INSTITUTIONAL DIGITAL REPOSITORY

Browsing Year-2018 by Author "Chang, D."

Browsing Year-2018 by Author "Chang, D."

Sort by: Order: Results:

  • Chang, D.; Jati, A.; Mishra, S.; Sanadhya, S.K. (2018-12-31)
    A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding the secret key of a block cipher. This technique allows sharing the effort of key search between the two extremes of ...
  • Akshima, A.; Chang, D.; Goel, A.; Mishra, S.; Sanadhya, S.K. (2018-12-31)
    —Breach in password databases has been a frequent phenomena in the software industry. Often these breaches go undetected for years. Sometimes, even the companies involved are not aware of the breach. Even after they are ...
  • Chang, D.; Chauhan, A.K.; Kumar, S.; Sanadhya, S.K. (2018-12-22)
    In this paper, we present an identity-based encryption scheme from codes with efficient key revocation. Recently, in Crypto 2017, Gaborit et al. proposed a first identity-based encryption scheme from codes with rank ...

Search DSpace


Advanced Search

Browse

My Account