Adiga
Barkur Suryanarayana Adiga, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140294177 | IDENTITY BASED PUBLIC KEY CRYPTOSYSTEM - A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (φ(n)), where the private_IGTABLE includes a plurality of random numbers (x). Further, a public_IGTABLE based on the private_IGTABLE, a composite number (n), and a group generator element (g) is generated, where the public_IGTABLE includes a corresponding modular exponentiation under modulo n for each of the plurality of random numbers with g as base. Further, a public key of a user is computed based on the public_IGTABLE, an identity number (ID) corresponding to the user, and n. Further, a secret key of the user is generated based on the ID, a master private key, the φ(n), and the private_IGTABLE. Thereafter, the cryptographic parameters are provided to the user for performing encryption and decryption, where the cryptographic parameters include at least one of the ID, the public key, and the secret key. | 10-02-2014 |
20140344651 | SYSTEM AND METHOD FOR VARYING MEMORY SIZE IN A DATA STREAM PROCESSING - The present disclosure relates to methods, systems, and computer-readable media for varying a memory size in a data stream processing while improving a connection degree sketch. Embodiments of the present disclosure may encode an input data by using an error coding technique to produce an encoded data, wherein the encoded data results in a modified memory size; generate a host connectivity using a set of parameters and applying a reverse sketching technique over the encoded data in order to obtain estimated encoded data; and decode the encoded data after the host connectivity is established using a decoding technique and obtaining an output data. The memory size of the output data may be proportional to the memory size of the input data. | 11-20-2014 |
20150071435 | IDENTITY BASED ENCRYPTION - Method and system for identity based encryption are described. The method comprises obtaining public parameters and a public key set from a central server, where the public parameters include a friendly prime, a torsion group prime order, an super-singular elliptic curve, a first torsion group, a pre-computed Tate pairing value, a first elliptic curve point and a second elliptic curve point, and a distortion map, and where the pre-computed Tate pairing value is generated by the central server. Further, a receiver key set of elliptic curve points based on a receiver identity of a receiver is determined, where the receiver key set is a subset of the public key set. Further a receiver public key based on the receiver key set is computed. Further, the data is encrypted using the Tate pairing value and an encryption component, wherein the encryption component is computed based on the receiver public key set. | 03-12-2015 |
Narasimha R. Adiga, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130145200 | RAM-BASED EVENT COUNTERS USING TRANSPOSITION - Methods and structures that implement an event counter in a RAM are provided. A method includes providing a count-RAM, a carry-RAM, and a pre-counter corresponding to an event source. A column in the count-RAM and a column in the carry-RAM represent a value of a value of the event counter. The method further includes storing a count of the event counter received via the pre-counter in the count-RAM and the carry-RAM in a transposed, bit-serial format, such that location zero of the count-RAM and the carry-RAM counts the least significant bit (LSB) of the event counter. | 06-06-2013 |
Narasimha Ramakrishna Adiga, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090138787 | METHODS AND ARRANGEMENTS FOR PARTIAL WORD STORES IN NETWORKING ADAPTERS - Typically, in designs for networking adapters, challenges are encountered where a partial word (e.g., 16 bit of IP checksum) has to be inserted into packets in buffers that are typically aligned to bus widths (e.g., 64 bit as in the case of 8× PCI Express interface). In fact, this is frequently required in hardware logic that implements a “checksum offload” feature. In many conventional designs, the hardware logic is required to insert the partial word into any given offset into the packet; this insert position in the buffers could be odd or even. Broadly contemplated herein, in accordance with at least one presently preferred embodiment of the present invention, is the implementation of a simple algorithm to store the 2 B IP checksum into any unaligned position within an 8 B word. This avoids the use of a logic-intensive implementation that employs 16 1:8 demultiplexers, or a latency-increasing approach of “read-modify-write”. | 05-28-2009 |
Srinidhi Adiga, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20080229268 | Trace optimization in flattened netlist by storing and retrieving intermediate results - A method of trace optimization in a flattened netlist of a circuit is disclosed. The method generally includes the steps of (A) generating a first total result by tracing a first path through the flattened netlist, (B) writing an intermediate result in a memory, the intermediate result characterizing a module having a plurality of instances in the circuit, (C) adding the intermediate result as read from the memory to the first total result upon crossing each of the instances of the module along the first path and (D) writing the first total result into the memory. | 09-18-2008 |
Vivekananda Adiga, Karnataka IN
Patent application number | Description | Published |
---|---|---|
20090022456 | OPTICAL FIBER PROBE TIPS AND METHODS FOR FABRICATING SAME - Optical fiber probe tips and methods for fabricating the same are presented. One method entails immersing a distal end of an optical fiber having a cladding and a core into an etching solution and simultaneously etching the cladding and the core using the etching solution for tapering the cladding and the core to form a tapered cladding and a tapered core tip. The optical fiber probe tips are suitable for near-field, scanning, optical microscopy (NSOM). | 01-22-2009 |