Articles written in Sadhana

    • Streamlining multitemporal vegetation indices for dependable crop growth monitoring in Himalayan foothill region


      More Details Abstract Fulltext PDF

      Satellite data in conjunction with geoinformatics are used to study the land cover change dynamics, extraction of crop information and the monitoring of crop growth. The information derived from the satellite may contain contaminated values due to the atmospheric effects, geometric errors, snow and clouds. These contaminated values can be identified and eliminated using time series analysis to further streamline for agricultural monitoring and prognostic applications. The inherent advantages and disadvantages of existing streamlining methods limit their usability in particular situation. The method proposed in this study synergizesthe use of interpolation, running median and moving average. This has clearly shown the proposal’s capability in preserving the trend in the series in addition to streamlining the temporal profile of satellite data in the Himalayan foothills. This will make the road map for satisfactory crop growth monitoring and crop yieldestimation. Analysis based on the root mean square error and F-Test has been presented to deduce the results and interpretations.

    • A quantum secure ID-based cryptographic encryption based on group rings


      More Details Abstract Fulltext PDF

      Identity-based (ID-based) encryption is a very important cryptographic primitive. It is advantageous over the conventional public key cryptosystems due to direct and easy verification of the public keys. The security of most of the ID-based encryption schemes is based directly or indirectly on solving integer factorizationproblem, Elliptic curve discrete logarithm problem or discrete logarithm problem. It is known that these well-studied problems are not safe against attacks on a sufficiently large quantum computer. Therefore, in this paper we propose a secure ID-based encryption scheme whose security depends on the newly discovered hard problems in the algebraic structure of group rings. We show that the proposed scheme is IND-ID-CPA secure and safe against the chosen ciphertext attack. Moreover, we also comment on the IND-ID-CCA security of theproposed scheme.

  • Sadhana | News

    • Editorial Note on Continuous Article Publication

      Posted on July 25, 2019

      Click here for Editorial Note on CAP Mode

© 2022-2023 Indian Academy of Sciences, Bengaluru.