Skip to main content

Showing 1–6 of 6 results for author: Sengupta, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2107.14695  [pdf, other

    q-fin.ST cs.LG

    A data-science-driven short-term analysis of Amazon, Apple, Google, and Microsoft stocks

    Authors: Shubham Ekapure, Nuruddin Jiruwala, Sohan Patnaik, Indranil SenGupta

    Abstract: In this paper, we implement a combination of technical analysis and machine/deep learning-based analysis to build a trend classification model. The goal of the paper is to apprehend short-term market movement, and incorporate it to improve the underlying stochastic model. Also, the analysis presented in this paper can be implemented in a \emph{model-independent} fashion. We execute a data-science-… ▽ More

    Submitted 30 July, 2021; originally announced July 2021.

    Comments: 19 pages, 10 figures, 7 tables. [This is a REU paper]

    MSC Class: 68T05; 68T07; 91G15 ACM Class: I.2.6

  2. arXiv:2103.08281  [pdf, other

    quant-ph cs.DS cs.ET

    Efficient Construction of Functional Representations for Quantum Algorithms

    Authors: Lukas Burgholzer, Rudy Raymond, Indranil Sengupta, Robert Wille

    Abstract: Due to the significant progress made in the implementation of quantum hardware, efficient methods and tools to design corresponding algorithms become increasingly important. Many of these tools rely on functional representations of certain building blocks or even entire quantum algorithms which, however, inherently exhibit an exponential complexity. Although several alternative representations hav… ▽ More

    Submitted 15 March, 2021; originally announced March 2021.

    Comments: 15 pages, 5 figures

  3. arXiv:1105.1572   

    cs.CR cs.NI

    Some Aspects of Quantum Cryptography and Network Security

    Authors: Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta

    Abstract: Quantum mechanics is the current best description of the world as we know it. Experiments have shown that quantum predictions are accurate up ten places of decimal. In quantum cryptography much work has been devoted to the study of Quantum Key Distribution (QKD). The purpose of QKD is to securely distribute secret keys between the users in a network. As a result, several quantum cryptographic prot… ▽ More

    Submitted 1 June, 2011; v1 submitted 8 May, 2011; originally announced May 2011.

    Comments: This was withdrawn because the key distribution figures Figure 1 and 3 in the paper are technically incorrect

    Journal ref: International Journal HIT Transaction on ECCN (Electronics, Communication, Computers and Networking), pp. 27-36. Volume 1, No: 1, January 2006

  4. arXiv:1011.5534   

    cs.CR math.AC

    GB-hash : Hash Functions Using Groebner Basis

    Authors: Dhananjoy Dey, Prasanna Raghaw Mishra1, Indranath Sengupta

    Abstract: In this paper we present an improved version of HF-hash, viz., GB-hash : Hash Functions Using Groebner Basis. In case of HF-hash, the compression function consists of 32 polynomials with 64 variables which were taken from the first 32 polynomials of hidden field equations challenge-1 by forcing last 16 variables as 0. In GB-hash we have designed the compression function in such way that these 32 p… ▽ More

    Submitted 30 August, 2011; v1 submitted 24 November, 2010; originally announced November 2010.

    Comments: The paper has been withdrawn. The authors have found some weaknesses in this design

  5. Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups

    Authors: Ruchira Naskar, Indranil Sengupta

    Abstract: Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direc- tion, this paper presents a novel approach to share a secret among a hierarchy of users while overcoming the limitations of the already exist- ing mechanisms. Our work is based on traditional (k +1; n)-threshold secret sharing, which is secure as long as an adver… ▽ More

    Submitted 7 June, 2010; originally announced June 2010.

    Comments: 20 Pages

    Journal ref: International Journal of Computer Science and Information Technology 2.3 (2010) 160-179

  6. arXiv:0909.1392  [pdf, other

    cs.CR math.AC

    HF-hash : Hash Functions Using Restricted HFE Challenge-1

    Authors: Dhananjoy Dey, Prasanna Raghaw Mishra, Indranath Sengupta

    Abstract: Vulnerability of dedicated hash functions to various attacks has made the task of designing hash function much more challenging. This provides us a strong motivation to design a new cryptographic hash function viz. HF-hash. This is a hash function, whose compression function is designed by using first 32 polynomials of HFE Challenge-1 with 64 variables by forcing remaining 16 variables as zero.… ▽ More

    Submitted 5 October, 2009; v1 submitted 8 September, 2009; originally announced September 2009.

    Comments: 44 pages including 32 pages appendix (list of polynomials) 2 figures, corrected Surname