IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Author "Chang, Donghoon (Advisor)"

Browsing Computer Science and Engineering by Author "Chang, Donghoon (Advisor)"

Sort by: Order: Results:

  • Ghosh, Mohona; Sanadhya, Somitra Kumar (Advisor); Chang, Donghoon (Advisor) (2016-04-18)
    Cryptographic protocols have been a cornerstone of secure communications among armed forces and diplomatic missions since time immemorial. With easy availability and low cost of computing facilities and Internet, the domain ...
  • Agrawal, Megha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2020-09)
    It is common knowledge that encryption is a useful tool for providing confidentiality. Authentication, however, is often overlooked. Authentication provides data integrity; it helps ensure that any tampering with or ...
  • Singh, Monika; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2022-02)
    With the rapid growth of the World Wide Web and the Internet of Things, huge amounts of digital data are being produced everyday. Digital forensics investigators face an uphill battle when they have to manually screen ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • Himani; Sharma, Shubham; Chang, Donghoon (Advisor) (2017-04-18)
    We have researched on OpenSSL Random Number Generator (RNG) and Linux Random Number Generator and read about the vulnerabilities and loopholes in the RNGs which make it easier for the adversary to attack on the RNGs and ...
  • Bansal, Tarun Kumar; Chang, Donghoon (Advisor); Pieprzyk, Josef (Advisor); Sanadhya, Somitra Kumar (Advisor); Boyen, Xavier (Advisor) (IIIT-Delhi, 2017-10)
    RSA-OAEP is being used in PKCS #1 2.0 standard for a long time. OAEP (optimal asymmetric encryption padding) provides security strength to RSA and other deterministic one-way asymmetric primitives (trapdoor one-way ...
  • Verma, Robin; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of ...
  • Gupta, Naina; Chang, Donghoon (Advisor) (2016-01-01)
    In the modern world, almost every computing device uses some cryptographic technique or the other. Over the years several schemes have been proposed implemented and standardized. For any kind of data transfer the primary ...
  • Govindaraj, Jayaprakash; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The enterprises are facing constant security threats with the emergence of new mobile computing devices like smartphones, smartwatches, and wearables. The existing digital forensic enabled security solutions are not able ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Garg, Surabhi; Chang, Donghoon (Advisor) (IIIT-Delhi, 2021-06)
    The biometric systems are widely deployed in various sectors for authentication purposes– India’s Aadhaar project (a multi-biometric database of above 1.3 billion of India’s population) being the prominent example. The ...
  • Dwivedi, Purusharth; Chang, Donghoon (Advisor) (IIIT-Delhi, 2017-11-17)
    The following report discusses various facial recognition spoofing techniques in use today, and compares various algorithms, that have been developed for detecting the same. Continuing towards the previous semester’s ...
  • Gupta, Neha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor); Mukhopadhyay, Sourav (Advisor) (2015-12-02)
    In this work, we present the rst side channel collision based key recovery attack on TWINE block cipher with 80-bit secret key and also present the improved version of the work done by Jongsung et al. in on DES.We focus ...
  • K, Muhammed Noufal; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-02)
    Fair conduct of elections are essential for smooth existence of democratic societies. Voting systems are the method and infrastructure we use to conduct elections. Paper ballot based voting schemes, electronic voting ...

Search Repository


Advanced Search

Browse

My Account