An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2012

AUTHORS

K. Preetha Mathew , Sachin Vasant , Sridhar Venkatesan , C. Pandu Rangan

ABSTRACT

In this paper, we propose an IND-CCA2 secure code based encryption scheme in the standard model, built on the Niederreiter encryption scheme. The security of the scheme is based on the hardness of the Syndrome Decoding problem and the Goppa Code Distinguishability problem. The system is developed according to the construction similar to IND-CCA2 secure encryption scheme by Peikert and Waters using the lossy trapdoor functions. Compared to the existing IND-CCA2 secure variants due to Dowsley et.al. and Freeman et. al. (using the κ repetition paradigm initiated by Rosen and Segev), our scheme is more efficient as it avoids κ repetitions. This can be considered as the first practical code-based encryption scheme that is IND-CCA2 secure in the standard model. More... »

PAGES

166-179

References to SciGraph publications

  • 2010. More Constructions of Lossy and Correlation-Secure Trapdoor Functions in PUBLIC KEY CRYPTOGRAPHY – PKC 2010
  • 2004. Chosen-Ciphertext Security from Identity-Based Encryption in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004
  • 2009. A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model in TOPICS IN CRYPTOLOGY – CT-RSA 2009
  • 2001-06-05. Semantically Secure McEliece Public-Key Cryptosystems -Conversions for McEliece PKC - in PUBLIC KEY CRYPTOGRAPHY
  • 2009. Chosen-Ciphertext Security via Correlated Products in THEORY OF CRYPTOGRAPHY
  • 2009. Security Bounds for the Design of Code-Based Cryptosystems in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2009
  • 2001-05-18. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack in ADVANCES IN CRYPTOLOGY — CRYPTO ’91
  • 2008-12. Semantic security for the McEliece cryptosystem without random oracles in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2010. Efficient Lattice (H)IBE in the Standard Model in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2010
  • Book

    TITLE

    Information Security and Privacy

    ISBN

    978-3-642-31447-6
    978-3-642-31448-3

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-31448-3_13

    DOI

    http://dx.doi.org/10.1007/978-3-642-31448-3_13

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1029257694


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Indian Institute of Technology Madras", 
              "id": "https://www.grid.ac/institutes/grid.417969.4", 
              "name": [
                "Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Mathew", 
            "givenName": "K. Preetha", 
            "id": "sg:person.011477357601.15", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011477357601.15"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Anna University, Chennai", 
              "id": "https://www.grid.ac/institutes/grid.252262.3", 
              "name": [
                "Department of Mathematics and Computer Applications, PSG College of Technology, Coimbatore, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Vasant", 
            "givenName": "Sachin", 
            "id": "sg:person.013667701201.38", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013667701201.38"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Anna University, Chennai", 
              "id": "https://www.grid.ac/institutes/grid.252262.3", 
              "name": [
                "Department of Mathematics and Computer Applications, PSG College of Technology, Coimbatore, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Venkatesan", 
            "givenName": "Sridhar", 
            "id": "sg:person.014046167651.50", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014046167651.50"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Indian Institute of Technology Madras", 
              "id": "https://www.grid.ac/institutes/grid.417969.4", 
              "name": [
                "Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Rangan", 
            "givenName": "C. Pandu", 
            "id": "sg:person.016366027737.61", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006227741", 
              "https://doi.org/10.1007/978-3-642-13190-5_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006227741", 
              "https://doi.org/10.1007/978-3-642-13190-5_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1374376.1374406", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007533193"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-008-9175-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009203020", 
              "https://doi.org/10.1007/s10623-008-9175-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-008-9175-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009203020", 
              "https://doi.org/10.1007/s10623-008-9175-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-00862-7_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013524003", 
              "https://doi.org/10.1007/978-3-642-00862-7_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-00457-5_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014994053", 
              "https://doi.org/10.1007/978-3-642-00457-5_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-00457-5_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014994053", 
              "https://doi.org/10.1007/978-3-642-00457-5_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13013-7_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027369668", 
              "https://doi.org/10.1007/978-3-642-13013-7_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13013-7_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027369668", 
              "https://doi.org/10.1007/978-3-642-13013-7_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-10366-7_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034581344", 
              "https://doi.org/10.1007/978-3-642-10366-7_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-10366-7_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034581344", 
              "https://doi.org/10.1007/978-3-642-10366-7_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1008731.1008734", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037229512"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.jss.2010.09.016", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037895565"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46766-1_35", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038119898", 
              "https://doi.org/10.1007/3-540-46766-1_35"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46766-1_35", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038119898", 
              "https://doi.org/10.1007/3-540-46766-1_35"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-24676-3_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038265457", 
              "https://doi.org/10.1007/978-3-540-24676-3_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44586-2_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045151941", 
              "https://doi.org/10.1007/3-540-44586-2_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44586-2_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045151941", 
              "https://doi.org/10.1007/3-540-44586-2_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/100216.100273", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045710242"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/357980.358017", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052717574"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/18.272496", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061099176"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tit.1976.1055638", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061647862"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/0217019", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062842038"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/s0097539795291562", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062880061"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/s0097539795293172", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062880065"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2012", 
        "datePublishedReg": "2012-01-01", 
        "description": "In this paper, we propose an IND-CCA2 secure code based encryption scheme in the standard model, built on the Niederreiter encryption scheme. The security of the scheme is based on the hardness of the Syndrome Decoding problem and the Goppa Code Distinguishability problem. The system is developed according to the construction similar to IND-CCA2 secure encryption scheme by Peikert and Waters using the lossy trapdoor functions. Compared to the existing IND-CCA2 secure variants due to Dowsley et.al. and Freeman et. al. (using the \u03ba repetition paradigm initiated by Rosen and Segev), our scheme is more efficient as it avoids \u03ba repetitions. This can be considered as the first practical code-based encryption scheme that is IND-CCA2 secure in the standard model.", 
        "editor": [
          {
            "familyName": "Susilo", 
            "givenName": "Willy", 
            "type": "Person"
          }, 
          {
            "familyName": "Mu", 
            "givenName": "Yi", 
            "type": "Person"
          }, 
          {
            "familyName": "Seberry", 
            "givenName": "Jennifer", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-31448-3_13", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-642-31447-6", 
            "978-3-642-31448-3"
          ], 
          "name": "Information Security and Privacy", 
          "type": "Book"
        }, 
        "name": "An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model", 
        "pagination": "166-179", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-31448-3_13"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "8b6138fa362ffbe6c1ce82c2fce0d6deebd25e39ae61bd16f44c84dc7b65613e"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1029257694"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-31448-3_13", 
          "https://app.dimensions.ai/details/publication/pub.1029257694"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T14:25", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8669_00000261.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-642-31448-3_13"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-31448-3_13'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-31448-3_13'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-31448-3_13'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-31448-3_13'


     

    This table displays all metadata directly associated to this object as RDF triples.

    165 TRIPLES      23 PREDICATES      46 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-31448-3_13 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N2a24c60cdd5c4a57bff68e2ec3caa4a0
    4 schema:citation sg:pub.10.1007/3-540-44586-2_2
    5 sg:pub.10.1007/3-540-46766-1_35
    6 sg:pub.10.1007/978-3-540-24676-3_13
    7 sg:pub.10.1007/978-3-642-00457-5_25
    8 sg:pub.10.1007/978-3-642-00862-7_16
    9 sg:pub.10.1007/978-3-642-10366-7_6
    10 sg:pub.10.1007/978-3-642-13013-7_17
    11 sg:pub.10.1007/978-3-642-13190-5_28
    12 sg:pub.10.1007/s10623-008-9175-9
    13 https://doi.org/10.1016/j.jss.2010.09.016
    14 https://doi.org/10.1109/18.272496
    15 https://doi.org/10.1109/tit.1976.1055638
    16 https://doi.org/10.1137/0217019
    17 https://doi.org/10.1137/s0097539795291562
    18 https://doi.org/10.1137/s0097539795293172
    19 https://doi.org/10.1145/100216.100273
    20 https://doi.org/10.1145/1008731.1008734
    21 https://doi.org/10.1145/1374376.1374406
    22 https://doi.org/10.1145/357980.358017
    23 schema:datePublished 2012
    24 schema:datePublishedReg 2012-01-01
    25 schema:description In this paper, we propose an IND-CCA2 secure code based encryption scheme in the standard model, built on the Niederreiter encryption scheme. The security of the scheme is based on the hardness of the Syndrome Decoding problem and the Goppa Code Distinguishability problem. The system is developed according to the construction similar to IND-CCA2 secure encryption scheme by Peikert and Waters using the lossy trapdoor functions. Compared to the existing IND-CCA2 secure variants due to Dowsley et.al. and Freeman et. al. (using the κ repetition paradigm initiated by Rosen and Segev), our scheme is more efficient as it avoids κ repetitions. This can be considered as the first practical code-based encryption scheme that is IND-CCA2 secure in the standard model.
    26 schema:editor N53102aa8c67845a59742ac7cd89c31b9
    27 schema:genre chapter
    28 schema:inLanguage en
    29 schema:isAccessibleForFree false
    30 schema:isPartOf Nb81d5619dd9f4002b910b03946048101
    31 schema:name An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
    32 schema:pagination 166-179
    33 schema:productId N1de5825ff3e14e8ba1e4fb21c0133cec
    34 N323c7704cfb14757b88b0e25d4c889aa
    35 N6458d315bd264afd8535245087a57b34
    36 schema:publisher N1457a2a67f694c428661245488f27bbc
    37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029257694
    38 https://doi.org/10.1007/978-3-642-31448-3_13
    39 schema:sdDatePublished 2019-04-15T14:25
    40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    41 schema:sdPublisher N07a2f645389e4608bfacedffcc864ddc
    42 schema:url http://link.springer.com/10.1007/978-3-642-31448-3_13
    43 sgo:license sg:explorer/license/
    44 sgo:sdDataset chapters
    45 rdf:type schema:Chapter
    46 N07a2f645389e4608bfacedffcc864ddc schema:name Springer Nature - SN SciGraph project
    47 rdf:type schema:Organization
    48 N1457a2a67f694c428661245488f27bbc schema:location Berlin, Heidelberg
    49 schema:name Springer Berlin Heidelberg
    50 rdf:type schema:Organisation
    51 N1de5825ff3e14e8ba1e4fb21c0133cec schema:name readcube_id
    52 schema:value 8b6138fa362ffbe6c1ce82c2fce0d6deebd25e39ae61bd16f44c84dc7b65613e
    53 rdf:type schema:PropertyValue
    54 N2a24c60cdd5c4a57bff68e2ec3caa4a0 rdf:first sg:person.011477357601.15
    55 rdf:rest Na7ef8ae3d66a48ab887b274a8cce4f49
    56 N323c7704cfb14757b88b0e25d4c889aa schema:name doi
    57 schema:value 10.1007/978-3-642-31448-3_13
    58 rdf:type schema:PropertyValue
    59 N3252cd33a1384778b2a03ca0440cfa91 schema:familyName Susilo
    60 schema:givenName Willy
    61 rdf:type schema:Person
    62 N3b7eccf7a7d44848bf51975520575744 schema:familyName Seberry
    63 schema:givenName Jennifer
    64 rdf:type schema:Person
    65 N53102aa8c67845a59742ac7cd89c31b9 rdf:first N3252cd33a1384778b2a03ca0440cfa91
    66 rdf:rest N909b299b404247ebbf1ba35a2192242b
    67 N6458d315bd264afd8535245087a57b34 schema:name dimensions_id
    68 schema:value pub.1029257694
    69 rdf:type schema:PropertyValue
    70 N6b4c9f4234034a51aaab53d779203036 rdf:first N3b7eccf7a7d44848bf51975520575744
    71 rdf:rest rdf:nil
    72 N7ad3a458eecd4172882fc288065e7edd rdf:first sg:person.016366027737.61
    73 rdf:rest rdf:nil
    74 N909b299b404247ebbf1ba35a2192242b rdf:first Nf0fd1f746fd349fbb0630702da098d7d
    75 rdf:rest N6b4c9f4234034a51aaab53d779203036
    76 Na7ef8ae3d66a48ab887b274a8cce4f49 rdf:first sg:person.013667701201.38
    77 rdf:rest Nfdf75e72b674445694be5d7701cc118f
    78 Nb81d5619dd9f4002b910b03946048101 schema:isbn 978-3-642-31447-6
    79 978-3-642-31448-3
    80 schema:name Information Security and Privacy
    81 rdf:type schema:Book
    82 Nf0fd1f746fd349fbb0630702da098d7d schema:familyName Mu
    83 schema:givenName Yi
    84 rdf:type schema:Person
    85 Nfdf75e72b674445694be5d7701cc118f rdf:first sg:person.014046167651.50
    86 rdf:rest N7ad3a458eecd4172882fc288065e7edd
    87 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    88 schema:name Information and Computing Sciences
    89 rdf:type schema:DefinedTerm
    90 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    91 schema:name Data Format
    92 rdf:type schema:DefinedTerm
    93 sg:person.011477357601.15 schema:affiliation https://www.grid.ac/institutes/grid.417969.4
    94 schema:familyName Mathew
    95 schema:givenName K. Preetha
    96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011477357601.15
    97 rdf:type schema:Person
    98 sg:person.013667701201.38 schema:affiliation https://www.grid.ac/institutes/grid.252262.3
    99 schema:familyName Vasant
    100 schema:givenName Sachin
    101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013667701201.38
    102 rdf:type schema:Person
    103 sg:person.014046167651.50 schema:affiliation https://www.grid.ac/institutes/grid.252262.3
    104 schema:familyName Venkatesan
    105 schema:givenName Sridhar
    106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014046167651.50
    107 rdf:type schema:Person
    108 sg:person.016366027737.61 schema:affiliation https://www.grid.ac/institutes/grid.417969.4
    109 schema:familyName Rangan
    110 schema:givenName C. Pandu
    111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61
    112 rdf:type schema:Person
    113 sg:pub.10.1007/3-540-44586-2_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045151941
    114 https://doi.org/10.1007/3-540-44586-2_2
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/3-540-46766-1_35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038119898
    117 https://doi.org/10.1007/3-540-46766-1_35
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/978-3-540-24676-3_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038265457
    120 https://doi.org/10.1007/978-3-540-24676-3_13
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/978-3-642-00457-5_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014994053
    123 https://doi.org/10.1007/978-3-642-00457-5_25
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/978-3-642-00862-7_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013524003
    126 https://doi.org/10.1007/978-3-642-00862-7_16
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/978-3-642-10366-7_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034581344
    129 https://doi.org/10.1007/978-3-642-10366-7_6
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/978-3-642-13013-7_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027369668
    132 https://doi.org/10.1007/978-3-642-13013-7_17
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/978-3-642-13190-5_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006227741
    135 https://doi.org/10.1007/978-3-642-13190-5_28
    136 rdf:type schema:CreativeWork
    137 sg:pub.10.1007/s10623-008-9175-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009203020
    138 https://doi.org/10.1007/s10623-008-9175-9
    139 rdf:type schema:CreativeWork
    140 https://doi.org/10.1016/j.jss.2010.09.016 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037895565
    141 rdf:type schema:CreativeWork
    142 https://doi.org/10.1109/18.272496 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061099176
    143 rdf:type schema:CreativeWork
    144 https://doi.org/10.1109/tit.1976.1055638 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061647862
    145 rdf:type schema:CreativeWork
    146 https://doi.org/10.1137/0217019 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062842038
    147 rdf:type schema:CreativeWork
    148 https://doi.org/10.1137/s0097539795291562 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062880061
    149 rdf:type schema:CreativeWork
    150 https://doi.org/10.1137/s0097539795293172 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062880065
    151 rdf:type schema:CreativeWork
    152 https://doi.org/10.1145/100216.100273 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045710242
    153 rdf:type schema:CreativeWork
    154 https://doi.org/10.1145/1008731.1008734 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037229512
    155 rdf:type schema:CreativeWork
    156 https://doi.org/10.1145/1374376.1374406 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007533193
    157 rdf:type schema:CreativeWork
    158 https://doi.org/10.1145/357980.358017 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052717574
    159 rdf:type schema:CreativeWork
    160 https://www.grid.ac/institutes/grid.252262.3 schema:alternateName Anna University, Chennai
    161 schema:name Department of Mathematics and Computer Applications, PSG College of Technology, Coimbatore, India
    162 rdf:type schema:Organization
    163 https://www.grid.ac/institutes/grid.417969.4 schema:alternateName Indian Institute of Technology Madras
    164 schema:name Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India
    165 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...