Saha, Abishanka(Indian Statistical Institute, Kolkata, 2024-07)
The indistinguishability security of a cryptographic construction refers to the maximum advantage of an interactive adversary to distinguish between the real and ideal world, where in the real world it interacts with the ...
Nag, Chandradipa(Indian Statistical Institute, Kolkata, 2024-06)
Liver tumor segmentation from CT images is of paramount importance in medical image analysis.
Accurate segmentation of liver tumor is crucial for effective diagnosis and treatment planning in
hepatocellular carcinoma and ...
Mondal, Avir(Indian Statistical Institute, Kolkata, 2024-06)
Many countries around the world depends on agriculture, as it helps reduce poverty,
increase national income, and improve food security. However, plant diseases often
impact food crops, leading to significant annual ...
Ray, Parthasarathi(Indian Statistical Institute, Kolkata, 2024)
In this thesis, we leverage the learning from Essence, a “language and kernel“ of
Software Engineering, which has resulted from the efforts of the SEMAT initiative
founded to bring together industry, research and education ...
Roy, Animesh(Indian Statistical Institute, Kolkata, 2024)
In this thesis, we use the techniques of Boolean functions in di erent applications.
More speci cally, our focus is on the properties of Boolean functions that hold cryptographic
signi cance. The employed techniques ...
Raychaudhuri, Anik(Indian Statistical Institute, Kolkata, 2023-07)
Random oracles are cryptographers’ conceptions of what an ’ideal’ hash function should be.Put succinctly, a random oracle is a perfectly random function that you can evaluate quickly. Random functions are beautiful not ...
Mondal, Anupam(Indian Statistical Institute, Kolkata, 2024-06)
In recent decades, global temperature rises have significantly influenced glacier dynamics
[1][2], underscoring the vital need for accurately delineating glacier boundaries
to comprehend these shifts and document regional ...
Mandal, Anup(Indian Statistical Institute, Kolkata, 2024-06)
DeepSmote uses the SMOTE technique in the latent space of an Autoencoder-
Decoder model to produce high fidelity images for imbalanced data. But it is be
limited by 2 essential artillery: over-fitting the data and a lack ...
Ghosh, Aloke Kr(Indian Statistical Institute, Kolkata, 2024-10)
This thesis analyzes the construction of the sphere fibrations over (n − 1)-connected 2n-manifolds for an even integer n such that the total space is a connected sum of sphere products, in a localized category of spaces. ...
Kayal, Chandrima(Indian Statistical Institute, Kolkata, 2024-05)
Boolean functions are one of the central objects in the study of
Computer Science. Any decision problem can be expressed as a Boolean
function that takes an $n$-bit string as input and gives a single-bit
output. Its ...
Jana, Amit(Indian Statistical Institute, Kolkata, 2023-06)
The thesis focuses on the cryptanalysis of private-key ciphers, which are widely used
encryption methods due to their fast encryption/decryption computing ability and low memory
requirements. The thesis covers two different ...
Mandal, Ankita(Indian Statistical Institute, Kolkata, 2022-12)
Multi-view learning is an emerging machine learning paradigm that focuses on discovering
patterns in data represented by multiple distinct views. One of the important
issues associated with real-life high-dimensional ...
Char, Arnab(Indian Statistical Institute, Chennai, 2024-04)
Graph coloring is one among the oldest and broadly studied topics in graph theory. A coloring of a
graph G is an assignment of colors to the vertices of G such that no two adjacent vertices receive the
same color, and ...
Bhattacharjee, Arghya(Indian Statistical Institute, Kolkata, 2024-09)
This thesis proposes and analyses the security of a few symmetric key modes. The first three of them are NAEAD modes, named Oribatida, ISAP+ and OCB+. Oribatida is lightweight, sponge-based, INT-RUP secure and achieves ...
Barman, Geetika(Indian Statistical Institute, Bangalore, 2023-07)
The application of Mathematical Morphology (MM) techniques
has proven to be beneficial in the extraction of shapebased
and texture-based features during remote sensing image
analysis. The characteristics of these ...
Pattanayak, Drimit(Indian Statistical Institute, Kolkata, 2024-07)
A k-linear coloring of a graph G is an edge coloring of G with k colors so that each
color class forms a linear forest—a forest whose each connected component is a path.
The linear arboricity χ′
l(G) of G is the minimum ...
Mandal, Poulami(Indian Statistical Institute, Bangalore, 2024-08)
Let X be a smooth projective curve over an algebraically closed field k of char-
acteristic p > 0, S be a finite subset of closed points in X. Given an embedding
problem (β : Γ ↠ G, α : π´et
1 (X \S) ↠ G) for the ´etale ...
Saha, Abishanka(Indian Statistical Institute, Kolkata, 2024-07)
The indistinguishability security of a cryptographic construction refers to the maximum advantage of an interactive adversary to distinguish between the real and ideal world, where in the real world it interacts with the ...
Nag, Chandradipa(Indian Statistical Institute, Kolkata, 2024-06)
Liver tumor segmentation from CT images is of paramount importance in medical image analysis.
Accurate segmentation of liver tumor is crucial for effective diagnosis and treatment planning in
hepatocellular carcinoma and ...
Mondal, Avir(Indian Statistical Institute, Kolkata, 2024-06)
Many countries around the world depends on agriculture, as it helps reduce poverty,
increase national income, and improve food security. However, plant diseases often
impact food crops, leading to significant annual ...
Ray, Parthasarathi(Indian Statistical Institute, Kolkata, 2024)
In this thesis, we leverage the learning from Essence, a “language and kernel“ of
Software Engineering, which has resulted from the efforts of the SEMAT initiative
founded to bring together industry, research and education ...
Roy, Animesh(Indian Statistical Institute, Kolkata, 2024)
In this thesis, we use the techniques of Boolean functions in di erent applications.
More speci cally, our focus is on the properties of Boolean functions that hold cryptographic
signi cance. The employed techniques ...
Raychaudhuri, Anik(Indian Statistical Institute, Kolkata, 2023-07)
Random oracles are cryptographers’ conceptions of what an ’ideal’ hash function should be.Put succinctly, a random oracle is a perfectly random function that you can evaluate quickly. Random functions are beautiful not ...
Mondal, Anupam(Indian Statistical Institute, Kolkata, 2024-06)
In recent decades, global temperature rises have significantly influenced glacier dynamics
[1][2], underscoring the vital need for accurately delineating glacier boundaries
to comprehend these shifts and document regional ...
Mandal, Anup(Indian Statistical Institute, Kolkata, 2024-06)
DeepSmote uses the SMOTE technique in the latent space of an Autoencoder-
Decoder model to produce high fidelity images for imbalanced data. But it is be
limited by 2 essential artillery: over-fitting the data and a lack ...
Ghosh, Aloke Kr(Indian Statistical Institute, Kolkata, 2024-10)
This thesis analyzes the construction of the sphere fibrations over (n − 1)-connected 2n-manifolds for an even integer n such that the total space is a connected sum of sphere products, in a localized category of spaces. ...
Kayal, Chandrima(Indian Statistical Institute, Kolkata, 2024-05)
Boolean functions are one of the central objects in the study of
Computer Science. Any decision problem can be expressed as a Boolean
function that takes an $n$-bit string as input and gives a single-bit
output. Its ...
Jana, Amit(Indian Statistical Institute, Kolkata, 2023-06)
The thesis focuses on the cryptanalysis of private-key ciphers, which are widely used
encryption methods due to their fast encryption/decryption computing ability and low memory
requirements. The thesis covers two different ...
Mandal, Ankita(Indian Statistical Institute, Kolkata, 2022-12)
Multi-view learning is an emerging machine learning paradigm that focuses on discovering
patterns in data represented by multiple distinct views. One of the important
issues associated with real-life high-dimensional ...
Char, Arnab(Indian Statistical Institute, Chennai, 2024-04)
Graph coloring is one among the oldest and broadly studied topics in graph theory. A coloring of a
graph G is an assignment of colors to the vertices of G such that no two adjacent vertices receive the
same color, and ...
Bhattacharjee, Arghya(Indian Statistical Institute, Kolkata, 2024-09)
This thesis proposes and analyses the security of a few symmetric key modes. The first three of them are NAEAD modes, named Oribatida, ISAP+ and OCB+. Oribatida is lightweight, sponge-based, INT-RUP secure and achieves ...
Barman, Geetika(Indian Statistical Institute, Bangalore, 2023-07)
The application of Mathematical Morphology (MM) techniques
has proven to be beneficial in the extraction of shapebased
and texture-based features during remote sensing image
analysis. The characteristics of these ...
Pattanayak, Drimit(Indian Statistical Institute, Kolkata, 2024-07)
A k-linear coloring of a graph G is an edge coloring of G with k colors so that each
color class forms a linear forest—a forest whose each connected component is a path.
The linear arboricity χ′
l(G) of G is the minimum ...
Mandal, Poulami(Indian Statistical Institute, Bangalore, 2024-08)
Let X be a smooth projective curve over an algebraically closed field k of char-
acteristic p > 0, S be a finite subset of closed points in X. Given an embedding
problem (β : Γ ↠ G, α : π´et
1 (X \S) ↠ G) for the ´etale ...