Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Provable Security Of Symmetric-Key Cryptographic Schemes., Ashwin Jha Dr.
Provable Security Of Symmetric-Key Cryptographic Schemes., Ashwin Jha Dr.
Doctoral Theses
In this thesis, we provide quantitative and/or qualitative improvements in the provable security of several symmetric-key schemes, encompassing major information security goals, viz. data authentication, encryption, and authenticated encryption.AUTHENTICATION AND INTEGRITY: Among authentication schemes, we analyze the CBC-MAC family and counter-based MACs (XMACC, XMACR, PCS, LightMAC etc.), referred as the XMAC family. First, we revisit the security proofs for CBC-MAC and EMAC, and identify a critical flaw in the state-of-the-art results. We revise the security proofs and obtain significantly better bounds in case of EMAC, ECBC and FCBC. Second, we study the security of CBC-MAC family, when the underlying primitive …
Image Dehazing From The Perspective Of Environmental Illumination., Sanchayan Santra Dr.
Image Dehazing From The Perspective Of Environmental Illumination., Sanchayan Santra Dr.
Doctoral Theses
Haze and fog are atmospheric phenomena where the particles suspended in the air obscure visibility by scattering the light propagating through the atmosphere. As a result only a part of the reflected light reaches the observer. So, the apparent intensity of the objects get reduced. Apart from that, the in-scatter of the atmospheric light creates a translucent veil, which is a common sight during haze. Image dehazing methods try to recover a haze-free version of a given image by removing the effects of haze.Although attempts have been made to accurately estimate the scene transmittance, the estimation of environmental illumination has …