Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ayineedi Venkateswarlu is active.

Publication


Featured researches published by Ayineedi Venkateswarlu.


Journal of Complexity | 2007

Error linear complexity measures for multisequences

Wilfried Meidl; Harald Niederreiter; Ayineedi Venkateswarlu

Complexity measures for sequences over finite fields, such as the linear complexity and the k-error linear complexity, play an important role in cryptology. Recent developments in stream ciphers point towards an interest in word-based stream ciphers, which require the study of the complexity of multisequences. We introduce various options for error linear complexity measures for multisequences. For finite multisequences as well as for periodic multisequences with prime period, we present formulas for the number of multisequences with given error linear complexity for several cases, and we present lower bounds for the expected error linear complexity.


Theoretical Computer Science | 2005

Results on multiples of primitive polynomials and their products over GF(2)

Subhamoy Maitra; Kishan Chand Gupta; Ayineedi Venkateswarlu

Linear feedback shift registers (LFSR) are important building blocks in stream cipher cryptosysterns. To be cryptographically secure, the connection polynomials of the LFSRs need to be primitive over GF(2). Moreover, the polynomials should have high weight and they should not have sparse multiples at low or moderate degree. Here we provide results on t-nomial multiples of primitive polynomials and their products. We present results for counting t-nomial multiples and also analyse the statistical distribution of their degrees. The results in this paper helps in deciding what kind of primitive polynomial should be chosen and which should be discarded in terms of cryptographic applications. Further the results involve important theoretical identities in terms of t-nomial multiples which were not known earlier.


international conference on cryptology in india | 2014

Partial Key Exposure Attack on CRT-RSA

Santanu Sarkar; Ayineedi Venkateswarlu

In Eurocrypt 2005, Ernst et al. proposed an attack on RSA allowing to recover the secret key when the most or least significant bits of the decryption exponent \(d\) are known. In Indocrypt 2011, Sarkar generalized this by considering the number of unexposed blocks in the decryption exponent is more than one. In this paper, for the first time, we study this situation for CRT-RSA. Further, we consider the case when random bits of one decryption exponent are exposed in this model. These results have implications in side channel attacks.


selected areas in cryptography | 2002

Multiples of Primitive Polynomials and Their Products over GF(2)

Subhamoy Maitra; Kishan Chand Gupta; Ayineedi Venkateswarlu

A standard model of nonlinear combiner generator for stream cipher system combines the outputs of several independent Linear Feed-back Shift Register (LFSR) sequences using a nonlinear Boolean function to produce the key stream. Given such a model, cryptanalytic attacks have been proposed by finding the sparse multiples of the connection polynomials corresponding to the LFSRs. In this direction recently a few works are published on t-nomial multiples of primitive polynomials. We here provide further results on degree distribution of the t-nomial multiples. However, getting the sparse multiples of just a single primitive polynomial does not suffice. The exact cryptanalysis of the nonlinear combiner model depends on finding sparse multiples of the products of primitive polynomials. We here make a detailed analysis on t-nomial multiples of products of primitive polynomials. We present new enumeration results for these multiples and provide some estimation on their degree distribution.


Designs, Codes and Cryptography | 2017

On the direct construction of recursive MDS matrices

Kishan Chand Gupta; Sumit Kumar Pandey; Ayineedi Venkateswarlu

MDS matrices allow to build optimal linear diffusion layers in the design of block ciphers and hash functions. There has been a lot of study in designing efficient MDS matrices suitable for software and/or hardware implementations. In particular recursive MDS matrices are considered for resource constrained environments. Such matrices can be expressed as a power of simple companion matrices, i.e., an MDS matrix


Designs, Codes and Cryptography | 2017

Revisiting (nested) Roos bias in RC4 key scheduling algorithm

Santanu Sarkar; Ayineedi Venkateswarlu


Designs, Codes and Cryptography | 2017

Towards a general construction of recursive MDS diffusion layers

Kishan Chand Gupta; Sumit Kumar Pandey; Ayineedi Venkateswarlu

M = C_g^k


Designs, Codes and Cryptography | 2014

Paillier-based publicly verifiable (non-interactive) secret sharing

Mahabir Prasad Jhanwar; Ayineedi Venkateswarlu; Reihaneh Safavi-Naini


Designs, Codes and Cryptography | 2008

Periodic multisequences with large error linear complexity

Harald Niederreiter; Ayineedi Venkateswarlu

M=Cgk for some companion matrix corresponding to a monic polynomial


Designs, Codes and Cryptography | 2007

Remarks on the k-error linear complexity of pn-periodic sequences

Wilfried Meidl; Ayineedi Venkateswarlu

Collaboration


Dive into the Ayineedi Venkateswarlu's collaboration.

Top Co-Authors

Avatar

Kishan Chand Gupta

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar

Santanu Sarkar

Indian Institute of Technology Madras

View shared research outputs
Top Co-Authors

Avatar

Subhamoy Maitra

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar

Harald Niederreiter

Austrian Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Wilfried Meidl

Austrian Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Sumit Kumar Pandey

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge