Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Anindya De is active.

Publication


Featured researches published by Anindya De.


SIAM Journal on Computing | 2012

Trevisan's extractor in the presence of quantum side information

Anindya De; Christopher Portmann; Thomas Vidick; Renato Renner

Randomness extraction involves the processing of purely classical information and is therefore usually studied with in the framework of classical probability theory. However, such a classical treatment is generally too restrictive for applications where side information about the values taken by classical random variables may be represented by the state of a quantum system. This is particularly relevant in the context of cryptography, where an adversary may make use of quantum devices. Here, we show that the well-known construction paradigm for extractors proposed by Trevisan is sound in the presence of quantum side information. We exploit the modularity of this paradigm to give several concrete extractor constructions, which, e.g., extract all the conditional (smooth) min-entropy of the source using a seed of length polylogarithmic in the input, or only require the seed to be weakly random.


symposium on the theory of computing | 2008

Fast integer multiplication using modular arithmetic

Anindya De; Piyush P. Kurur; Chandan Saha; Ramprasad Saptharishi

We give an O(N • log N • 2O(log*N)) algorithm for multiplying two N-bit integers that improves the O(N • log N • log log N) algorithm by Schönhage-Strassen. Both these algorithms use modular arithmetic. Recently, Fürer gave an O(N • log N • 2O(log*N)) algorithm which however uses arithmetic over complex numbers as opposed to modular arithmetic. In this paper, we use multivariate polynomial multiplication along with ideas from Fürers algorithm to achieve this improvement in the modular setting. Our algorithm can also be viewed as a p-adic version of Fürers algorithm. Thus, we show that the two seemingly different approaches to integer multiplication, modular and complex arithmetic, are similar.


symposium on the theory of computing | 2010

Near-optimal extractors against quantum storage

Anindya De; Thomas Vidick

We show that Trevisans extractor and its variants [22,19] are secure against bounded quantum storage adversaries. One instantiation gives the first such extractor to achieve an output length Θ(K-b), where K is the sources entropy and b the adversarys storage, together with a poly-logarithmic seed length. Another instantiation achieves a logarithmic key length, with a slightly smaller output length Θ((K-b)/Kγ) for any γ>0. In contrast, the previous best construction [21] could only extract (K/b)1/15 bits. Some of our constructions have the additional advantage that every bit of the output is a function of only a polylogarithmic number of bits from the source, which is crucial for some cryptographic applications. Our argument is based on bounds for a generalization of quantum random access codes, which we call quantum functional access codes. This is crucial as it lets us avoid the local list-decoding algorithm central to the approach in [21], which was the source of the multiplicative overhead.


SIAM Journal on Computing | 2013

Fast Integer Multiplication Using Modular Arithmetic

Anindya De; Piyush P. Kurur; Chandan Saha; Ramprasad Saptharishi

We give an


symposium on the theory of computing | 2016

A size-free CLT for poisson multinomials and its applications

Constantinos Daskalakis; Anindya De; Gautam Kamath; Christos Tzamos

N\cdot \log N\cdot 2^{O(\log^*N)}


IEEE Transactions on Power Delivery | 2007

Computation of Optimal Break Point Set of Relays—An Integer Linear Programming Approach

Rajeev Kumar Gajbhiye; Anindya De; S. A. Soman

time algorithm to multiply two


foundations of computer science | 2015

Beyond the Central Limit theorem: Asymptotic Expansions and Pseudorandomness for Combinatorial Sums

Anindya De

N


symposium on the theory of computing | 2014

Efficient deterministic approximate counting for low-degree polynomial threshold functions

Anindya De; Rocco A. Servedio

-bit integers that uses modular arithmetic for intermediate computations instead of arithmetic over complex numbers as in Furers algorithm, which also has the same and so far the best known complexity. The previous best algorithm using modular arithmetic (by Schonhage and Strassen) has complexity


SIAM Journal on Discrete Mathematics | 2016

A Robust Khintchine Inequality, and Algorithms for Computing Optimal Constants in Fourier Analysis and High-Dimensional Geometry

Anindya De; Ilias Diakonikolas; Rocco A. Servedio

O(N \cdot \log N \cdot \log\log N)


symposium on discrete algorithms | 2014

A polynomial-time approximation scheme for fault-tolerant distributed storage

Constantinos Daskalakis; Anindya De; Ilias Diakonikolas; Ankur Moitra; Rocco A. Servedio

. The advantage of using modular arithmetic as opposed to complex number arithmetic is that we can completely evade the task of bounding the truncation error due to finite approximations of complex numbers, which makes the analysis relatively simple. Our algorithm is based upon Furers algorithm, but uses fast Fourier transform over multivariate polynomials along with an estimate of the least prime in an arithmetic progression to achieve this improvement in the modular setting. It can also be viewed as a

Collaboration


Dive into the Anindya De's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ilias Diakonikolas

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Elchanan Mossel

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Joe Neeman

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Luca Trevisan

University of California

View shared research outputs
Top Co-Authors

Avatar

Thomas Vidick

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Constantinos Daskalakis

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Chandan Saha

Indian Institute of Technology Kanpur

View shared research outputs
Top Co-Authors

Avatar

Piyush P. Kurur

Indian Institute of Technology Kanpur

View shared research outputs
Researchain Logo
Decentralizing Knowledge