Udaya Parampalli

Associate Professor and Reader
School of Computing and Information Systems,
Melbourne School of Engineering, University of Melbourne.

Senior Member, IEEE.

Visiting Professor, I.I.T Kanpur in 2016


IEEE-IT Paper Accepted:

Our paper titled "Security Concerns in Minimum Storage Cooperative Regenerating Codes" has been accepted for publication in IEEE TRANSACTIONS ON INFORMATION THEORY. Archive version is here, August 2016.

Designs Codes and Cryptography-Paper Accepted:

Our paper titled "Construction of low-hit-zone frequency hopping sequences with optimal partial Hamming correlation by interleaving techniques" has been accepted for publication in Designs Codes and Cryptography, August 2016.

ACISP2016 Accepted:

Our paper titled "Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions" appeared at the Australasian Conference on Information Security and Privacy, Melbourne, 4-6 July 2016. The paper is accessed here.

ASIACCS Paper Presentation:

Our paper titled "Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption" wes presented by Shi-Feng Sun at the 11th ACM on Asia Conference on Computer and Communications Security, Xian, China, May 30 - June 3. 2016 The paper is accessed here.

Paper at DRCN2016

Our paper titled "On improving recovery performance in erasure code based geo-diverse storage clusters" has been accepted for International Conference on Design of Reliable Communication Networks (DRCN) at Paris, March 15-17, 2016.

SEquences and Their Applications (SETA) 2016 conference Poster released.

Paper at ACSW-AISC2016

A paper titled " Personally Controlled & Privacy Preserving Medication Management System "will be presented at Australasian Information Security Conference (AISC) at Australian National University (ANU), Canberra, Australia, February 2-5, 2016.

Visiting Professor at I.I.T Kanpur in 2016.

Contact Details

Curriculum Vitae

Suggested Projects

Recent Projects: Projects for MIPP (Melbourne India Postgraduate Program)

Coding for Flash Memories and Distributed Storage

Efficient Information Hiding schemes for Images and Video streaming using Error Correcting codes

Synchronization Waveforms for Modern Radar and Cognitive Radio

Provably Secure Cryptographic Access Control

Existing Projects

Secure E-mail

Electronic mail, usually referred as E-mail, has emerged as a basic communication means on today's computer networks. As the proliferation of Internet and related technologies expand, more need is felt in securing this basic network communication tool. The project involves using the state of the art cryptographic techniques for E-mail security. There is a version of E-mail security package written in Java developed by previous honour students. An ample scope for research in E-mail security exists both in theoretical and developmental aspects.

Contact: Udaya Parampalli

Public key Infra-structure for Network Security

There is a growing interest in applications of cryptographic techniques to Internet and other networks. Public key which was invented in 70's can make tremendous impact on the way business transactions are done on the Internet. The project aims to build an elaborate public key infrastructure for various communication scenario. Special techniques from Elliptic curve theory will be utilized to build new public key algorithms. Again there is a scope for research in development of new software, development of cryptographic protocols and mathematical aspects.

Contact: Udaya Parampalli

Algebraic Coding

Coding theory began its modern journey in late forties with the work of Hamming, Shannon and Golay. The theory virtually dragged abstract mathematics like Algebra and Number theory, then considered as pure mathematics subjects, into the realm of engineering. In its mathematical treatment, algebraic coding theory used properties of discrete structures like finite fields. Algebraic codes are used in error control schemes for transmission of digital signals protecting them against noise, fading and jamming. Basically, these codes add {\it redundant} information to the digital messages so that it is easy to extract the message information even though they are subjected to aberrations like noise, fading and jamming. There are many interesting problems ( for example arithmetic coding, coding for data storage) which are relevant to computers and communication. Those interested can

Contact: Udaya Parampalli.

Quantum Error correcting codes

Quantum error-correcting codes ($q$-codes)are important in protecting transmission of quantum information which is tipped as a communication method of the future. Some of the problems in finding $q$-codes can be converted to the problem of finding classical error-correcting codes over certain alphabets. Those interested can contact

Contact: Udaya Parampalli.

Efficient algorithms for stream cipher

Cryptosystems are generally classified into two categories:secret-key or private key or symmetric systems and public-key or asymmetric systems. In symmetric key crypto systems, sender and receiver share a secret key before using encryption and decryption. Some of the known symmetric key cryptosystems are DES, IDEA and RC4. The platforms where these algorithms are used vary depending on the type of communication. Fast algorithms for stream ciphers are essential if they need to be used for practical purposes. There are many algorithmic issues for development and analysis of stream ciphers. Also, good stream cipher design leads to good message digest algorithms. There are interesting issues related to applicability of stream ciphers to message digest algorithms.

Contact: Udaya Parampalli.

Research Interests

  • Trust and Privacy in Networks
  • Sequences for communication and security
  • Cryptography
  • Combinatorics
  • Theory of error correcting codes


  • Recipient of excellence in Research Award in Computer Science at the University of Melbourne in 2008.


Students (Primary Supervision)

    Current Research Higher Degree Students

  • Ge Yang(Ph.D, topic:Authentication of devices for Internet of Things, co-supervisor Dr. Vanessa Teague)

  • Peter Eze(Ph.D, topic: Novel Information Hiding Through Spread Spectrum Steganography, co-supervisor Prof. Rob Evans)

  • Renlord Yang Ph.D, topic: Trust-less protocols and the design of next generation decentralized, private, anonymized applications on public blockchains, co-supervisor Dr. Toby Murray)

  • Lakshmi Jagathamma Mohan (Ph.D, topic: Secure Repair in Large Scale Distributed Storage Systems , co-supervisor Dr Aaron Harwood)

  • Patrick Vicky(Ph.D, topic: Novel Information Hiding Schemes, co-supervisor Prof. Rob Evans)

  • Partha De(Ph.D, topic: Design of Side-Channel Resistant L ight Weight Cryptography, MIPP Student co-supervisor Dr. Chittaranjan Mandal (I.I.T Kharagpur))

  • Students (Co-Supervision)

  • Kim Ramchen(Ph.D, topic:Privacy Preserving Genomics, co-supervision with Dr. Vanessa Teague)

  • Nicholas Akinyokun (Ph.D, topic:Secure voter registration and eligibility checking for Nigerian elections, co-supervision with Dr. Vanessa Teague)

  • Leyla Roohi (Ph.D, topic:Privacy-preserving computations for Australian metadata, co-supervision with Dr. Vanessa Teague)

  • Shuo Wang (Ph.D, topic: Differentially Private Data Aggregation Methods and Application for Social Systems Data Analysis and Visualization, co-supervision with Professor Richard O. Sinnott)

  • Yang Lu (Ph.D, topic: Semantic-based Trust Management in Clinical Collaborations, co-supervision with Professor Richard O. Sinnott)
  • <

    Current Visiting PhD Students

  • Wei Wu(Ph.D, topic: Privacy preserving data mining in cloud computing environment, Visiting Student from NUDT, China co-supervisor Ming Xian)

  • Past Visiting PhD Students

  • Qifa Yan (Ph.D, topic: Coded Cashing, Visiting Student from SouthWest Jiao Tong University, China co-supervisor Xioahu Tang)

  • Kun Huang (Ph.D, topic: Secrecy Capacity of Distributed Storage Codes, Visiting Student from NUDT, China co-supervisor Ming Xian)

  • Shi-Feng Sun (Ph.D, topic: Non Malleable Public key Cryptography, Visiting Student from Shanghai Jiao Tong University, China co-supervisor Dawu Gu)

  • Master Science (Computer Science) Students

  • Pablo Ignacio Serrano Caneleo (topic: Improving the Performance of Erasure Codes in a Distributed Storage System), December, 2016

  • Hosam Jaber S Aljihani (topic: Ensuring the Privacy of the Aggregated Data in Cloud -Based Electronic Health Record Systems Via Homomorphic Encrption), December, 2016

  • Alwuthaynani, Maha (topic: Secure Cloud-based Personal Health Record Systems Using Cryptographic Storage Service), 2016

  • Patrick Vicky (topic:Spread Spectrum Image Watermarking), July, 2016

  • Completed Research Higher Degree Students

  • Janaka Seneviratne (Ph.D, together with A/Prof. Dr Lars Kulik)

  • Zilong Liu (Visiting Ph.D Student; together with A/Prof Dr. Guan Yong Liang)

  • Kim Ramchen (Masters 2011), Thesis: Electronic Voting, co-supervision with Dr. V. Teague.

  • Peter Hyun Jeen LEE (PhD 2011), Thesis: Identity-based Encryption and its Applications using Bilinear Maps, From July 2013, Post doctoral Scholar, University of New Castle, United Kingdom.

  • Giannakis Antoniou (PhD 2010), Thesis:Technologies Avoiding Privacy Incidents in Hostile Environments (1st supervisor, with Prof Leon Sterling and Prof. Lynn Batten), now a lecturer in Computer Science, The Philips College \96 Nicosia, Cyprus.

  • Shivaramakrishnan Narayan (PhD 2009), Thesis: Secure Identity-based Signatures and Signcryptions Using Pairing, now with Optimal Payments Plc, Calgary, Alberta, Canada.

  • Abdun Mahmood (PhD 2008), Thesis: Hierarchical Clustering and Summarization of Network Traffic Data, (co-supervised with A/Prof. Chris Leckie) now a Lecturer at UNSW, Canberra.

  • Ana Jancic (Masters 2009- Deakin University), Thesis: Authentication in Public Key Encryption Schemes.

  • Andrew J. Newlands (Masters 2004), Thesis: On Cryptanalysis of steam ciphers.


Community Service

    Current Conferences

    Program Committee Co-Chair

  • SETA 2016, SEquences and Their Applications Conference, 2016, Chengdu, China More details will appear soon here.

  • Program Committee Memberships

  • (AISC2016), Australasian Information Security Conference, Melbourne, Australian National University (ANU), Canberra, Australia, 2-5 February 2016.
  • (ACISP2016), 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, 4-6 July 2016.
  • Past Conferences

    General Chair

  • SETA 2014, SEquences and Their Applications Conference, 2014, University of Melbourne, 2014. More details are here.

  • Program Committee Co-Chair

  • Program Committee Co-Chair of IWSDA 2015, The Seventh International Workshop on Signal Design and Its Applications in Communications, Bengaluru, India. The details are here.

  • Program Committee Co-Chair of Australasian Information Security Conference (AISC) 2013-2014. More details will appear here.

  • Program Committee Co-Chair of ACISP 2011, 16th Australasian Conference on Information Security and Privacy Melbourne, Australia.

    Program Committee Memberships

  • (IWDSA13), The Sixth International Workshop on Signal Design and Its Applications in Communications,Tokyo, Japan, 27 Oct - 01 Nov 2013.

  • (SETA2012), SEquences and Their Applications Conf erence, University of Waterloo, Canada, June. 4 to 8, 2012.

  • (IWDSA11), The Fifth International Workshop on Signal Design and Its Applications in Communications,Guilin, China, October 10-14, 2011.

  • (SETA2010), SEquences and Their Applications Conference, Telecom ParisTech, Paris, France, Sept. 12 to 17, 2010.

  • (APCC2010),16th Asia-Pacific Conference on Communications (APCC 2010) - Coding Theory & DSP for Communication,Auckland, New Zealand,Oct. 31 to Nov. 3, 2010.

  • IWDSA09, The Fourth International Workshop on Signal Design and Its Applications in Communications, Fukuoka, Japan, October 19-23, 2009.

  • Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC-18), Tarragona, Spain, June 8-12, 2009.

  • I am a progarm chair of IWDSA07, The Third International Workshop on Signal Design and Its Applications in Communications, to be held in Chengdu, China on September 23 -27, 2007.

  • (SETA2008), SEquences and Their Applications Conference, Kentucky, USA, Sept. 14-18, 2008.

  • Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC-17), Bangalore, India, Dec. 16-20, 2007.

  • The Second Joint Conference SAR - SSI 2007 SAR-SSI07

  • Pairing based Cryptography Workshop - 2006

  • International Conference on SEQUENCES AND THEIR APPLICATIONS 2006(SETA'06)

  • International Workshop on Sequence Design and its Applications in Communications (IWSDA'05)IWSDA05

  • ICCAS005

  • Polynomial Cryptography 2004

    Melbourne-India Postgraduate Program(MIPP)

  • More information is available here

  • Workshop Organization

  • Workshop on Sequence Design and Its Applications in Communications and Cryptography, University of Melbourne, 4-6 December 2008.

  • 2008 Victoria Communications and Security Research meeting, AMSI sponsored event held at ICT building(Theatre 3) from 9.30PM to 5Pm on Fridat, 27th of July, 2007.

Security Group Seminar page is available here