DSpace Repository

Dissertations - M Tech (CRS)

Dissertations - M Tech (CRS)

 

Dissertation submitted in partial fulfilment of the requirements for the degree of Master of Technology in Cryptology and Security

Recent Submissions

  • Mondal, Puja (Indian Statistical Institute, Kolkata, 2021-07)
    Nowadays the security of most used public-key algorithms are based on the hardness of one of the following problems : 1. The integer factorization, 2. The elliptic-curve discrete logarithm problem. But these problems ...
  • Dhar, Arunava (Indian Statistical Institute, Kolkata, 2021-07)
  • Banerjee, Niladri (Indian Statistical Institute, Kolkata, 2021-07)
    This work’s aim is to find an efficient method to measure the Optical Character Recognition (OCR) accuracy in the absence of the ground truth text. To successfully obtain the desired result, initially we have tried some ...
  • Manna, Asim (Indian Statistical Institute, Kolkata, 2021-07)
  • Ramani, Chandan (Indian Statistical Institute, Kolkata, 2021-07)
    In this project my aim was to research about how to secure personal health information associated with HIPAA compliance. Firstly, we tried to understand what is HIPAA and how it is connected to health information. Then ...
  • Samanta, Asmita (Indian Statistical Institute, Kolkata, 2021-07)
    Healthcare services produce and use a great deal of sensitive personal data. But the fact is that this healthcare data has very high black market value. Now to easily access the healthcare data we can think about an ...
  • Ghosh, Sarbajit (Indian Statistical Institute, Kolkata., 2021-07)
    Voting is the most fundamental cornerstone in the context of representative democracy. With the advent of the internet technologies, various types of e-voting mechanisms have emerged. Building an e-voting system capable ...
  • Chakraborty, Sayantan (Indian Statistical Institute, Kolkata., 2021-07)
    Auction has been an integral part of trading throughout ages. Sealed-bid e-auction (both first-price and second-price) is considered to be a classic example of Secure Multi-Party Computation problem. In this project, ...
  • Kundu, Anup Kumar (Indian Statistical Institute, Kolkata, 2021-07)
    Privacy is one of the most fundamental aspects of the digital age that we live in. With the advent of the Internet and the advances in both nanoscale electronics and communication technologies, data has become the new oil. ...
  • Ravish, Ankit (Indian Statistical Institute, Kolkata, 2021-07)
    Generating random numbers is an important task in cryptography as well as computer science. Pseudo-randomness is fundamental to cryptography and it is required for achieving any cryptographic function like encryption, ...
  • Dutta, Anisha (Indian Statistical Institute, Kolkata, 2021-07)
    Modern-day Symmetric-key Cryptology is enriched with numerous contributions including symmetric-key primitives to modes of operation. The approach to design and develop provably secure designs have accelerated the growth ...
  • Roy, Abir Lal (Indian Statistical Institute, Kolkata, 2021-07)
    Drilling has become an expensive and necessary operation to explore petroleum and natural gases.The goal is to increase drilling speed with minimum cost and at the same time maintaining safety.Predicting rate of penetration ...
  • Adhikary, Supriya (Indian Statistical Institute,Kolkata, 2021-07)
    Encryption is a method with which one can securely share data over an insecure channel. The traditional public-key encryption follows an all-or-nothing approach where the receiver is either able to get the whole message ...
  • Mondal, Puja (Indian Statistical Institute, Kolkata, 2021-07)
    Nowadays the security of most used public-key algorithms are based on the hardness of one of the following problems : 1. The integer factorization, 2. The elliptic-curve discrete logarithm problem. But these problems ...
  • Dhar, Arunava (Indian Statistical Institute, Kolkata, 2021-07)
  • Banerjee, Niladri (Indian Statistical Institute, Kolkata, 2021-07)
    This work’s aim is to find an efficient method to measure the Optical Character Recognition (OCR) accuracy in the absence of the ground truth text. To successfully obtain the desired result, initially we have tried some ...
  • Manna, Asim (Indian Statistical Institute, Kolkata, 2021-07)
  • Ramani, Chandan (Indian Statistical Institute, Kolkata, 2021-07)
    In this project my aim was to research about how to secure personal health information associated with HIPAA compliance. Firstly, we tried to understand what is HIPAA and how it is connected to health information. Then ...
  • Samanta, Asmita (Indian Statistical Institute, Kolkata, 2021-07)
    Healthcare services produce and use a great deal of sensitive personal data. But the fact is that this healthcare data has very high black market value. Now to easily access the healthcare data we can think about an ...
  • Ghosh, Sarbajit (Indian Statistical Institute, Kolkata., 2021-07)
    Voting is the most fundamental cornerstone in the context of representative democracy. With the advent of the internet technologies, various types of e-voting mechanisms have emerged. Building an e-voting system capable ...
  • Chakraborty, Sayantan (Indian Statistical Institute, Kolkata., 2021-07)
    Auction has been an integral part of trading throughout ages. Sealed-bid e-auction (both first-price and second-price) is considered to be a classic example of Secure Multi-Party Computation problem. In this project, ...
  • Kundu, Anup Kumar (Indian Statistical Institute, Kolkata, 2021-07)
    Privacy is one of the most fundamental aspects of the digital age that we live in. With the advent of the Internet and the advances in both nanoscale electronics and communication technologies, data has become the new oil. ...
  • Ravish, Ankit (Indian Statistical Institute, Kolkata, 2021-07)
    Generating random numbers is an important task in cryptography as well as computer science. Pseudo-randomness is fundamental to cryptography and it is required for achieving any cryptographic function like encryption, ...
  • Dutta, Anisha (Indian Statistical Institute, Kolkata, 2021-07)
    Modern-day Symmetric-key Cryptology is enriched with numerous contributions including symmetric-key primitives to modes of operation. The approach to design and develop provably secure designs have accelerated the growth ...
  • Roy, Abir Lal (Indian Statistical Institute, Kolkata, 2021-07)
    Drilling has become an expensive and necessary operation to explore petroleum and natural gases.The goal is to increase drilling speed with minimum cost and at the same time maintaining safety.Predicting rate of penetration ...
  • Adhikary, Supriya (Indian Statistical Institute,Kolkata, 2021-07)
    Encryption is a method with which one can securely share data over an insecure channel. The traditional public-key encryption follows an all-or-nothing approach where the receiver is either able to get the whole message ...