Below are links to files
corresponding to some talks that I have given in the past and to
some notes. These have not been carefully proof-checked and may
have typographical errors and (hopefully minor) inaccuracies.
Neither are these in their final forms and the files may be
updated from time to time.
Notes Notes on Conditional Expectation and
Introductory and Expository A Few Notions in Cryptography
National Institute of Technology, Durgapur, 11th April, 2014.
Cryptography: What Should Be
International Conference on Security Aspects in
Information Technology, High-Performance Computing and
Networking, Haldia, West Bengal, 22nd October 2011.
On Using Mathematics to Attain
Indian Statistical Institute, Bengaluru, 24th
What Can Be Proved About Security?
Centre for Artificial Intelligence and Robotics, Bengaluru, 23rd
Public-Key and Identity-Based
Encryption Identity Based Encryption: An
Probabilistic Security Games
Seminar in honour of Professor Bhamidi V. Rao, Indian
Statistical Institute, January 15, 2008.
Cyclic Groups in Cryptography
Public Key Encryption Based on
The Electronic World, Information
Technology Act and Public Key Infrastructure in India
QUT, Brisbane, 2009.
Identity-Based Encryption: A
, Indian Statistical Institute, Kolkata,
Public-Key Infrastructure in
India: Status and Issues
On the Balasubramanian-Koblitz
, Institute of Mathematical Sciences, 22nd February
Digital Signatures: A
, International Conference on Electrical
Engineering, Computing Science and Automatic Control, 2015,
October 28, Mexico City, 2015.
A General Polynomial Selection
Method and New Asymptotic Complexities for the Tower Number
Field Sieve Algorithm
, Asiacrypt 2016, Hanoi.
Challenges with Assessing
the Impact of NFS Advances on the Security of Pairing-Based
, Mycrypt 2016, Kuala Lumpur.
Operations Disk Encryption
Modes of Operations for
How to Use Your Block Cipher?
Another Look at XCB
An Introduction to
Block Ciphers and Hash Functions Generic Attacks on Symmetric Ciphers
Stream Ciphers – An Overview
Some Aspects of Block Ciphers
CU-ISI Tutorial Workshop on Cryptology, 17th July 2011
Attacks on Stream Ciphers: A
Hash Functions: A Gentle
On Symmetric Key Broadcast
, Elliptic Curve Cryptography, 10th October,
Symmetric Key Broadcast
, IRN Meeting on Mobile
Security, Samsung R&D Institute India, 4th December, 2015
Another Look at Normal Approximations
, Indocrypt, 8th December 2015, Bengaluru.
A New Test Statistic for Key
Recovery Attacks Using Multiple Linear Approximations
Mycrypt 2016, Kuala Lumpur.
Other Talks Tackling Malicious Behaviour in
Randomised Response Techniques
A Few Interesting Connections
Between Statistics and Computer Science
What is Meant by the Privacy of a
Some Aspects of Barua’s Work on
Axiomatic Geometry: Euclid and
To Compute or Not to Compute?
Symmetric Balanced Squares
On Statistics and Induction