Indraprastha Institute of Information Technology Delhi

Results: 16



#Item
11One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
12Real-time web / Social media / Text messaging / Websites / Microblogging / Twitter usage / Twitter / World Wide Web / Technology

$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter Aditi Gupta∗ , Hemank Lamba∗∗ , Ponnurangam Kumaraguru∗ ∗ Indraprastha Institute of Information Technology, Delhi, India

Add to Reading List

Source URL: precog.iiitd.edu.in

Language: English - Date: 2013-10-19 15:15:18
13World Wide Web / Real-time web / Text messaging / Twitter / Websites / Cluster analysis / Microblogging / Internet privacy / England riots / Statistics / Social media / Technology

Identifying and Characterizing User Communities on Twitter during Crisis Events Aditi Gupta∗ , Anupam Joshi† , Ponnurangam Kumaraguru∗ ∗ Indraprastha Institute of Information Technology, Delhi, India

Add to Reading List

Source URL: precog.iiitd.edu.in

Language: English - Date: 2012-08-27 02:34:32
14Real-time web / Text messaging / Websites / Technology / Microblogging / Twitter usage / Indigenous Tweets / Twitter / World Wide Web / Social media

Credibility Ranking of Tweets during High Impact Events Aditi Gupta, Ponnurangam Kumaraguru Indraprastha Institute of Information Technology, Delhi, India {aditig, pk}@iiitd.ac.in precog.iiitd.edu.in

Add to Reading List

Source URL: precog.iiitd.edu.in

Language: English - Date: 2012-04-22 11:29:07
15Hashing / Search algorithms / Password / SHA-2 / Hash function / Crypt / Salt / PBKDF2 / Bcrypt / Cryptography / Cryptographic hash functions / Cryptographic software

Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-07 03:55:02
16Indraprastha Institute of Information Technology / Indian Institute of Technology Kanpur / Indian Institutes of Technology / Education in Delhi / Virtual Labs / International Institute of Information Technology /  Hyderabad / Education in India / States and territories of India / India

Microsoft Word - Pankaj Jalote

Add to Reading List

Source URL: www.ficci-hes.com

Language: English - Date: 2014-12-11 04:24:41
UPDATE