Skip to main content

Showing 51–58 of 58 results for author: SenGupta, I

.
  1. arXiv:1503.02687  [pdf, ps, other

    math.AC

    Minimal Graded Free Resolution for Monomial Curves in $\mathbb{A}^{4}$ defined by almost arithmetic sequences

    Authors: Achintya Kumar Roy, Indranath Sengupta, Gaurab Tripathi

    Abstract: Let $\mm=(m_0,m_1,m_2,n)$ be an almost arithmetic sequence, i.e., a sequence of positive integers with ${\rm gcd}(m_0,m_1,m_2,n) = 1$, such that $m_0<m_1<m_2$ form an arithmetic progression, $n$ is arbitrary and they minimally generate the numerical semigroup $Γ= m_0\N + m_1\N + m_2\N + n\N$. Let $k$ be a field. The homogeneous coordinate ring $k[Γ]$ of the affine monomial curve parametrically def… ▽ More

    Submitted 1 January, 2016; v1 submitted 9 March, 2015; originally announced March 2015.

    Comments: Accepted for publication in Communication in Algebra

  2. arXiv:1108.3203  [pdf, ps, other

    math.AC

    Minimal Graded Free Resolutions for Monomial Curves Defined by Arithmetic Sequences

    Authors: Philippe Gimenez, Indranath Sengupta, Hema Srinivasan

    Abstract: Let $\mm=(m_0,...,m_n)$ be an arithmetic sequence, i.e., a sequence of integers $m_0<...<m_n$ with no common factor that minimally generate the numerical semigroup $\sum_{i=0}^{n}m_i\N$ and such that $m_i-m_{i-1}=m_{i+1}-m_i$ for all $i\in\{1,...,n-1\}$. The homogeneous coordinate ring $Γ_\mm$ of the affine monomial curve parametrically defined by $X_0=t^{m_0},...,X_n=t^{m_n}$ is a graded $R$-mo… ▽ More

    Submitted 16 August, 2011; originally announced August 2011.

    Comments: 18 PAGES

    MSC Class: 13D02; 13A02; 13C40

  3. arXiv:1105.1572   

    cs.CR cs.NI

    Some Aspects of Quantum Cryptography and Network Security

    Authors: Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta

    Abstract: Quantum mechanics is the current best description of the world as we know it. Experiments have shown that quantum predictions are accurate up ten places of decimal. In quantum cryptography much work has been devoted to the study of Quantum Key Distribution (QKD). The purpose of QKD is to securely distribute secret keys between the users in a network. As a result, several quantum cryptographic prot… ▽ More

    Submitted 1 June, 2011; v1 submitted 8 May, 2011; originally announced May 2011.

    Comments: This was withdrawn because the key distribution figures Figure 1 and 3 in the paper are technically incorrect

    Journal ref: International Journal HIT Transaction on ECCN (Electronics, Communication, Computers and Networking), pp. 27-36. Volume 1, No: 1, January 2006

  4. arXiv:1011.5534   

    cs.CR math.AC

    GB-hash : Hash Functions Using Groebner Basis

    Authors: Dhananjoy Dey, Prasanna Raghaw Mishra1, Indranath Sengupta

    Abstract: In this paper we present an improved version of HF-hash, viz., GB-hash : Hash Functions Using Groebner Basis. In case of HF-hash, the compression function consists of 32 polynomials with 64 variables which were taken from the first 32 polynomials of hidden field equations challenge-1 by forcing last 16 variables as 0. In GB-hash we have designed the compression function in such way that these 32 p… ▽ More

    Submitted 30 August, 2011; v1 submitted 24 November, 2010; originally announced November 2010.

    Comments: The paper has been withdrawn. The authors have found some weaknesses in this design

  5. arXiv:1011.4247  [pdf, ps, other

    math.AC math.AG

    Minimal free resolutions for certain affine monomial curve

    Authors: Philippe Gimenez, Indranath Sengupta, Hema Srinivasan

    Abstract: Given an arbitrary field k and an arithmetic sequence of positive integers m_0<...<m_n, we consider the affine monomial curve parameterized by X_0=t^{m_0},...,X_n=t^{m_n}. In this paper, we conjecture that the Betti numbers of its coordinate ring are completely determined by n and the value of m_0 modulo n. We first show that the defining ideal of the monomial curve can be written as a sum of two… ▽ More

    Submitted 18 November, 2010; originally announced November 2010.

    Comments: 9 pages. To appear in 'Commutative Algebra and its Connections to Geometry (PASI 2009)', Contemporary Mathematics, AMS

    MSC Class: 13D02 (primary); 13A02; 13C40 (secondary)

    Journal ref: Contemp. Math, 555 (2011) 87-95

  6. Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups

    Authors: Ruchira Naskar, Indranil Sengupta

    Abstract: Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direc- tion, this paper presents a novel approach to share a secret among a hierarchy of users while overcoming the limitations of the already exist- ing mechanisms. Our work is based on traditional (k +1; n)-threshold secret sharing, which is secure as long as an adver… ▽ More

    Submitted 7 June, 2010; originally announced June 2010.

    Comments: 20 Pages

    Journal ref: International Journal of Computer Science and Information Technology 2.3 (2010) 160-179

  7. arXiv:1003.0775  [pdf, ps, other

    math.AC

    The Rees Algebra for Certain Monomial Curves

    Authors: Debasish Mukhopadhyay, Indranath Sengupta

    Abstract: In this article, we find the equations defining the Rees algebra for certain Monomial Curves explicitly and use them to prove that the blowup scheme is not smooth. This proves a conjecture of Francia in affirmative, which says that a dimension one prime in a regular local ring is a complete intersection if it has a smooth blowup.

    Submitted 11 January, 2011; v1 submitted 3 March, 2010; originally announced March 2010.

  8. arXiv:0909.1392  [pdf, other

    cs.CR math.AC

    HF-hash : Hash Functions Using Restricted HFE Challenge-1

    Authors: Dhananjoy Dey, Prasanna Raghaw Mishra, Indranath Sengupta

    Abstract: Vulnerability of dedicated hash functions to various attacks has made the task of designing hash function much more challenging. This provides us a strong motivation to design a new cryptographic hash function viz. HF-hash. This is a hash function, whose compression function is designed by using first 32 polynomials of HFE Challenge-1 with 64 variables by forcing remaining 16 variables as zero.… ▽ More

    Submitted 5 October, 2009; v1 submitted 8 September, 2009; originally announced September 2009.

    Comments: 44 pages including 32 pages appendix (list of polynomials) 2 figures, corrected Surname