• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 14

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    New Approaches And Experimental Studies On - Alegebraic Attacks On Stream Ciphers 

    Pillai, N Rajesh (2015-02-05)
    Algebraic attacks constitute an effective class of cryptanalytic attacks which have come up recently. In algebraic attacks, the relations between the input, output and the key are expressed as a system of equations and ...

    Analysis Of A Sieving Heuristic For The Number Field Sieve And Design Of Low-Correlation CDMA Sequences 

    Garg, Gagan (2011-01-25)
    In this thesis, we investigate in detail, certain important problems in cryptography and coding theory. In the first part of this thesis, we discuss the number field sieve and compare the two ways in which the sieving ...

    Number Theoretic, Computational and Cryptographic Aspects of a Certain Sequence of Arithmetic Progressions 

    Srikanth, Cherukupally (2018-06-21)
    This thesis introduces a new mathematical object: collection of arithmetic progressions with elements satisfying the inverse property, \j-th terms of i-th and (i+1)-th progressions are multiplicative inverses of each other ...

    Advancing the Communication Complexity Landscape of Perfectly Secure Multiparty Computation 

    Patil, Shravani Mahesh
    Secure multiparty computation (MPC) allows n distrustful parties to jointly compute a function on their inputs while keeping their inputs private. The distrust is modelled as an adversary that controls up to t parties and ...

    Secure Computation Protocol Suite for Privacy-Conscious Applications 

    Saipanmuluk, Koti Nishat
    As an alternative to performing analytics in the clear, there is an increasing demand for developing privacy-preserving solutions that aim to protect sensitive data while still allowing for its efficient analysis. Among ...

    Ankora: Notions of Multi-party Computation and Zero-knowledge Beyond Conventional Models 

    Paul, Protik Kumar
    In the era of digitalization, data privacy and integrity are of utmost importance. Secure multiparty computation (MPC) and zero-knowledge (ZK) facilitate data privacy and integrity. MPC enables privacy-preserving collaborative ...

    Locally Reconstructable Non-malleable Secret Sharing 

    Tomy, Jenit
    Non-malleable secret sharing (NMSS) schemes, introduced by Goyal and Kumar (STOC 2018), ensure that a secret m can be distributed into shares m1,...,mn (for some n), such that any t (a parameter <= n) shares can be ...

    Quantum-Safe Identity-Based Signature Scheme in Multivariate Quadratic Setting 

    Dimri, Akansha
    Cryptographic techniques are essential for the security of communication in modern society. Today, nearly all public key cryptographic schemes used in practice are based on the two problems of factoring large integers and ...

    On the Round Complexity Landscape of Secure Multi-party Computation 

    Ravi, Divya
    In secure multi-party computation (MPC), n parties wish to jointly perform a computation on their private inputs in a secure way, so that no adversary corrupting a subset of the parties can learn more information than their ...

    Zero Knowledge Proofs: Succinct Verification, Distributed Proofs and Lookup Arguments 

    Dutta, Moumita
    Zero-Knowledge Proofs (ZKPs) are fundamental cryptographic tools enabling a prover to convince a verifier about the knowledge of a secret witness related to a public statement, without revealing any information beyond the ...
    • 1
    • 2

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorChakrabarti, Anirban (1)Dimri, Akansha (1)Dutta, Moumita (1)Garg, Gagan (1)Patil, Shravani Mahesh (1)Paul, Protik Kumar (1)Pillai, N Rajesh (1)Prasad, T V S R V (1)Ramachandran, Vijaya (1)Ravi, Divya (1)... View MoreSubject
    Cryptography (14)
    TECHNOLOGY (7)Computer Science (3)Secure multiparty computation (3)MPC (2)Algebraic Attacks (1)anonymous broadcast (1)Arithmetic Progressions (1)Auctions (1)blockchain (1)... View MoreDate Issued2011 (1)2015 (1)2018 (1)Has File(s)Yes (14)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV