R. Padmavathy

According to our database1, R. Padmavathy authored at least 18 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system.
Peer Peer Netw. Appl., January, 2024

2023
Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption from Module-LWE for Cloud Storage.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023

2022
Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through SIP.
Int. J. Secur. Networks, 2022

An efficient scalar multiplication algorithm on Koblitz curves using τ<sup>3</sup>-NAF.
Int. J. Secur. Networks, 2022

Secure exchange and incentivised collaboration of machine learning models and datasets using blockchain.
Int. J. Inf. Comput. Secur., 2022

Lattice-based lightweight cryptosystem.
Int. J. Ad Hoc Ubiquitous Comput., 2022

Secured Cloud Communication Using Lightweight Hash Authentication with PUF.
Comput. Syst. Sci. Eng., 2022

2021
Relation collection using Pollard special-q sieving to solve integer factorization and discrete logarithm problem.
J. Supercomput., 2021

2020
An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services.
Proceedings of the 5th International Conference on Computing, Communication and Security, 2020

2015
A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery.
Int. J. Netw. Secur., 2015

2013
Index Calculus Method based on Smooth Numbers of ±1 over Zp.
Int. J. Netw. Secur., 2013

2012
Discrete logarithm problem using index calculus method.
Math. Comput. Model., 2012

An Improved Fast and Secure Hash Algorithm.
J. Inf. Process. Syst., 2012

2011
A Small Subgroup Attack for Recovering Ephemeral Keys in Chang and Chang Password Key Exchange Protocol.
J. Comput., 2011

2010
Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'.
J. Inf. Process. Syst., 2010

Solving the Discrete Logarithm Problem for Ephemeral Keys in Chang and Chang Password Key Exchange Protocol.
J. Inf. Process. Syst., 2010

Unknown Key Share Attack on STPKE' Protocol.
Proceedings of the Information Processing and Management, 2010

2009
Methods to Solve Discrete Logarithm Problem for Ephemeral Keys.
Proceedings of the ARTCom 2009, 2009


  Loading...