r\n.ul-boxed li {\r\n  border-left-color: #d22f22;\r\n}\r\n\r\nul.ul-card li .dy .year {\r\n  background-color: #03cc85;\r\n}\r\n\r\nul.ul-dates div.dates span {\r\n  background-color: #03cc85;\r\n}\r\n\r\nul.timeline li .date {\r\n  background-color: #03cc85;\r\n  background-image: none;\r\n  background-repeat: repeat;\r\n  background-attachment: scroll;\r\n  background-position: 0% 0%;\r\n}\r\n\r\nul.timeline li .data {\r\n  border-left-color: #03cc85;\r\n}\r\n\r\n.ul-withdetails li .imageoverlay {\r\n  background-color: #03cc85;\r\n  background-image: none;\r\n  background-repeat: repeat;\r\n  background-attachment: scroll;\r\n  background-position: 0% 0%;\r\n}\r\n\r\n.cd-active.cd-dropdown > span {\r\n  color: #03cc85;\r\n}\r\n\r\n.cd-active.cd-dropdown ul li span:hover {\r\n  background-color: #03cc85;\r\n  background-image: none;\r\n  background-repeat: repeat;\r\n  background-attachment: scroll;\r\n  background-position: 0% 0%;\r\n}\r\n\r\n.pitems .pubmain .pubassets {\r\n  border-top-color: #03cc85;\r\n}\r\n\r\n.pitems .pubmain .pubassets a:hover, .pitems .pubmain .pubassets a:focus, .pitems .pubmain .pubassets a.pubcollapse {\r\n  background-color: #03cc85;\r\n  background-image: none;\r\n  background-repeat: repeat;\r\n  background-attachment: scroll;\r\n  background-position: 0% 0%;\r\n}\r\n\r\n.contact-office .icon-huge, .contact-lab .icon-huge {\r\n  color: #03cc85;\r\n}\r\n\r\nul.ul-card li .dy .degree {\r\n  background-color: #03bb7a;\r\n}\r\n\r\nul.ul-dates div.dates span:last-child {\r\n  background-color: #03bb7a;\r\n}\r\n\r\nul.timeline li.open .circle {\r\n  background-color: #03bb7a;\r\n}\r\n\r\nul.timeline li.open .data {\r\n  border-top-color: #03bb7a;\r\n  border-right-color: #03bb7a;\r\n  border-bottom-color: #03bb7a;\r\n  border-left-color: #03bb7a;\r\n}\r\n\r\n#labp-heads-wrap {\r\n  background-color: #03bb7a;\r\n}\r\n\r\n#labp-heads-wrap::after {\r\n  border-top-color: #03bb7a;\r\n}\r\n\r\n#test {\r\n  font-size: larger;\r\n}\r\n\r\n#test1 {\r\n  font-size: x-large;\r\n}\r\n\r\n#test2 {\r\n  font-size: larger;\r\n}\r\n\r\nul {\r\n\tposition: relative;\r\n\tlist-style: none;\r\n\tmargin-left: 0;\r\n\tpadding-left: 1.2em;\r\n}\r\nul li:before {\r\n\tcontent: \"+\";\r\n\tposition: absolute;\r\n\tleft: 0;\r\n}\r\nh3 a:link {\r\ntext-decoration:none;\r\n}\r\n\r\n\r\n<\/style>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<div class=\"pageheader\">\r\n\r\n<div class=\"section-container\">\r\n<div class=\"row\">\r\n<div class=\"col-md-8\">\r\n<p style=\"text-align:justify; font-size:18px\">This section shows the active research projects in our lab.<\/p>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"pagecontents\">\r\n\r\n\r\n<div class=\"row\">\r\n\r\n<div class=\"title text-center\">\r\n\r\n<div class=\"row\">\r\n<div class=\"col-sm-4 col-md-3\">\r\n\r\n<figure><img decoding=\"async\" class=\"img-responsive\" src=\"https:\/\/research.ece.ncsu.edu\/wp-content\/uploads\/sites\/8\/2019\/05\/QuantumComp.png\" alt=\"image\" \/><\/figure>\r\n\r\n<\/div>\r\n<div class=\"col-sm-8 col-md-9\">\r\n<div class=\"meta\"> \r\n<h3><a href=\"https:\/\/research.ece.ncsu.edu\/aaysu\/research\/pq-nsf.html\" class=\"tooltips\" title=\"External link\" target=\"_blank\" rel=\"noopener noreferrer\"> Post-Quantum Cryptography<\/a><\/h3>\r\n<p style=\"text-align: justify;\">Quantum computers will make\u00a0all existing public-key schemes obsolete and generate a critical need to develop quantum-secure alternatives.\r\n<div id=\"links1-link-16\" class=\"sh-link links1-link sh-hide\"><a href=\"#\" onclick=\"showhide_toggle('links1', 16, 'Show more...', 'Show less...'); return false;\" aria-expanded=\"false\"><span id=\"links1-toggle-16\">Show more...<\/span><\/a><\/div><div id=\"links1-content-16\" class=\"sh-content links1-content sh-hide\" style=\"display: none;\"> <\/p><p style=\"text-align: justify;\">\r\nThe primary purpose of this research is to design efficient post-quantum cryptosystems and to optimize them for low-cost, embedded, and real-time applications. Since Shor\u2019s quantum cryptanalysis of factorization and discrete logarithm problems, it is known that the widely-adopted public-key encryptions like RSA and ECC fails to provide security under quantum computer attacks. Post-quantum cryptography seeks alternative constructions that can secure the cyberspace against the attacks of such powerful quantum computers. In our research, we focus on the two most promising post-quantum proposals: lattice-based and hash-based cryptosystems. While hash-based cryptosystems are regarded to be the most secure, lattice-based cryptosystems has a potential to be very efficient for hardware and software realizations. We provide optimized designs for the implementation of these two schemes. Our work proposes optimizations that can drastically improve the efficiency of hardware and software realizations of post-quantum systems and enables them for low-cost and energy-constrained embedded applications.\r\n<br>\r\n<br>Our contribution is threefold, which are documented with three subsequent publications. We <a style=\"font-size: inherit;\" href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/6581570\/\"target=\"_blank\" rel=\"noopener noreferrer\">first<\/a><span style=\"font-size: inherit;\"> analyzed the building block of lattice-based cryptosystems: polynomial multiplication with the number theoretic transform (NTT). We designed a novel hardware architecture for NTT multiplication and implement it on Field Programmable Gate Arrays (FPGAs). The design applies on-the-fly operand computation, improved memory organization, and simplified address generation techniques to reduce the number of slices, memory blocks, and memory accesses. We demonstrate that, compared to previous work, the proposed design can save up to 80% of these resources while still achieving a similar performance. <a style=\"font-size: inherit;\" href=\"http:\/\/dl.acm.org\/citation.cfm?id=2724714\"target=\"_blank\" rel=\"noopener noreferrer\">Second<\/a><span style=\"font-size: inherit;\">, we implement a full lattice-based post-quantum digital signature scheme on FPGAs. This design is targeted for real-time systems like avionics and automotive, and it thus minimizes the latency of a digital signature generation. We propose a hardware\/software co-designed system that is partitioned in such a way to maximize the efficiency of a given area for signature generation. The system applies an optimization using precomputation by mapping all input-independent operations to software running on a softcore microprocessor and by accelerating the latency-critical operations with a customized hardware. This approach drastically reduces the latency of signature generation up to 105. <a style=\"font-size: inherit;\" href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7328726\/\"target=\"_blank\" rel=\"noopener noreferrer\">Third<\/a><span style=\"font-size: inherit;\">, we extend precomputation methodology on extremely constrained and energy-harvested embedded microcontrollers that run entirely of solar energy. This system computes post-quantum digital signatures using hash-based cryptography. We identify energy-friendly intervals in the energy profile that favors precomputation, which improve the energy footprint of the hash-based signature generation up to 11.9.\r\n<\/div><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"row\">\r\n<div class=\"col-sm-4 col-md-3\">\r\n\r\n<figure><img decoding=\"async\" class=\"img-responsive\" src=\"https:\/\/research.ece.ncsu.edu\/wp-content\/uploads\/sites\/8\/2019\/08\/lightlogo.png\" alt=\"image\" \/><\/figure>\r\n<\/div>\r\n<div class=\"col-sm-8 col-md-9\">\r\n<div class=\"meta\">\r\n<h3>Lightweight Cryptography for IoT<\/h3>\r\n<p style=\"text-align: justify;\">As small things connect to internet, their security mechanisms should be tailored to match stringent area and power constraints.<div id=\"links2-link-16\" class=\"sh-link links2-link sh-hide\"><a href=\"#\" onclick=\"showhide_toggle('links2', 16, 'Show more...', 'Show less...'); return false;\" aria-expanded=\"false\"><span id=\"links2-toggle-16\">Show more...<\/span><\/a><\/div><div id=\"links2-content-16\" class=\"sh-content links2-content sh-hide\" style=\"display: none;\"> <\/p><p style=\"text-align: justify;\">The primary objective of this project is to design low-cost hardware architectures for security solutions on the Internet-of-Things (IoT). Constrained platforms like Radio Frequency Identifiers (RFID), Near Field Communication (NFC) tags, and Wireless Sensor Nodes (WSN) forms the IoT that enable a myriad of brand new applications. These platforms require a simple yet effective security solution thus public-key infrastructures are typically infeasible for them. Unfortunately, even the traditional symmetric-key systems based on AES and 3-DES are too complex to be used in such low-cost architectures. Lightweight cryptography addresses these constraints by proposing alternative cryptographic building blocks that are suitable for the constrained IoT nodes. Our research sought ultra-low-cost hardware designs for FPGA based nodes that will activate lightweight security solutions.\r\n<br>\r\n<br>At its core, our work uses a block cipher called SIMON, which was recently developed by the National Security Agency (NSA). We proposed three contributions based on this design which are documented with three subsequent publications. We <a style=\"font-size: inherit;\" href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/6782431\/\"target=\"_blank\" rel=\"noopener noreferrer\">first<\/a><span style=\"font-size: inherit;\"> demonstrate that the SIMON algorithm yields extremely small architectures on FPGAs. We apply bit-serialization, a design method to process one output bit in one clock cycle, on SIMON and quantify that the resulting architecture is indeed the smallest block cipher ever published at 128-bit security level. <\/span><a style=\"font-size: inherit;\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-16363-5_3\"target=\"_blank\" rel=\"noopener noreferrer\">Second<\/a><span style=\"font-size: inherit;\">, we extend this design into a flexible yet still compact architecture that can implement all configurations of SIMON including all key sizes (from 64-bits to 256-bits) and all block sizes (from 32-bits to 128-bits). This design is still smaller than the majority of block ciphers and all hash functions at equivalent security levels. Third, we propose <\/span><a style=\"font-size: inherit;\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-26617-6_18\"target=\"_blank\" rel=\"noopener noreferrer\">BitCryptor<\/a><span style=\"font-size: inherit;\">, a multi-purpose, bit-serialized, compact processor for symmetric-key cryptographic applications on reconfigurable hardware. The proposed crypto engine can perform pseudo-random number generation, strong collision-resistant hashing and variable-key block cipher encryption. The entire crypto engine is 95 slices (187 LUTs, 102 registers), which is 10\u00d7 smaller than the nearest comparable multi-purpose design.\r\n<\/div><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-sm-4 col-md-3\">\r\n<div class=\"image\">\r\n<figure><img decoding=\"async\" class=\"img-responsive\" src=\"https:\/\/research.ece.ncsu.edu\/wp-content\/uploads\/sites\/8\/2019\/05\/PUF.png\" alt=\"image\" \/><\/figure>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-sm-8 col-md-9\">\r\n<div class=\"meta\">\r\n<h3>Physical Unclonable Functions (PUFs)<\/h3>\r\n<p style=\"text-align: justify;\">PUF is a new technology to combat counterfeit electronic devices by building on-chip digital fingerprints from inherent manufacturing variations.<div id=\"links3-link-16\" class=\"sh-link links3-link sh-hide\"><a href=\"#\" onclick=\"showhide_toggle('links3', 16, 'Show more...', 'Show less...'); return false;\" aria-expanded=\"false\"><span id=\"links3-toggle-16\">Show more...<\/span><\/a><\/div><div id=\"links3-content-16\" class=\"sh-content links3-content sh-hide\" style=\"display: none;\"> <\/p><p style=\"text-align: justify;\"> The process variations during the manufacturing of a digital device causes deviations from its intended electrical characteristics. These variations are due to random events like micro-vibrations and lithographic errors which are unavoidable and hard to precisely model. Therefore, it is infeasible to clone an exact replica of a digital device by intentionally replicating its specific process variations. Physical Unclonable Function (PUF) technology exploits these variations to generate a unique and hardware-intrinsic identifier from a physical platform. The generated identifier is a silicon fingerprint of the device and can form its root-of-trust. Thus, PUFs provide a new method to generate secret values inside hardware. Although it is a very promising concept, the suitability of these methods are unclear on a wide range of electronic devices.<br>\r\n<a><br>PUF HARDWARE<\/a>\r\n<br>\r\nThe primary objective of this project is to design novel PUF constructions on new hardware platforms. Our contribution is threefold, which are documented with three subsequent publications. <a style=\"font-size: inherit;\" href=\"http:\/\/dl.acm.org\/citation.cfm?id=2527319\"target=\"_blank\" rel=\"noopener noreferrer\">First<\/a><span style=\"font-size: inherit;\">, we propose a o novel PUF construction on a microelectromechanical system (MEMS) sensor, an accelerometer, and utilize its process variations to generate digital fingerprints. This is achieved by measuring the accelerometer\u2019s unique response to an applied electrostatic impulse and by measuring its inherent offset values. We then proposed <a style=\"font-size: inherit;\" href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/6732317\/\"target=\"_blank\" rel=\"noopener noreferrer\">PASC<\/a><span style=\"font-size: inherit;\">, a novel PUF construction on FPGAs by using the critical timing path violations of a custom instruction execution. This PUF is tightly integrated into the System-on-Chip (SoC) design and can be issued by instructions of a soft-core processor. <a style=\"font-size: inherit;\" href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0141933115000447\"target=\"_blank\" rel=\"noopener noreferrer\">Third<\/a><span style=\"font-size: inherit;\">, we propose a synchronous variant of the FPGA PUF that uses the principles of time-to-digital converters. Our solutions enable practical, run-time physical evaluation of the hardware via PUFs and it allows flexible post-processing mechanisms using software. We used advanced statistical methods to quantify the quality of our PUF designs and revealed that the digital responses of PUFs have the potential to fingerprint trillions of electronic devices.<br>\r\n<a><br>PUF PROTOCOLS<\/a><br>\r\nThe primary purpose of this project is to devise novel protocols and complete systems with new cryptographic primitives for next-generation applications. Our contribution is fourfold, which are document with three subsequent publications and one granted patent. <a style=\"font-size: inherit;\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-662-48324-4_28\"target=\"_blank\" rel=\"noopener noreferrer\">First<\/a><span style=\"font-size: inherit;\">, we demonstrate the end-to-end design of a cryptographic protocol from theory to its practical application: reported results include a full protocol analysis, the design of its building blocks, their integration into a constrained device, and finally its performance evaluation. The protocol is provably (information-theoretically) secure and we verify that it does not leak any privacy information during the authentication test. The proposed system also describes a novel error correction mechanism for key generation which has an improved error coding efficiency. <a style=\"font-size: inherit;\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-53177-9_2\"target=\"_blank\" rel=\"noopener noreferrer\">Second<\/a><span style=\"font-size: inherit;\">, we extend this protocol with a channel-based key-agreement (CBKA) scheme that allows to generate session keys to provide outsider chosen perturbation security. <a style=\"font-size: inherit;\" href=\"http:\/\/ieeexplore.ieee.org\/abstract\/document\/7459554\/\"target=\"_blank\" rel=\"noopener noreferrer\">Third<\/a><span style=\"font-size: inherit;\">, we propose a method for remotely checking the integrity of components within a complex system that is deployed in the field. The proposed solution fuses the information of key components into a combined board identifier and performs a lightweight cryptographic protocol for its validation. <a style=\"font-size: inherit;\" href=\"https:\/\/www.google.com\/patents\/US9497573\"target=\"_blank\" rel=\"noopener noreferrer\">Fourth<\/a><span style=\"font-size: inherit;\">, we propose a framework of cryptographic protocols for unified near field communication (NFC) tags. This framework addresses the challenges of current systems: a unified tag serves multiple applications from multiple vendors thus it should ensure that no sensitive information is leaked between those entities.\r\n<\/div><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-sm-4 col-md-3\">\r\n<div class=\"image\">\r\n<figure><img decoding=\"async\" class=\"img-responsive\" src=\"https:\/\/research.ece.ncsu.edu\/wp-content\/uploads\/sites\/8\/2019\/08\/SideChannel.png\" alt=\"image\" \/><\/figure>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-sm-8 col-md-9\">\r\n<div class=\"meta\">\r\n<h3>Side-channel Attacks<\/h3>\r\n<p style=\"text-align: justify;\">Side-channel attacks use implementation vulnerabilities to break cryptographically secure algorithms.<div id=\"links4-link-16\" class=\"sh-link links4-link sh-hide\"><a href=\"#\" onclick=\"showhide_toggle('links4', 16, 'Show more...', 'Show less...'); return false;\" aria-expanded=\"false\"><span id=\"links4-toggle-16\">Show more...<\/span><\/a><\/div><div id=\"links4-content-16\" class=\"sh-content links4-content sh-hide\" style=\"display: none;\"> <\/p><p style=\"text-align: justify;\"> Although cryptograpic algorithms can provide theoretical guarentees, their practical implementations can leak secrets through side-channel information. Physical side-channels are especially important for IoT and CPS applications where the correlation of secrets to execution time of the algorithm, power consumption of the device, and electromagnetic radiation of the hardware can be exploited to implement side-channel attacks. We are using advanced side-channel attacks to break cryptographic and other state-of-the-art systems. Our <a style=\"font-size: inherit;\" href=\"http:\/\/rijndael.ece.vt.edu\/aydinay\/date_PQ_preprint.pdf\"target=\"_blank\" rel=\"noopener noreferrer\">most recent research<\/a><span style=\"font-size: inherit;\"> showed that a promising lattice-based Post-Quantum encryption proposal, which provide theoretical security against quantum computers, can be broken with a side-channel attack that costs less than 100$ worth of equipment. We furthermore showed that this attack can be mitigated by a low-cost hardware countermeasure that uses an algorithmic specific opportunity to randomize internal secrets of the encryption. More information will be added to this project following the publication of the related work.<\/div><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-sm-4 col-md-3\">\r\n<div class=\"image\">\r\n<figure><img decoding=\"async\" class=\"img-responsive\" src=\"https:\/\/research.ece.ncsu.edu\/wp-content\/uploads\/sites\/8\/2019\/08\/CompSec.png\" alt=\"image\" \/><\/figure>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-sm-8 col-md-9\">\r\n<div class=\"meta\">\r\n<h3>Secure Computer Architectures and Malware Detection with Machine Learning<\/h3>\r\n<p style=\"text-align: justify;\">New micro-architectural attacks encourage designers to detect zero-day malware through machine learning. <div id=\"links5-link-16\" class=\"sh-link links5-link sh-hide\"><a href=\"#\" onclick=\"showhide_toggle('links5', 16, 'Show more...', 'Show less...'); return false;\" aria-expanded=\"false\"><span id=\"links5-toggle-16\">Show more...<\/span><\/a><\/div><div id=\"links5-content-16\" class=\"sh-content links5-content sh-hide\" style=\"display: none;\"> <\/p><p style=\"text-align: justify;\"> For the last four decades, computer architectures have been optimized for performance and cost with a rule of thumb that says &#8220;make common case fast&#8221;. As we use computers in everyday applications, a third dimension, <a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-41224-0_1\"target=\"_blank\" rel=\"noopener noreferrer\">security<\/a>, have appeared, and adversaries started to exploit the variation introduced by performance\/cost optimizations. New micro-architectural attacks such as covert-channel and rowhammer malware are such examples that are hard to detect using conventional malware analysis techniques. On the other hand, these attacks have to manifest themselves in someway (eg. deviations in power consumption) as they introduce anomaly to system&#8217;s activity. Machine learning methods can analyze the behavior of trusted states and identify if\/when it alters from expected conditions, enabling the discovery of zero-day malware. More information will be added to this project following the publication of the related work.<\/div><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n","protected":false},"excerpt":{"rendered":"<p>\ufeff This section shows the active research projects in our lab. Post-Quantum Cryptography Quantum computers will make\u00a0all existing public-key schemes obsolete and generate a critical&#8230;<\/p>\n","protected":false},"author":39,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-16","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/pages\/16","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/comments?post=16"}],"version-history":[{"count":470,"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/pages\/16\/revisions"}],"predecessor-version":[{"id":3955,"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/pages\/16\/revisions\/3955"}],"wp:attachment":[{"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/media?parent=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}