Design and Analysis of Some Symmetric Key Schemes for Encryption and Authentication
See
This thesis mainly focuses on the design and analysis of tweakable enciphering schemes
(TESs) and message authentication codes (MACs).
Tweakable enciphering schemes are length preserving encryption schemes that
provide security of a strong tweakable pseudorandom permutation. There are sev...
In the classification programme of subfactors, the standard invariant plays a quintessential role. In this thesis, we furnish a 2-categorical perspective of the standard invariant of finite-index subfactors and further study algebraic structures (Q-systems) associated with them
At the request of Coal India Limited (CIL) the “Price Escalation Verification
Project” has been undertaken by a team of the Economic Research Unit, Indian
Statistical Institute. The project examines the escalation clause associated with the
price index formula to be used...
Equivariant Homology Decompositions for Projective Spaces and Associated Results
See
Abstracts
TFNet: Time and Frequency Modeling for Irregular Multivariate Medical Time Series
See
Time Series Classification (TSC) involves assigning a target label based on features
involving time series data. TSC arises in a variety of domains, like healthcare, finance, process control, weather pattern prediction, etc. This work is focused on
exploiting both frequency and t...
Homotopical computations for projective Stiefel manifolds and related quotients
See
My thesis deals with various homogeneous spaces associated with the real and complex Stiefel manifolds and their homotopical computations. Primarily we work with the complex projective Stiefel manifolds. We compute their Brown-Peterson cohomology using homotopy fixed point spectral sequence and t...
On Errors of Observation and Upper Air Relationships
See
Efficient Reduction of Resources and Noise in Discrete Quantum Computing Circuits
See
Quantum computers have shifted from a subject of theoretical interest to reality in recent years with multiple devices now available at research industry labs such as IBM, Google, and IonQ. However, quantum systems are highly susceptible to noise. Interaction with the environment corrup...
This thesis consists of three independent essays. The first chapter introduces a model of
decision-making that is based on the procedure of rejection. Departing from the standard
model of choice via preference maximization, the decision maker (DM) rejects minimal
alternatives fr...
Dimensionality Reduction for Data Visualization and Classification
See
In this thesis, we identify a few gaps in the existing methods of dimensionality reduction
for data visualization and classification and propose some solutions to those as
summarized below.
Most of the data visualization methods do not learn any explicit function to pr...
Memristive Crossbars: ALU Design, Testing, and Fault Analysis for Neuromorphic Applications
See
In 1971, Professor Leon Chua introduced the notion of a memristor, the fourth fundamental passive
circuit component alongside resistor, capacitor, and inductor. The resistance of this two-terminal
device depends on the current through it; thereby a memristor is similar to a resis...
Commutant Lifting, Interpolation and Toeplitz Operators In Several Variables
See
Discriminative Deep Joint Subspace Analysis for Multi-View Data:
See
Over the past few years, multi-view data analysis has emerged as an inevitable method for
identifying sample categories. In multi-view data classification problem, it is expected that the joint
subspace is learned from the given input views in such a way that the simila...
Quantum symmetry in multigraphs and its applications in physical models
See
We introduce various notions of quantum symmetry in a directed or undi-
rected multigraph with no isolated vertex and explore relations among them. If the
multigraph is simple (with or without loops), all our notions of quantum symmetry
reduce to the already existing...
Design and analysis of MDS and Near-MDS Matrices and their application to lightweight cryptography
See
In this thesis, we focus on studying MDS and Near-MDS (NMDS) matrices and explore their construction in both recursive and nonrecursive settings. We present several theoretical results and analyze the hardware efficiency of MDS and NMDS matrix constructions. We begin by providing a ...
Studies on the Quantum Private Query Primitive in the Device-Independent Paradigm
See
In this thesis, we focus on the Quantum Private Query (QPQ) primitive in the
device-independent (DI) paradigm, addressing the challenges of preserving user and database privacy without trusting the devices. Existing cryptographic primitives, such as Symmetric Private Information Retrieval (SPIR)...
Message Efficient Fault-Tolerant Distributed Computations
See
The thesis focuses on exploring the message complexity of some fundamental problems – leader
election, agreement, and graph realization. Leader Election and Agreement problems are widely
applicable in various domains such as sensor networks, IoT networks, grid computing, peer-to-peer
...