INSTITUTIONAL DIGITAL REPOSITORY

Browsing Research Publications by Author "Jati, A."

Browsing Research Publications by Author "Jati, A."

Sort by: Order: Results:

  • Chang, D.; Jati, A.; Mishra, S.; Sanadhya, S.K. (2018-12-31)
    A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding the secret key of a block cipher. This technique allows sharing the effort of key search between the two extremes of ...
  • Chang, D.; Jati, A.; Mishra, S.; Sanadhya, S. K. (2021-08-22)
    Increasing threat of password leakage from compromised password hashes demands a resource consuming password-hashing algorithm to prevent the precomputation of the password hashes. A class of password-hashing schemes (PHS) ...
  • Jati, A.; Gupta, N.; Chattopadhyay, A.; Sanadhya, S. K.; Chang, D. (2021-07-01)
    Threshold Implementation (TI) is one of the most widely used countermeasure for side channel attacks. Over the years several TI techniques have been proposed for randomizing cipher execution using different variations ...

Search DSpace


Advanced Search

Browse

My Account