IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Author "Sanadhya, Somitra Kumar (Advisor)"

Browsing Computer Science and Engineering by Author "Sanadhya, Somitra Kumar (Advisor)"

Sort by: Order: Results:

  • Ghosh, Mohona; Sanadhya, Somitra Kumar (Advisor); Chang, Donghoon (Advisor) (2016-04-18)
    Cryptographic protocols have been a cornerstone of secure communications among armed forces and diplomatic missions since time immemorial. With easy availability and low cost of computing facilities and Internet, the domain ...
  • Agrawal, Megha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2020-09)
    It is common knowledge that encryption is a useful tool for providing confidentiality. Authentication, however, is often overlooked. Authentication provides data integrity; it helps ensure that any tampering with or ...
  • Hasan, Munawar; Sanadhya, Somitra Kumar (Advisor) (2016-09-20)
  • Singh, Monika; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2022-02)
    With the rapid growth of the World Wide Web and the Internet of Things, huge amounts of digital data are being produced everyday. Digital forensics investigators face an uphill battle when they have to manually screen ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • N., Nalla Anandakumar; Sanadhya, Somitra Kumar (Advisor); Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2019-09)
    Internet of Things (IoT) is a vast and rapidly growing technology right now in the world of innovation. Billions of new electronic devices are going to be connected to the internet in wide-ranging applications. With this ...
  • Bansal, Tarun Kumar; Chang, Donghoon (Advisor); Pieprzyk, Josef (Advisor); Sanadhya, Somitra Kumar (Advisor); Boyen, Xavier (Advisor) (IIIT-Delhi, 2017-10)
    RSA-OAEP is being used in PKCS #1 2.0 standard for a long time. OAEP (optimal asymmetric encryption padding) provides security strength to RSA and other deterministic one-way asymmetric primitives (trapdoor one-way ...
  • Jati, Arpan; Sanadhya, Somitra Kumar (Advisor) (2013-07-09)
    Many Peer to Peer (P2P) protocols and applications have become popular in the recent years and P2P accounts for a very large portion of the internet traffic. But, most protocols are designed with speed and efficiency in ...
  • Biswas, Sandipan; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    The Transport Layer Protocol (TLS) ensures con dentiality and integrity of tra c between communicating parties over internet. Almost all web applications commonly use TLS. A block cipher (such as AES, Camellia etc.) is ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Sharma, Nishant; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    HMAC or keyed-hash message authentication code is a security implementation using cryptographic hash function (where hash function is iterative i.e. classical Merkle-Damgård construction [7] [12]) and a secret key. It ...
  • Manjunath, R Sumesh; Sanadhya, Somitra Kumar (Advisor) (2013-06-10)
    Privacy of the message and authenticity of the sender in a secure communication is a challenging concern. Tradionally these two aims were achieved by using di erent cryptographic primitives: by using encryption for privacy ...
  • Kochar, Komal; Sanadhya, Somitra Kumar (Advisor) (2012-07-25)
    Cryptographic hash Functions are widely used for a wide range of applications such as au- thentication of information, digital signatures and protection of pass-phrases. In the last few years, the cryptanalysis of hash ...
  • Bansal, Tarun Kumar; Sanadhya, Somitra Kumar (Advisor) (2013-07-11)
    In this work, we throw light on gaps between theoretical construction of cryptographic primitives and their practical instantiation. It is assumed that cryptographic primitives will not have any trapdoors in the given ...
  • Gupta, Neha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor); Mukhopadhyay, Sourav (Advisor) (2015-12-02)
    In this work, we present the rst side channel collision based key recovery attack on TWINE block cipher with 80-bit secret key and also present the improved version of the work done by Jongsung et al. in on DES.We focus ...
  • K, Muhammed Noufal; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-02)
    Fair conduct of elections are essential for smooth existence of democratic societies. Voting systems are the method and infrastructure we use to conduct elections. Paper ballot based voting schemes, electronic voting ...

Search Repository


Advanced Search

Browse

My Account