Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kannan Srinathan is active.

Publication


Featured researches published by Kannan Srinathan.


Archive | 2007

Progress in Cryptology – INDOCRYPT 2007

Kannan Srinathan; C. Pandu Rangan; Moti Yung

Thank you for reading progress in cryptology indocrypt 2004 5th international conference on cryptology in india chennai india december 20 22 2004 proceedings. As you may know, people have search hundreds times for their chosen books like this progress in cryptology indocrypt 2004 5th international conference on cryptology in india chennai india december 20 22 2004 proceedings, but end up in malicious downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they juggled with some harmful bugs inside their laptop.


ieee international conference on high performance computing, data, and analytics | 2009

A performance prediction model for the CUDA GPGPU platform

Kishore Kothapalli; Rishabh Mukherjee; M. Suhail Rehman; Suryakant Patidar; P. J. Narayanan; Kannan Srinathan

The significant growth in computational power of modern Graphics Processing Units (GPUs) coupled with the advent of general purpose programming environments like NVIDIAs CUDA, has seen GPUs emerging as a very popular parallel computing platform. Till recently, there has not been a performance model for GPGPUs. The absence of such a model makes it difficult to definitively assess the suitability of the GPU for solving a particular problem and is a significant impediment to the mainstream adoption of GPUs as a massively parallel (super)computing platform. In this paper we present a performance prediction model for the CUDA GPGPU platform. This model encompasses the various facets of the GPU architecture like scheduling, memory hierarchy, and pipelining among others. We also perform experiments that demonstrate the effects of various memory access strategies. The proposed model can be used to analyze pseudo code for a CUDA kernel to obtain a performance estimate, in a way that is similar to performing asymptotic analysis. We illustrate the usage of our model and its accuracy with three case studies: matrix multiplication, list ranking, and histogram generation.


principles of distributed computing | 2002

On perfectly secure communication over arbitrary networks

M. V. N. Ashwin Kumar; Pranava R. Goundan; Kannan Srinathan; C. Pandu Rangan

We study the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of generalized Byzantine adversaries. It is known that in the threshold adversary model, where the Byzantine adversary can corrupt upto any t among the n players (nodes), perfectly secure communication among any pair of players is possible if and only if the underlying synchronous network is (2t + 1)-connected. Strictly generalizing these results to the non-threshold setting, we show that perfectly secure communication among any pair of players is possible if and only if the union of no two sets in the adversary structure is a vertex cutset of the synchronous network. The computation and communication complexities of the transmission protocol are polynomial in the size of the network and the maximal basis of the adversary structure.


international cryptology conference | 2004

Optimal Perfectly Secure Message Transmission

Kannan Srinathan; Arvind Narayanan; C. Pandu Rangan

In the perfectly secure message transmission (PSMT) problem, two synchronized non-faulty players (or processors), the Sender S and the Receiver R are connected by n wires (each of which facilitates 2-way communication); S has an l-bit message that he wishes to send to R; after exchanging messages in phases R should correctly obtain S’s message, while an adversary listening on and actively controlling any set of t (or less) wires should have no information about S’s message.


document engineering | 2008

Automatic keyphrase extraction from scientific documents using N-gram filtration technique

Niraj Kumar; Kannan Srinathan

In this paper we present an automatic Keyphrase extraction technique for English documents of scientific domain. The devised algorithm uses n-gram filtration technique, which filters sophisticated n-grams {1dnd4} along with their weight from the words of input document. To develop n-gram filtration technique, we have used (1) LZ78 data compression based technique, (2) a simple refinement step, (3) A simple Pattern Filtration algorithm and, (4) a term weighting scheme. In term weighting scheme, we have introduced the importance of position of sentence (where given phrase occurs first) in document and position of phrase in sentence for documents of scientific domain (which is literally more organized than other domains). The entire system is based upon statistical observations, simple grammatical facts, heuristics, and lexical information of English language. We remark that the devised system does not require a learning phase. Our experimental results with publically available text dataset, shows that the devised system is comparable with other known algorithms.


theory of cryptography conference | 2006

Round-Optimal and efficient verifiable secret sharing

Matthias Fitzi; Juan A. Garay; Shyamnath Gollakota; C. Pandu Rangan; Kannan Srinathan

We consider perfect verifiable secret sharing (VSS) in a synchronous network of n processors (players) where a designated player called the dealer wishes to distribute a secret s among the players in a way that no t of them obtain any information, but any t + 1 players obtain full information about the secret. The round complexity of a VSS protocol is defined as the number of rounds performed in the sharing phase. Gennaro, Ishai, Kushilevitz and Rabin showed that three rounds are necessary and sufficient when n > 3t. Sufficiency, however, was only demonstrated by means of an inefficient (i.e., exponential-time) protocol, and the construction of an efficient three-round protocol was left as an open problem. In this paper, we present an efficient three-round protocol for VSS. The solution is based on a three-round solution of so-called weak verifiable secret sharing (WSS), for which we also prove that three rounds is a lower bound. Furthermore, we also demonstrate that one round is sufficient for WSS when n > 4t, and that VSS can be achieved in 1 + e amortized rounds (for any e > 0 ) when n>3t.


international conference of distributed computing and networking | 2008

Alternative Protocols for Generalized Oblivious Transfer

Bhavani Shankar; Kannan Srinathan; C. Pandu Rangan

Protocols for Generalized Oblivious Transfer(GOT) were introduced by Ishai and Kushilevitz [10]. They built it by reducing GOT protocols to standard 1-out-of-2 oblivious transfer protocols based on private protocols. In our protocols, we provide alternative reduction by using secret sharing schemes instead of private protocols. We therefore show that there exist a natural correspondence between GOT and general secret sharing schemes and thus the techniques and tools developed for the latter can be applied equally well to the former.


principles of distributed computing | 2006

Possibility and complexity of probabilistic reliable communication in directed networks

Kannan Srinathan; C. Pandu Rangan

We provide a complete characterization of directed networks in which probabilistic reliable communication is possible. We also outline a round optimal protocol for the same.


international conference on cryptology in india | 2006

Constant phase bit optimal protocols for perfectly reliable and secure message transmission

Arpita Patra; Ashish Choudhary; Kannan Srinathan; C. Pandu Rangan

In this paper, we study the problem of perfectly reliable message transmission(PRMT) and perfectly secure message transmission(PSMT) between a sender S and a receiver R in a synchronous network, where S and R are connected by n vertex disjoint paths called wires, each of which facilitates bidirectional communication. We assume that atmost t of these wires are under the control of adversary. We present two-phase-bit optimal PRMT protocol considering Byzantine adversary as well as mixed adversary. We also present a three phase PRMT protocol which reliably sends a message containing l field elements by overall communicating O(l) field elements. This is a significant improvement over the PRMT protocol proposed in [10] to achieve the same task which takes log(t) phases. We also present a three-phase-bit-optimal PSMT protocol which securely sends a message consisting of t field elements by communicating O(t2) field elements.


ieee symposium on security and privacy | 2007

On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication

Kannan Srinathan; N.R. Prasad; Chandrasekharan Pandu Rangan

In the perfectly secure message transmission (PSMT) problem, two synchronized non-faulty players (or processors), the Sender S and the Receiver R are connected by n wires (each of which facilitates 2-way communication); S has a message, represented by a sequence oft elements from a finite field, that he wishes to send to R; after exchanging messages in phases R should correctly obtain S s message, while an adversary listening on and actively controlling any set of t (or less) wires should have no information about S s message. Similarly, in the problem of perfect reliable message transmission (PRMT), the receiver R should correctly obtain Ss message, in spite of the adversary actively controlling any set oft (or less) wires.

Collaboration


Dive into the Kannan Srinathan's collaboration.

Top Co-Authors

Avatar

C. Pandu Rangan

Indian Institute of Technology Madras

View shared research outputs
Top Co-Authors

Avatar

Arpita Patra

Indian Institute of Science

View shared research outputs
Top Co-Authors

Avatar

Ashish Choudhary

Indian Institute of Technology Madras

View shared research outputs
Top Co-Authors

Avatar

Kishore Kothapalli

International Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Niraj Kumar

International Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Piyush Bansal

International Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Vasudeva Varma

International Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Anuj Gupta

International Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Prosenjit Gupta

Heritage Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge