IIT Madras

Displaying 1-4 of 4 results

  • White Papers // Oct 2012

    Lattice Forward-Secure Identity Based Encryption Scheme

    Protecting secret keys is crucial for cryptography. There are some relatively insecure devices (smart cards, mobile phones etc.) which have threat of key exposure. The goal of the forward security is to protect security of past uses of key even if the current secret key is exposed. In this paper,...

    Provided By IIT Madras

  • White Papers // Oct 2012

    A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network

    In this paper, the authors have studied the problem of traffic aggregation in a network. They have formalized this problem and suggested a solution using a variant of aggregate signature scheme. They have proved the security of the scheme using standard hardness assumptions in the random oracle model. In the...

    Provided By IIT Madras

  • White Papers // Sep 2012

    The Implications of Shared Data Synchronization Techniques on Multi-Core Energy Efficiency

    Shared data synchronization is at the heart of the multi-core revolution since it is essential for writing concurrent programs. Ideally, a synchronization technique should be able to fully exploit the available cores, leading to improved performance. However, with the growing demand for energy-efficient systems, it also needs to work within...

    Provided By IIT Madras

  • White Papers // Jan 2010

    MayaVi: A Free Tool for CFD Data Visualization

    Visualizing CFD data is extremely important. There are very few freely available tools that allow one to visualize scalar and vector data on rectilinear, structured and unstructured grids. MayaVi is a free tool developed by the author that helps visualize such CFD data. It uses the Visualization Toolkit (VTK) for...

    Provided By IIT Madras

  • White Papers // Sep 2012

    The Implications of Shared Data Synchronization Techniques on Multi-Core Energy Efficiency

    Shared data synchronization is at the heart of the multi-core revolution since it is essential for writing concurrent programs. Ideally, a synchronization technique should be able to fully exploit the available cores, leading to improved performance. However, with the growing demand for energy-efficient systems, it also needs to work within...

    Provided By IIT Madras

  • White Papers // Oct 2012

    A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network

    In this paper, the authors have studied the problem of traffic aggregation in a network. They have formalized this problem and suggested a solution using a variant of aggregate signature scheme. They have proved the security of the scheme using standard hardness assumptions in the random oracle model. In the...

    Provided By IIT Madras

  • White Papers // Oct 2012

    Lattice Forward-Secure Identity Based Encryption Scheme

    Protecting secret keys is crucial for cryptography. There are some relatively insecure devices (smart cards, mobile phones etc.) which have threat of key exposure. The goal of the forward security is to protect security of past uses of key even if the current secret key is exposed. In this paper,...

    Provided By IIT Madras

  • White Papers // Jan 2010

    MayaVi: A Free Tool for CFD Data Visualization

    Visualizing CFD data is extremely important. There are very few freely available tools that allow one to visualize scalar and vector data on rectilinear, structured and unstructured grids. MayaVi is a free tool developed by the author that helps visualize such CFD data. It uses the Visualization Toolkit (VTK) for...

    Provided By IIT Madras