- Cryptography and Data Security
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Complexity and Algorithms in Graphs
- Quantum Computing Algorithms and Architecture
- China's Socioeconomic Reforms and Governance
- Recommender Systems and Techniques
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- Cooperative Communication and Network Coding
- Coding theory and cryptography
- Advanced Image and Video Retrieval Techniques
- Image Retrieval and Classification Techniques
- Advanced Wireless Network Optimization
- Advanced Wireless Communication Techniques
- Advanced MIMO Systems Optimization
- Advanced Data Storage Technologies
- Algorithms and Data Compression
- Wireless Communication Security Techniques
- Distributed and Parallel Computing Systems
- Cellular Automata and Applications
ETH Zurich
2020-2023
Institute of Information Security
2022
Indian Institute of Technology Roorkee
2017
New Jersey Institute of Technology
2002
The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3. OCB1 OCB3 can be used as secure authenticated encryption schemes whereas been shown to classically insecure (Inoue et al., Crypto 2019). Even further, in the presence quantum queries functionality, a series works by Kaplan al. (Crypto 2016), Bhaumik (Asiacrypt 2021) Bonnetain have how break unforgeability modes. However, these did not consider confidentiality queries.We fill this gap presenting first formal...
Both algorithms are adaptive and require no extra communication from the encoder to decoder. The authors present a scheme cascade these into an algorithm which achieves higher compression ratio is appropriate for communication. Different refinements of cascading tested optimize secondary compression.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
Augmented Reality (AR) based applications have existed for some time; however, their true potential in digital marketing remains unexploited. To bridge this gap we create a novel consumer targeting system. First, analyze interactions on AR-based retail apps to identify her preferred purchase viewpoint during the session. We then target through personalized catalog, created by embedding recommended products visual. The color and style of embedded product are matched with recommendations, text...
Broadcast is a primitive which allows specific party to distribute message consistently among n parties, even if up t parties exhibit malicious behaviour. In the classical model with complete network of bilateral authenticated channels, seminal result Pease et al. [Pease al., 1980] shows that broadcast achievable and only < n/3. There are two generalizations suggested for problem - respect adversarial communication model. Fitzi Maurer [Fitzi Maurer, 1998] consider (non-threshold) general...