Skip to main content

Showing 1–30 of 30 results for author: Mahalanobis, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06351  [pdf, other

    cs.CV cs.LG

    Cascading Unknown Detection with Known Classification for Open Set Recognition

    Authors: Daniel Brignac, Abhijit Mahalanobis

    Abstract: Deep learners tend to perform well when trained under the closed set assumption but struggle when deployed under open set conditions. This motivates the field of Open Set Recognition in which we seek to give deep learners the ability to recognize whether a data sample belongs to the known classes trained on or comes from the surrounding infinite world. Existing open set recognition methods typical… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  2. arXiv:2310.04132  [pdf, other

    cs.CR cs.IT math.AG

    Minors solve the elliptic curve discrete logarithm problem

    Authors: Ansari Abdullah, Ayan Mahalanobis

    Abstract: The elliptic curve discrete logarithm problem is of fundamental importance in public-key cryptography. It is in use for a long time. Moreover, it is an interesting challenge in computational mathematics. Its solution is supposed to provide interesting research directions. In this paper, we explore ways to solve the elliptic curve discrete logarithm problem. Our results are mostly computational.… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

  3. arXiv:2309.01357  [pdf, other

    cs.CV

    Adapting Classifiers To Changing Class Priors During Deployment

    Authors: Natnael Daba, Bruce McIntosh, Abhijit Mahalanobis

    Abstract: Conventional classifiers are trained and evaluated using balanced data sets in which all classes are equally present. Classifiers are now trained on large data sets such as ImageNet, and are now able to classify hundreds (if not thousands) of different classes. On one hand, it is desirable to train such general-purpose classifier on a very large number of classes so that it performs well regardles… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  4. arXiv:2308.01895  [pdf, other

    cs.LG cs.AI

    Improving Replay Sample Selection and Storage for Less Forgetting in Continual Learning

    Authors: Daniel Brignac, Niels Lobo, Abhijit Mahalanobis

    Abstract: Continual learning seeks to enable deep learners to train on a series of tasks of unknown length without suffering from the catastrophic forgetting of previous tasks. One effective solution is replay, which involves storing few previous experiences in memory and replaying them when learning the current task. However, there is still room for improvement when it comes to selecting the most informati… ▽ More

    Submitted 3 August, 2023; originally announced August 2023.

  5. arXiv:2201.09144  [pdf, other

    cs.CV

    Background Invariant Classification on Infrared Imagery by Data Efficient Training and Reducing Bias in CNNs

    Authors: Maliha Arif, Calvin Yong, Abhijit Mahalanobis

    Abstract: Even though convolutional neural networks can classify objects in images very accurately, it is well known that the attention of the network may not always be on the semantically important regions of the scene. It has been observed that networks often learn background textures which are not relevant to the object of interest. In turn this makes the networks susceptible to variations and changes in… ▽ More

    Submitted 9 February, 2022; v1 submitted 22 January, 2022; originally announced January 2022.

    Comments: Accepted in AAAI-22 Workshop

  6. arXiv:2111.02119  [pdf, other

    cs.IT cs.CR math.GR

    A McEliece cryptosystem using permutation codes

    Authors: Adarsh Srinivasan, Ayan Mahalanobis

    Abstract: This paper is an attempt to build a new public-key cryptosystem; similar to the McEliece cryptosystem, using permutation error-correcting codes. We study a public-key cryptosystem built using two permutation error-correcting codes. We show that these cryptosystems are insecure. However, the general framework in these cryptosystems can use any permutation error-correcting code and is interesting. W… ▽ More

    Submitted 8 September, 2023; v1 submitted 3 November, 2021; originally announced November 2021.

  7. arXiv:2105.10436  [pdf, other

    cs.CV

    Compressing Deep CNNs using Basis Representation and Spectral Fine-tuning

    Authors: Muhammad Tayyab, Fahad Ahmad Khan, Abhijit Mahalanobis

    Abstract: We propose an efficient and straightforward method for compressing deep convolutional neural networks (CNNs) that uses basis filters to represent the convolutional layers, and optimizes the performance of the compressed network directly in the basis space. Specifically, any spatial convolution layer of the CNN can be replaced by two successive convolution layers: the first is a set of three-dimens… ▽ More

    Submitted 21 May, 2021; originally announced May 2021.

    Comments: arXiv admin note: text overlap with arXiv:1906.04509

  8. arXiv:2012.00283  [pdf, ps, other

    cs.CR cs.IT

    A remark on MAKE -- a Matrix Action Key Exchange

    Authors: Chris Monico, Ayan Mahalanobis

    Abstract: In a recent paper [arXiv:2009.00716], Rahman and Shpilrain proposed a new key-exchange protocol MAKE based on external semidirect product of groups. The purpose of this paper is to show that the key exchange protocol is insecure. We were able to break their challenge problem in under a second.

    Submitted 1 December, 2020; originally announced December 2020.

  9. arXiv:2008.07714  [pdf, other

    cs.CV

    Multiple View Generation and Classification of Mid-wave Infrared Images using Deep Learning

    Authors: Maliha Arif, Abhijit Mahalanobis

    Abstract: We propose a novel study of generating unseen arbitrary viewpoints for infrared imagery in the non-linear feature subspace . Current methods use synthetic images and often result in blurry and distorted outputs. Our approach on the contrary understands the semantic information in natural images and encapsulates it such that our predicted unseen views possess good 3D representations. We further exp… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

    Comments: 5 pages, 5 figures, to be submitted in a journal

  10. arXiv:2005.05039  [pdf, other

    cs.CR math.AG math.NT

    A new method for solving the elliptic curve discrete logarithm problem

    Authors: Ansari Abdullah, Ayan Mahalanobis, Vivek M. Mallick

    Abstract: The elliptic curve discrete logarithm problem is considered a secure cryptographic primitive. The purpose of this paper is to propose a paradigm shift in attacking the elliptic curve discrete logarithm problem. In this paper, we will argue that initial minors are a viable way to solve this problem. This paper will present necessary algorithms for this attack. We have written a code to verify the c… ▽ More

    Submitted 15 February, 2021; v1 submitted 11 May, 2020; originally announced May 2020.

    Comments: 13 pages; revised for publication

    Journal ref: journal of Groups, complexity, cryptology, Volume 12, Issue 2 (February 16, 2021) gcc:6649

  11. Algorithms in Linear Algebraic Groups

    Authors: Sushil Bhunia, Ayan Mahalanobis, Pralhad Shinde, Anupam Singh

    Abstract: This paper presents some algorithms in linear algebraic groups. These algorithms solve the word problem and compute the spinor norm for orthogonal groups. This gives us an algorithmic definition of the spinor norm. We compute the double coset decomposition with respect to a Siegel maximal parabolic subgroup, which is important in computing infinite-dimensional representations for some algebraic gr… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

    Comments: arXiv admin note: text overlap with arXiv:1901.00892, arXiv:1504.03794

    MSC Class: Primary 11E57; 15A21; Secondary 20G05; 15A66

    Journal ref: Adv. Appl. Clifford Algebras 30, 31 (2020)

  12. arXiv:1911.08616  [pdf, other

    cs.CV eess.IV

    Attention Guided Anomaly Localization in Images

    Authors: Shashanka Venkataramanan, Kuan-Chuan Peng, Rajat Vikram Singh, Abhijit Mahalanobis

    Abstract: Anomaly localization is an important problem in computer vision which involves localizing anomalous regions within images with applications in industrial inspection, surveillance, and medical imaging. This task is challenging due to the small sample size and pixel coverage of the anomaly in real-world scenarios. Most prior works need to use anomalous training images to compute a class-specific thr… ▽ More

    Submitted 16 July, 2020; v1 submitted 19 November, 2019; originally announced November 2019.

    Comments: Accepted to ECCV 2020

  13. arXiv:1911.00661  [pdf, ps, other

    cs.CR math.GR

    Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling

    Authors: Upendra Kapshikar, Ayan Mahalanobis

    Abstract: McEliece and Niederreiter cryptosystems are robust and versatile cryptosystems. These cryptosystems work with many linear error-correcting codes. They are popular these days because they can be quantum-secure. In this paper, we study the Niederreiter cryptosystem using non-binary quasi-cyclic codes. We prove, if these quasi-cyclic codes satisfy certain conditions, the corresponding Niederreiter cr… ▽ More

    Submitted 7 November, 2021; v1 submitted 2 November, 2019; originally announced November 2019.

  14. arXiv:1906.04509  [pdf, other

    cs.LG cs.CV stat.ML

    BasisConv: A method for compressed representation and learning in CNNs

    Authors: Muhammad Tayyab, Abhijit Mahalanobis

    Abstract: It is well known that Convolutional Neural Networks (CNNs) have significant redundancy in their filter weights. Various methods have been proposed in the literature to compress trained CNNs. These include techniques like pruning weights, filter quantization and representing filters in terms of a basis functions. Our approach falls in this latter class of strategies, but is distinct in that that we… ▽ More

    Submitted 11 June, 2019; originally announced June 2019.

  15. A Quantum-Secure Niederreiter Cryptosystem using Quasi-Cyclic Codes

    Authors: Upendra Kapshikar, Ayan Mahalanobis

    Abstract: In this paper, we describe a new Niederreiter cryptosystem based on quasi-cyclic $\frac{m-1}{m}$ codes that is quantum-secure. This new cryptosystem has good transmission rate compared to the one using binary Goppa codes and uses smaller keys.

    Submitted 21 May, 2020; v1 submitted 21 March, 2018; originally announced March 2018.

    Comments: Fixed some typos, in particular one in the proof of Lemma 5.6

    Journal ref: In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018) - Volume 2 SECRYPT, pages 340-347

  16. arXiv:1711.07647  [pdf, ps, other

    cs.CR cs.IT math.GR

    Bilinear cryptography using finite $p$-groups of nilpotency class 2

    Authors: Ayan Mahalanobis, Pralhad Shinde

    Abstract: In this short note, we develop a novel idea of a bilinear cryptosystem using the discrete logarithm problem in matrices. These matrices come from a linear representation of a finite $p$-group of class 2. We discuss an example at the end.

    Submitted 21 November, 2017; originally announced November 2017.

  17. arXiv:1703.07544  [pdf, ps, other

    cs.CR cs.IT math.AG

    A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem

    Authors: Ayan Mahalanobis, Vivek Mallick

    Abstract: In this paper, we describe a new Las Vegas algorithm to solve the elliptic curve discrete logarithm problem. The algorithm depends on a property of the group of rational points of an elliptic curve and is thus not a generic algorithm. The algorithm that we describe has some similarities with the most powerful index-calculus algorithm for the discrete logarithm problem over a finite field.

    Submitted 5 February, 2018; v1 submitted 22 March, 2017; originally announced March 2017.

  18. A Probabilistic Baby-Step Giant-Step Algorithm

    Authors: Prabhat Kushwaha, Ayan Mahalanobis

    Abstract: In this paper, a new algorithm to solve the discrete logarithm problem is presented which is similar to the usual baby-step giant-step algorithm. Our algorithm exploits the order of the discrete logarithm in the multiplicative group of a finite field. Using randomization with parallelized collision search, our algorithm indicates some weakness in NIST curves over prime fields which are considered… ▽ More

    Submitted 25 January, 2017; originally announced January 2017.

    Report number: ISBN 978-989-758-259-2

    Journal ref: SECRYPT 2017

  19. arXiv:1601.04134  [pdf, other

    cs.CR

    On improvements of the $r$-adding walk in a finite field of characteristic 2

    Authors: Ansari Abdullah, Hardik Gajera, Ayan Mahalanobis

    Abstract: It is currently known from the work of Shoup and Nechaev that a generic algorithm to solve the discrete logarithm problem in a group of prime order must have complexity at least $k\sqrt{N}$ where $N$ is the order of the group. In many collision search algorithms this complexity is achieved. So with generic algorithms one can only hope to make the $k$ smaller. This $k$ depends on the complexity of… ▽ More

    Submitted 16 January, 2016; originally announced January 2016.

    Journal ref: Journal of discrete mathematical sciences and cryptography, 2016

  20. arXiv:1409.6136  [pdf, other

    math.GR cs.CR

    Gaussian elimination in unitary groups with an application to cryptography

    Authors: Ayan Mahalanobis, Anupam Singh

    Abstract: Gaussian elimination is used in special linear groups to solve the word problem. In this paper, we extend Gaussian elimination to unitary groups. These algorithms have an application in building a public-key cryptosystem, we demonstrate that.

    Submitted 4 November, 2015; v1 submitted 22 September, 2014; originally announced September 2014.

    MSC Class: 20H30; 94A60

  21. arXiv:1408.6340  [pdf, ps, other

    math.GR cs.CR cs.IT

    MOR Cryptosystem and classical Chevalley groups in odd characteristic

    Authors: Ayan Mahalanobis, Anupam Singh

    Abstract: In this paper we study the MOR cryptosystem using finite classical Chevalley groups over a finite field of odd characteristic. In the process we develop an algorithm for these Chevalley groups in the same spirit as the row-column operation for special linear group. We focus our study on orthogonal and symplectic groups. We find the hardness of the proposed MOR cryptosystem for these groups.

    Submitted 27 August, 2014; originally announced August 2014.

    MSC Class: 94A60; 20H30

  22. arXiv:1309.1859  [pdf, ps, other

    math.GR cs.CR

    The MOR cryptosystem and finite $p$-groups

    Authors: Ayan Mahalanobis

    Abstract: The ElGamal cryptosystem is the most widely used public key cryptosystem. It uses the discrete logarithm problem as the cryptographic primitive. The MOR cryptosystem is a similar cryptosystem. It uses the discrete logarithm problem in the automorphism group as the cryptographic primitive. In this paper, we study the MOR cryptosystem for finite $p$-groups. The study is complete for $p^\prime$-autom… ▽ More

    Submitted 7 September, 2013; originally announced September 2013.

    MSC Class: 94A60; 20D15

  23. arXiv:1204.4535  [pdf, other

    cs.CR

    A New Guess-and-Determine Attack on the A5/1 Stream Cipher

    Authors: Jay Shah, Ayan Mahalanobis

    Abstract: In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^(48.5), which is much less than the brute-force attack with a complexity of 2^(64). The attack has a 100% success rate and requires about 5.65GB… ▽ More

    Submitted 3 May, 2012; v1 submitted 20 April, 2012; originally announced April 2012.

    Comments: 14 pages, 4 figures, 3 tables

  24. arXiv:1111.1043  [pdf, ps, other

    math.GR cs.CR

    The MOR cryptosystem and extra-special $p$-groups

    Authors: Ayan Mahalanobis

    Abstract: This paper studies the MOR cryptosystem, using the automorphism group of the extra-special $p$-group of exponent $p$, for an odd prime $p$. Similar results can be obtained for extra-special $p$-groups of exponent $p^2$ and for the even prime.

    Submitted 4 November, 2011; originally announced November 2011.

  25. arXiv:1109.6416  [pdf, ps, other

    cs.CR math.GR math.RA

    The ElGamal cryptosystem over circulant matrices

    Authors: Ayan Mahalanobis

    Abstract: In this paper we study extensively the discrete logarithm problem in the group of non-singular circulant matrices. The emphasis of this study was to find the exact parameters for the group of circulant matrices for a secure implementation. We tabulate these parameters. We also compare the discrete logarithm problem in the group of circulant matrices with the discrete logarithm problem in finite fi… ▽ More

    Submitted 5 July, 2012; v1 submitted 29 September, 2011; originally announced September 2011.

    MSC Class: 94A60; 20G40

  26. arXiv:0905.3135  [pdf, ps, other

    cs.CR cs.DM cs.IT

    The discrete logarithm problem in the group of non-singular circulant matrices

    Authors: Ayan Mahalanobis

    Abstract: The discrete logarithm problem is one of the backbones in public key cryptography. In this paper we study the discrete logarithm problem in the group of circulant matrices over a finite field. This gives rise to secure and fast public key cryptosystems.

    Submitted 21 September, 2009; v1 submitted 19 May, 2009; originally announced May 2009.

  27. arXiv:0706.3305  [pdf, ps, other

    cs.CR math.GR

    A simple generalization of the ElGamal cryptosystem to non-abelian groups II

    Authors: Ayan Mahalanobis

    Abstract: This is a study of the MOR cryptosystem using the special linear group over finite fields. The automorphism group of the special linear group is analyzed for this purpose. At our current state of knowledge, I show that the MOR cryptosystem has better security than the ElGamal cryptosystem over finite fields.

    Submitted 24 January, 2011; v1 submitted 22 June, 2007; originally announced June 2007.

  28. arXiv:cs/0702095  [pdf, ps, other

    cs.CR math.GR

    A note on using finite non-abelian $p$-groups in the MOR cryptosystem

    Authors: Ayan Mahalanobis

    Abstract: The MOR cryptosystem is a natural generalization of the El-Gamal cryptosystem to non-abelian groups. Using a $p$-group, a cryptosystem was built by this author in 'A simple generalization of El-Gamal cryptosystem to non-abelian groups'. It seems reasonable to assume the cryptosystem is as secure as the El-Gamal cryptosystem over finite fields. A natural question arises can one make a better cryp… ▽ More

    Submitted 16 February, 2007; originally announced February 2007.

  29. arXiv:cs/0607011  [pdf, ps, other

    cs.CR math.GR

    A simple generalization of El-Gamal cryptosystem to non-abelian groups

    Authors: Ayan Mahalanobis

    Abstract: In this paper we study the MOR cryptosystem. We use the group of unitriangular matrices over a finite field as the non-abelian group in the MOR cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem over finite fields can be built using the proposed groups and a set of automorphisms of these groups. We also show that the security of this proposed MOR cryptosystem is equiv… ▽ More

    Submitted 7 May, 2007; v1 submitted 4 July, 2006; originally announced July 2006.

  30. arXiv:math/0602282  [pdf, ps, other

    math.GR cs.CR

    The Diffie-Hellman Key Exchange Protocol and non-abelian nilpotent groups

    Authors: Ayan Mahalanobis

    Abstract: In this paper we study a key exchange protocol similar to Diffie-Hellman key exchange protocol using abelian subgroups of the automorphism group of a non-abelian nilpotent group. We also generalize group no.92 of Hall-Senior table \cite{halltable}, for arbitrary prime $p$ and show that for those groups, the group of central automorphisms commute. We use these for the key exchange we are studying… ▽ More

    Submitted 18 October, 2007; v1 submitted 13 February, 2006; originally announced February 2006.

    Comments: Finally got accepted. The final version. To appear, Israel Journal of Mathematics

    MSC Class: 94a62; 20d15