This thesis attempts to develop a formal literature of the political econ-
omy of Less Developed Countries (L.D.C.s) with three different questions-
protest, violence and investments with the interlinking theme of coordina-
tion failures in collective action and its effects on...
The first chapter investigates the stability of internet platform trading mechanisms using the notion of ex-ante stability. Standard double auction mechanisms in the literature as well as the revenue-maximizing mechanism of the platform may not be single-buyer-single-seller (SBSS) ex-ante stable. ...
This thesis consists of three empirical essays that explore distinct themes in the realm of
political economy and economics of institutions. All, in essence, are investigations into the
role of distinct attributes of political institutions and political actors induced by these
...
Multidimensional Scaling Using Artificial Neural Networks
See
Manifold Learning has been widely exploited in the arena of data analysis, machine
learning and pattern recognition. The main assumption behind manifold learning is that
the input high-dimensional data lies intrinsically on a low-dimensional manifold. This technique is to be used ...
Modern developments in Deep Learning and Machine Learning have shown great capacity to learn from labelled training assumption that training data and the data which the learning algorithm might see during testing or deployment have the same distribution. However this might not be t...
Physical attacks on CCA-Secure Lattice-based KEM SABER
See
Nowadays the security of most used public-key algorithms are based on the hardness of one
of the following problems :
1. The integer factorization,
2. The elliptic-curve discrete logarithm problem.
But these problems can be solved by Shor's algorithm [38] and Proo...
Evaluation of Optical Character Recognition (OCR) accuracy: Supervised and Unsupervised techniques
See
This work’s aim is to find an efficient method to measure the Optical Character
Recognition (OCR) accuracy in the absence of the ground truth text. To successfully
obtain the desired result, initially we have tried some efficient supervised (in the
presence of the ...
Investigating Applications of The Target Di erence Algorithm in Keccak & Ascon
See
Project on securing personal health information associated with HIPAA compliance
See
In this project my aim was to research about how to secure personal health
information associated with HIPAA compliance. Firstly, we tried to understand what
is HIPAA and how it is connected to health information. Then we tried to find related
encryption schemes f...
Efficient and Secure Access Control for Sensitive Healthcare Data
See
Healthcare services produce and use a great deal of sensitive personal data. But the fact is that
this healthcare data has very high black market value. Now to easily access the healthcare data
we can think about an access control server. So if we want to ...
Design and Analysis of Blockchain-based E-voting Protocols
See
Voting is the most fundamental cornerstone in the context of representative democracy. With
the advent of the internet technologies, various types of e-voting mechanisms have emerged.
Building an e-voting system capable of performing as good as a traditional voting system is a...
Auction has been an integral part of trading throughout ages. Sealed-bid e-auction (both
first-price and second-price) is considered to be a classic example of Secure Multi-Party
Computation problem. In this project, without assuming any role of auctioneer, we try to
formulate...
Fault Analysis of the Prince Family of Lightweight Ciphers
See
Privacy is one of the most fundamental aspects of the digital age that
we live in. With the advent of the Internet and the advances in both nanoscale
electronics and communication technologies, data has become the new
oil. And wherever there is data there is&...
Study on the Generation of Pseudo-Random Numbers using Recurrent Neural Network
See
Generating random numbers is an important task in cryptography as well as computer science.
Pseudo-randomness is fundamental to cryptography and it is required for achieving any
cryptographic function like encryption, authentication and identification. The quality of a pseudorandom
number...
A Catalogue for Provably Secure Symmetric Modes and Primitives
See
Modern-day Symmetric-key Cryptology is enriched with numerous contributions including
symmetric-key primitives to modes of operation. The approach to design and develop provably
secure designs have accelerated the growth of this subject. A lot of encryption, authentication
and authenticated...
Drilling has become an expensive and necessary operation to explore petroleum and natural
gases.The goal is to increase drilling speed with minimum cost and at the same time maintaining
safety.Predicting rate of penetration (ROP) in real time is very important to optimise dr...
Graph coloring is a well known problem with wide-ranging applications. The vertex and
edge coloring problems have been studied in various models of computation. Rainbow
coloring is a type of edge coloring that also acts as a connectivity measure for graphs. It
was ...