Varun Maram

ORCID: 0000-0002-1607-9062
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Complexity and Algorithms in Graphs
  • Quantum Computing Algorithms and Architecture
  • China's Socioeconomic Reforms and Governance
  • Recommender Systems and Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Cooperative Communication and Network Coding
  • Coding theory and cryptography
  • Advanced Image and Video Retrieval Techniques
  • Image Retrieval and Classification Techniques
  • Advanced Wireless Network Optimization
  • Advanced Wireless Communication Techniques
  • Advanced MIMO Systems Optimization
  • Advanced Data Storage Technologies
  • Algorithms and Data Compression
  • Wireless Communication Security Techniques
  • Distributed and Parallel Computing Systems
  • Cellular Automata and Applications

ETH Zurich
2020-2023

Institute of Information Security
2022

Indian Institute of Technology Roorkee
2017

New Jersey Institute of Technology
2002

The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3. OCB1 OCB3 can be used as secure authenticated encryption schemes whereas been shown to classically insecure (Inoue et al., Crypto 2019). Even further, in the presence quantum queries functionality, a series works by Kaplan al. (Crypto 2016), Bhaumik (Asiacrypt 2021) Bonnetain have how break unforgeability modes. However, these did not consider confidentiality queries.We fill this gap presenting first formal...

10.46586/tosc.v2022.i2.379-414 article EN cc-by IACR Transactions on Symmetric Cryptology 2022-06-10

Both algorithms are adaptive and require no extra communication from the encoder to decoder. The authors present a scheme cascade these into an algorithm which achieves higher compression ratio is appropriate for communication. Different refinements of cascading tested optimize secondary compression.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">&gt;</ETX>

10.1109/dcc.1991.213353 article EN 2002-12-09

Augmented Reality (AR) based applications have existed for some time; however, their true potential in digital marketing remains unexploited. To bridge this gap we create a novel consumer targeting system. First, analyze interactions on AR-based retail apps to identify her preferred purchase viewpoint during the session. We then target through personalized catalog, created by embedding recommended products visual. The color and style of embedded product are matched with recommendations, text...

10.1109/ismar-adjunct.2017.34 article EN 2017-10-01

Broadcast is a primitive which allows specific party to distribute message consistently among n parties, even if up t parties exhibit malicious behaviour. In the classical model with complete network of bilateral authenticated channels, seminal result Pease et al. [Pease al., 1980] shows that broadcast achievable and only < n/3. There are two generalizations suggested for problem - respect adversarial communication model. Fitzi Maurer [Fitzi Maurer, 1998] consider (non-threshold) general...

10.4230/lipics.opodis.2020.25 article EN International Conference on Principles of Distributed Systems 2021-01-01
Coming Soon ...