• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-6 of 6

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Number Theoretic, Computational and Cryptographic Aspects of a Certain Sequence of Arithmetic Progressions 

    Srikanth, Cherukupally (2018-06-21)
    This thesis introduces a new mathematical object: collection of arithmetic progressions with elements satisfying the inverse property, \j-th terms of i-th and (i+1)-th progressions are multiplicative inverses of each other ...

    Electronic Access Control Systems: A New Approach 

    Janardhana Swamy, V C (Indian Institute of Science, 2006-08-30)
    Security systems are gaining increasing importance in recent times to protect life and valuable resources. Many advanced methods of providing security have been developed and are in use in the last few decades. Of these, ...

    Anonymity With Authenticity 

    Swaroop, D (2014-09-02)
    Cryptography is science of secure message transmission. Cryptanalysis is involved with breaking these encrypted messages. Both cryptography and cryptanalysis constitute together to form cryptology. Anonymity means ...

    Analysis Of A Sieving Heuristic For The Number Field Sieve And Design Of Low-Correlation CDMA Sequences 

    Garg, Gagan (2011-01-25)
    In this thesis, we investigate in detail, certain important problems in cryptography and coding theory. In the first part of this thesis, we discuss the number field sieve and compare the two ways in which the sieving ...

    New Approaches And Experimental Studies On - Alegebraic Attacks On Stream Ciphers 

    Pillai, N Rajesh (2015-02-05)
    Algebraic attacks constitute an effective class of cryptanalytic attacks which have come up recently. In algebraic attacks, the relations between the input, output and the key are expressed as a system of equations and ...

    Guessing And Compression : A Large Deviations Approach 

    Hanawal, Manjesh Kumar (2011-04-01)
    The problem of guessing a random string is studied. It arises in the analysis of the strength of secret-key cryptosystems against guessing attacks. Expected number of guesses, or more generally moments of the number of ...

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorGarg, Gagan (1)Hanawal, Manjesh Kumar (1)Janardhana Swamy, V C (1)Pillai, N Rajesh (1)Srikanth, Cherukupally (1)Swaroop, D (1)Subject
    Computer Science (6)
    Cryptography (6)
    Coding Theory (2)Access Control (1)Access Control Systems (ACS) (1)Algebraic Attacks (1)Anonymous Systems (Communication) (1)Anonymous Systems (Communication) Protocols (1)Arithmetic Progressions (1)CDMA Sequences (1)... View MoreDate Issued2010 - 2018 (5)2006 - 2009 (1)Has File(s)Yes (6)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV