Links

Achievements


Development of many Software Packages based on advanced mathematical techniques such as :

  • Boolean function
  • Binary sequence
  • Algebraic concepts - Universal algebra and finite fields
  • Artificial Intelligence & ANN
  • Pattern Recognition and Clustering
  • Genetic Algorithms

  • Development of tools and techniques for speech recognition, coding and digital/analog speech analysis.

    Designing and development of electronic hardware and PC based cards for communication .

    Creation of Infrastructure - H/V/UHF and microwave communication and analysis post.

    Development of Cyber Security Tools.

  • USB-Authorization Controller Engine (USB-ACE)
  • Secure File/Folder Deletion Tool (SWIPE)
  • Automated File Integrity Testing Tool (AFITT)

  • Development of tools for Malware Analysis

    Development of framework for Network Security Assessment

    PUBLICATIONS

    Research Papers

    Year 2009

    Authors

    Title

    Presented / Published in

    Kamini Malhotra  Anu Khosla

    GMM based Identification of Regional Indian Languages from Spoken Utterances

    4th Indian International Conference on Artificial Intelligence

    PK Saxena Pratibha Yadav, Girish Mishra

    Index of Gabledness for Automatic Identification of Plain English Texts

    Defence Science Journal

    MK Dubey

    A note on Quasi k-ideals and Bi k-ideals in Ternary Semi rings

    Italian Journal of Pure and Applied Mathematics

    Ram Ratan

    Key Independent Retrieval of Chaotic Encrypted Images

    International Conference on Pattern Recognition and Machine Intelligence(PReMI)  PReMI 2009, LNCS 5909, pp 483-488

    Mahesh Chander

    A review on Green Buildings in Indian Perspective

    Silver Jubilee Souvenir of CCE Secunderbad

    Year 2010

    Ram Ratan

    Retrieval of Graphically Encrypted Images

    Pacific Asia Conference on Knowledge Discovery and Data Mining 2010

    Girish Mishra   Sohan Lal Nitharwal Sarvjeet Kaur

    Language Identification using Fuzzy - SVM Technique

    International Conference on Computing, Communication & Network Technologies

    Indivar Gupta  Dr. PK Saxena

    Distributed Signcryption Schemes from Pairing

    International Conference

    SK Bhambri  Manish Kant Dubey

    Exact, Proper Exact Sequences and Projective Semimodules

    International Journal of Algebra

    Manoj Kumar,  Pratibha Yadav , MeenaKumari

    Flaws in Differential Cryptanalysis of Reduced Round PRESENT

    Cryptology ePrint Archive

    Indivar Gupta,  PK Saxena

    Distributed Signcryption from Pairing

    IWSEC 2010, Kobe, Japan

    SK Pal,  Shivam Kapoor

    Securing Digital Information using Quasigroups

    IJCNS - 2010

    SK Bhambri,  Manish Kant Dubey

    On Commutative Diagrams of semimodules and k-projective semimodules

    Journal of the Indian Mathematical Society

    MK Dubey

    A Note on P-regular semirings

    Italian Journal of Pure and Applied Mathematics

    SK Pal Akanksha Jaiswal & Vibhanshu Chamoli

    Quasigroup based Design of New Cryptography Schemes

    ICMS-2010

    Rajan Gupta & SK Pal

    Key based Multimedia Encryption using Fibonacci Transform

    ICMSA-2010

    Rajan Gupta, Ankur Aggarwal & SK Pal

     A New Secure and Efficient Multimedia Encryption Scheme

    NCETCS - 2010

    Navin Ketu & SK Pal

    Homomorphic Encryption Schemes

    ICM-2010

    Nisha Goyal, Pallavi Nanda & SK Pal

    Hard Problems in Lattice Based Cryptography

    ICWM-2010

    Nisha Goyal, Pallavi Nanda & SK Pal

    Construction of Lattice based Cryptographic Schemes

    ICM-2010

    Navin Ketu & SK Pal

    Elliptic Curve based Homomorphic Encryption

    ICM-2010

    Rajan Gupta & SK Pal

    Properties of Cryptographic Applications of Fibonacci Numbers

    ICM-2010

    SK Pal  Ravish Kumar & Dhruvesh Kumar

    Public Key Cryptography using Multiple Hard Problems

    ICM-2010

    SK Pal &Umesh Kumar

    Properties & Applications of Non-Polynomial Latin Squares

    ICM-2010

    SK Pal  Shivam Kapoor  Alka Arora, Reshu Chaudhary &Jatin Khurana

    Design of Strong Cryptographic Schemes based on Latin Squares

    JDMS&C

    Badal Saxena & SK Pal

    Some New Concepts in Fuzzy Arithmetic

    JDMS&C

    SK Pal  Sarvesh Kumar  Sarvajeet Kumar & Mukesh Vaidya

    A Framework for Secure Communication using Hindi for Web based Mobile Applications

    TSI Conference - 2010

    S Dhall & SK Pal

    Design of a New Block Cipher based on Conditional Encryption

    ISISP - 2010

    SK Pal  Deekshita Bisht & AmolChandla

    Design & Analysis of Scalable Encryption Schemes for Multimeida

    Innovations and Advances in Communications Information and Network Security, Macmillan Advanced research Series 2010

    Rajan Gupta, Ankur Aggarwal & SK Pal

    New Shuffle Encrytpion Schemes for Scrambling digital Images

     

    Adhar Mittal & SK Pal

    Attacks on chaos based Encryption Schemes

     

    SK Pal  Rajeev Khandelwal & Manish Nandal

    Design of Probabilistic Encryption Algorithms

    AMS WS on Probability & Stats, Princeton New Jersey

    SK Pal  AkankshaJaiswal & VibhanshuChamoli

    New Quasigroup Generation Schemes for Cryptographic Applications

    ICC - 2010

    Girish Mishra  Sarvjeet Kaur & Anil Uppal

    Breaking Hill Cipher using a New Scoring Scheme

    Cryptologia

    RichaTyagi & SuniataMaithani

    A Hybrid Speech Enhancement System based on Wavelet Denoising

    13th Oriental COCOSDA 2010

    N Rajesh Pillai, SS Bedi, Sanjay Kumar, Roopika Chaudhary

    Relation for Algebraic Attack on E0 Combiner

    eprint: Digital Cryptology Archieve, Paper No. 129 in 2010

    Year 2011

    Ram Ratan

    Lightweight Image Encryption Method using Inversion and Circular Shift Schemes

    LightSec-2011

    Gurjit Singh Walia Gajraj Kuldeep  AK Sharma  Rajiv Kapoor

    An overview - FPGA Based Secure System

    Advanced Communication Systems and Design Techniques, Haldia, WB

    PR Mishra  Indivar Gupta  NR Pillai

    Generalised Avalanche Test for Stream Cipher Analysis

    International Conference on Inforsec Hicom Net 2011

    Yogesh Kumar Lather, N. Rajesh Pillai

    Cryptanalysis of Bean a lightweight Stream Cipher

    Security of Information and Networks

    Manish Kant Dubey  Anuradha

    On (m,pq),n)-Quasi-ideals in Ternary Semirings

    International Journal of Pure and Applied Mathematics

    Arbind Kumar Singh

    Efficient End Point Detection of a Spoken Word Recognition System

    International Journal of Computer Science and System Analysis

    Dhananjoy Dey, Noopur Shrotriya, Indranath Sengupta

    R-Hash Function using Random Polynomials over GF(2)

    Journal of Systems and Software

    Yogesh Kumar

    Algebraic Attack on BEAN - a Lightweight Stream Cipher

    4th International Conference on Security of Information Networks

    Ram Ratan

    Securing Images using Inversion & Shifting

    International Conference on Advances in Communication & Information Technology

    Gurjit Singh Walia Gajraj Kuldeep Ajaj Singh, Rajiv Kapoor

    An effective model for earlier Detection of Fire in Video Sequences using Color Statistical Model

    International Conference of Microwave, Antenna, Propagation and Remote Sensing

    Manish Kant Dubey

    On minimal Bi-ideal in Ternary Semirings

    International Jouranal of Algebra, Vol 6, 2012, no. 1,15-22

    Arbind Kumar Singh, BM Suri

    Automatic Detection of Push Peak from Acoustic Emanation of a Keyboard sing Majority Voting

    International Conference on Signal Image and Video Processing (ICSIVP - 2012)

    Maiya Din, AK Bhateja

    Impact of changing Dimensions of population in Developing India

    Demographic Dividend of India

    Ram Ratan

    Necessity of Appropriate Handling of Challenging Issues in Addition to Demographic Dividend for Developing India

    Demographic Dividend of India

    Saibal K Pal, Akanksha Jaiswal &VibhanshuChamoli

    Quasigroup Based Design of New Cryptographic Schemes

    Aryabhatt Journal of Mathematics & Informatics, Vol 3, No. 2, Jul - Dec 2011, pp 277 - 294

    JitinLuthra&Saibal K Pal

    A Hybrid Firefly Algorithm using Genetic Operators for Cryptanalysis of Mon-alphabetic Substitution cipher

    Proceedings of the World Congress on Information &Communication Technologies, 2011, pp 202 - 206.

    Rajan Gupta & Saibal K Pal

    Key based Multimedia Encryption using Fibonacci Transform

    Proceedings of the international Congress on Producttivity, Quality, Relability, Oprimization and Modeling (ICPQROM-2011)

    A Singh & Saibal K Pal

    Hybrid Computational Intelligence Techniques in Intrusion Detection and Prevention System

    International Journal of Elecronics & Computers, Vol 3, No.1, 2011, pp - 25-31

    Saibal K Pal &PuneetSardana

    Enterprise Cloud Computing in India : Challenges & Practical Solutions

    Published in the book - IT for Business Excellence, Macmillan Advanced Research Series, Macmillan Publishers 2012, pp197-207

    Saibal K Pal, Disha Gupta & Priyanka Kochhar

    Design and Implementation of Smart Home Security Schemes.

    Published in the book - IT for Business Excellence, Macmillan Advanced Research Series, Macmillan Publishers 2012, pp 232-246

    Saibal K Pal , Trina Dey & Shruti Kamboj

    Web 2.0 based Enterprise Solutions, Published in the book

    IT for Business Excellence, Macmillan Advanced Research Series, Macmillan Publisher, 2012, pp 247-262

    Rajan Gupta, Saibal K Pal & Pooja Gupta

    An Efficient and Secure Chaotic Encryption Scheme for Multimedia

    Proceedings of the International Conference on Advances in Modelling, Optimization and computing (AMOC-2011), IIT Roorkee, pp 990-999

    Saibal K Pal, D Upadhyay& Nitin

    Design of Practical & Efficient Homomorphic Encryption Schemes.

    Proceedings of the International Conference on Advances in Modelling, Optimization and computing (AMOC-2011), IIT Roorkee, Dec 2011

    Anjali Arora &Saibal K Pal

    Design & Analysis of Tweak able Block Ciphers

    National Workshop on Cryptology, CD Proceedings, Neemrana, Nov 2011

    Dhananjoy Dey, Prasanna R Mishra, Indranath Sengupta

    HF-hash: Hash Functions using Restricted HFE Challenge -1

    International Journal of Advanced Science & Technology

    Year 2012

    Manish Kant Dubey  Anuradha

    On (m,(p,q),n) bi-ideals in Ternary Semirings

    Lobachevskii Journal of Mathematics (Springer)

    Gurjit Singh Walia, GajrajKuldeep, Rajiv Kapoor, AK Sharma, NavneetGaba

    FPGA Based Secure System Design - an overview

    International Journal of Soft computing and Engineering, ISSN:2231-2307, vol - 1, issue -6

    Manish Kant Dubey

    On minimal Bi-ideal in Ternary Semirings

    International Journal of Algebra, Vol 6, 2012, No. 1,15 - 22

    Anand Sharma, AK Sharma

    Analysis of Enhanced CCK Modulation for Multipath Interference under Multi-user Environment

    International Journal of Communications Network and system Sciences

    Rajiv Kapoor, Gurjit Singh Walia, Imran Arshad, Monika Tomar

    Particle Filter Based on Biogeography Based Optimization for Non-linear State Estimation

    8th IEEE Colloquium of Signal Processing & Its Applications, Published by International Conference on Information, Computing & Telecommunications)

    Dhananjoy Dey, PR Mishra, Indranath Sengupta

    GB-Hash Functions using Groebner Basis

    International Journal of Modern Engineering research (IJMER), Vol 2, Issue 2, Mar-Apr 2012, pp 462-470

    Gurpreet Kaur, Viydyavati S Nayak, Dhananjoy Dey, Saibal K Pal

    Modified Grostl: An Efficient Hash Function,

    CSIA - 2012, Advances in Intelligent and Soft Computing Book Series, Springer

    Vinay Verma, Rajeev Thaman

    Secure Coding Practices for Information Security

    Cyber Security Workshop, DIAT Pune

    Rachita Juneja, Vinod Kumar

    Quorum based Distributed Mutual Exclusion Algorithms in Mobile Networks

    International Journal of Computer Applications

    Manish Kant Dubey

    Prime and Weakly Prime Ideals in Semirings, Quasigroups and related Systems

    International Journal

    Gurpreet Kaur, Viydyavati S Nayak, DhananjoyDey, Saibal K Pal

    Analysis of the Hash Functions - Modified Grostl

    International Journal of Computer Applications, Vol 44, No. 21, May 2012

    GS Gupta,  Prof Tapash Ghoshal

    Up Against the Odds - Successful Implementation of a project in a Govt R&D Orgn. : A case Study

    "GROWTH" Journal of Management Training Institute, SAIL, Ranchi, Jan-Mar 2013 issue,  pp 43 - 52

    AK Bhateja,  Maiya Din

    ANN Based Distinguishing Attack on RC 4 Stream Cipher

    International Conference on Bio-Implied Computing (BICTA) -2012

    Manoj Kumar, Saibal K Pal, Pratibha Yadav

    Mathematical Constructs of Lightweight Block Ciphers-A survey

    International Conference on Mathematical Sciences and Applications

    Ashok K Bhateja, PK Saxena

    Secure Cancellable Fingerprint Key Generation for symmetric Cipher system

    ICVGIP 2012

    MK Dubey

    on h-Hemiregular Hemirings

    International Mathematical Forum

    Maiya Din, Ram Ratan, AK Bhateja

    Growth Oriented Talent Management in R&D Organizations

    IMS Noida,

    PR Mishra, Indivar Gupta, Navneet Gaba

    Cryptanalysis of Multilanguage Encryption Techniques

    Cryptologia Journal

    Sucheta Chakrabarti, Saibal K Pal, Sugata Gangopadhyay

    An Improved 3-Quasigroup based Encryption Scheme

    ICT Innovations 2012 Conference

    DhananjoyDey, Noopur Shrotriya, Indranath Sengupta

    R-Hash Function using Random Quradratic Polynomials over GF(2)

    International Journal of Computer Science and Information Technology (IJCSIT), Vol 4, No. 6, December 2012

    Maiya Din, AK Bhateja

    Multimedia Classification using ANN

    Soft Computing for Problem Solving

    GS Walia, Rajiv Kapoor

    Particle Filter Based on Cuckoo Search for non-linear State Estimation

    IEEE International Advance Computing Conference, IACC - 2013

    Year 2013

    PR Mishra, Indivar Gupta; Navneet Gaba

    Infinitude of Primes and its Applications

     

    Viacheslav A Artamonov, SuchtaChakrabarti, SugataGangopadhyay, Saibal K Pal

    On Polynomials complete finite quasigroups

    Quasigroup ad Related Systems Journal

    PR Mishra, Indivar Gupta, N Rajesh Pillai

    Non-Linearity and Affine Equivalence of Permutations and its Cryptographic Significance

     

    Manish Kant Dubey, Poonam Sarohe

    On 2-absorbing sub semi modules

    Quasigroup ad Related Systems Journal

    Manish Kant Dubey, Anuradha

    On Generalized Quasi-ideals and bi-ideals in ternary semigroups

    Journal of Mathematics and Applications

    Manish Kant Dubey, Anuradha

    A note on prime quasi-ideals in ternary semigings

    Kragujevac Journal of Mathematics

    GS Walia, Ankit Gupta, Rajiv Kapoor

    Intelligent Fire-detection model using statistical color models data fusion with Dezert-Smarandache method

    International Journal of Image and Data Fusion

    Praneesh Gupta, PR Mishra

    A New Method of Cryptography using Laplace Transform

    Soft Computing for Problem Solving

    Manish Kant Dubey, Ram Ratan, Neelam Verma, PK Saxena

    Cryptanalytic Attacks and their Counter Measures on RSA Cryptosystem

    Soft Computing for Problem Solving

    Girish Mishra, Sarvjeet Kaur

    System Identification for Classical Cryptosystems

    International Conference on Soft computing for Problem Solving

    Ram Ratan

    On Application of Genetic Algorithm in Cryptology

    International Conference on Soft computing for Problem Solving

    Manish Kant Dubey, Anuradha

    On quasi-ideals in Ternary Semirings

    International Conference on Computer Science, Haldia

    Pooja Yadav, Sarvjeet Kaur

    Language Identification and Correction in Corrupted Texts of Regional Indian Languages

    International Oriental COCOSDA - 2013 Conference

    Rajesh K. Asthana, Neelam Verma

    Generation of Cryptographically Strong Boolean Functions using Genetic Algorithm

    International Conference on Soft Computing for Problem Solving

    Hetal G Borisagar, Prasanna R Mishra, NavneetGaba

    A Method for k Error Linear Complexity Test for binary sequences

    International Conference on Soft Computing for Problem Solving

    Dr SuchetaChakrabarti,                                    Dr Saibal K. Pal

    On Increasing Key Space of Quasigroup Based Ciphers

    National Workshop on Cryptology 2013 (NWC-2013) at SAG

    Maiya Din, AK Bhateja

    Cryptanalysis of Geffie Generator using Genetic Algorithm

    International Conference on Soft Computing for Problem Solving

    Anand Sharma

    Technique for Blind Identification of Parameters of unknown Error Correcting Codes

    International Conference on Mathematics and Computing (ICMC - 2013)

    GS Walia, Rajiv Kapoor, Neelam Verma, S Arora

    A Robust Algorithm for Analysis of Intercepted Traffic under Highly Noisy Environment

    Defence Science Journal

    Anand Sharma, AK Sharma

    Blind Synchronization and Identification of unknown Cyclic error Correcting codes under Noisy Condition

    International Journal of Advanced Science &Technology / International Journal of Engg Research & Tech / Defence Science Journal / International Journal of Computer Applications

    Sushma Verma, SK Muttoo, Saibal K Pal

    Lightweight Encryption for securing data at rest on Android

    IEEE International Conference - 2014

    Year 2014

    GS Walia, Rajiv Kapoor

    Human Detection in Video and Images - A State of Art Survey

    International Journal of Pattern Recognition and Artificial Intelligence, Impact Factor 0.7

    GS Walia, Rajiv Kapoor

    Intelligent Video Tracking using Evolutionary Particle Filter based upon Improved Cuckoo Search

    International Journal Expert Systems with Applications, Elsevier, Science Direct, Impact Factor 2.339

    Neha Goel, Indivar Gupta, Manish Kant Dubey

    Digital Signature Scheme over Non-abelian Group

    International Conference on Mathematics and Computing (ICMC - 2014)

    Manish Kant Dubey, Pakhi Aggarwal

    On 2-absorbing sub-modules over commutative rings

    Journal of Mathematics

    Manish Kant Dubey, Poonam Sarohe

    Generalizations of Prime Sub-semi-modules

    South East Asian Bulletin of Mathematics of 2014

    Pratibha Kumar, Manish Kant Dubey, Poonam Sarohe

    Some results on 2-absorbing ideals in commutative semirings.

    Journal of Mathematics and Applications

    Gireesh Pandey,
    Dr.Saibal K Pal

    Integer Factorization using Number Field Sieve

    Investigations in Mathematical Sciences
    Journal of Mathematical Sciences & Cryptology

    Archajain, Ashokbhateja and Kanika Bhagchandani

    Construction of Polynomial over Finite Field

    IEEE Conference on Electrical, Electronics and Computer Science(SCEECS) 

    Ashok K Bhateja,Shantanu Chaudhary PK Saxena

    A Robust Online Signature based Cryptosystem

    14th International Conference on Frontier in Handwriting Recognition(ICHFR-2014),Crete Greece

    A. Tandon and S.K.Pal

    Designing Smart Nations

    Accepted in the Third International Conference on Smart System,Devices & Technology, France, 2014

    Girish Mishra and Sarvjeet Kaur

    Cryptanalysis of Transposition Cipher Using Hill Climbing and Simulated Annealing

    Accepted in International Conference SocPros 2014

    M.Mishra, U.Chaturvedi and S.K.Pal

    A Multithreaded Bond Varying Chaotic Firefly for Prime Factorization

    Proceeding of IEEE Advance Computing Conference,2014,IEEE Xplore,pp 1322-1325

    N.Chaudhary and S.K Pal

    Bitcoin and Analysis of its Cryptographic Primitives

    INROADS Special Issue Vol 3 No.1, 2014, pp307-312

    Praitbhakumar, Manish K. Dubey and Poonam Sarhoe

    On 2-absorbing Ideal and Weakly 2-absorbing Ideals in Primary Ideals in Commutative Semirings

    Accepted for Publication in European journal of Pure and Applied Mathematics

    Rajesh Asthana,Annad Sharma, Ram Ratan and Neelam Verma

    Classification of Error Correcting Coded Data using Multidimensional Feature Vectors

    Accepted in International Conference SocPros 2014

    Rajesh Asthana, Ram Ratan and Neelam Verma

    Generation of Boolean Functions using Genetic Algorithm for Cryptographic Applications

    Proceeding of IEEE International Conference,IACC 2014,IEEE Xplore,pp 1360-1365

    R.Kumar,S.K Pal, Arvind

    Optimal Priring and Design Pairing Friendly Curves

    INROADS Special Issue Vol 3 No.1, 2014, pp313-318

    R.Kumar,S.K Pal, Arvind

    Design of Identity Based Cryptographic Scheme from Pairing

    Accepted in publication in American Journal of Mathematics and Sciences, 2014

    S.Dhall, SK Pal and K Sharma

    New Primitives for Multimedia Encryption using Chaos, Concept of Rough Sets and Rule Based Decision Making

    International Conference of Mathematician-Mathematical Aspects of Computer Science, Seoul, Korea, 2014

    S.Dhall, SK Pal and K Sharma

    New Lightweight Conditional Scheme for Multimedia

    Proceeding of 3rd International Conference on Soft Computing for problem solving, Advance in Intelligent System and Computing, 258, Springer, 2014

    Sanjay Kumar and SK Pal

    Genetic Attack on elliptic curve discrete log problem

    Accepted in publication in American Journal of Mathematics and Sciences, 2014

    Sanjay Kumar , SK Pal and A Kumar

    Cryptographic scheme based on elliptic curve over integer rings

    INROADS special issue vol 3 no. 1, 2014, pp 319-322

    Sanjay Kumar , SK Pal and A Kumar

    Design and Implementation of ECC using koblitz and ElGamal method

    Proceedings of International Conference on innovative advancement in engineering and technology, Mar 2014, Jaipur

    SK Pal, P Sardana and A Sardana

    Efficient search on encrypted data using bloom filter

    Proceedings of the International Conference on Computing sustainable global development (INDIA Comm),2014,IEEE Xplore

    S.Verma,S.K Pal and S.K Mutto

    A new tools for Lightweight encryption on Android

    Proceeding of the IEEE advance Computing Conferece,2014,IEEE Xplore, pp 306-311

    Year 2015

    Manish Kant Dubey, Poonam Sarohe,

    On 2-absoring Primary Subsemimodules over Commutative Semirings

    BulletinulAcademie De Stiinte A Republica Moldova, Mathematica

    P R Mishra, Indivar Gupta, Navneet gaba

    Distribution of primitive Polynomials with Respect to Their weight

    International Conference on Mathematics and Computing, ICMC

    Pratibha Kumar, Manish Kant Dubey, Poonam Sarohe

    Some results on 2-absorbing ideals in commutative semirings.

    Journal of Mathematics and Applications

    Rajesh Asthana, Ram Ratan and Neelam Verma

    Classification of Corrupted Text and Speech Using Projection Pursuit Technique

    IEEE International Conference - 2015

    Akash Gupta, SP Mishra, BM Suri

    Differential Power Attack on trivium Implemented on FPGA

    Soft Computing for Problem Solving (SocProS-2015)

    Manoj Kumr, Saibal K Pal, Anupama Panigrahi

    On the security of Extended Generalized Feistel Networks

    IACR e-Print Archive/Information Processing letters / International Journal

    Manish Kant Dubey, Pakhi Aggarwal

    On 2-absorbing submodules over commutative rings

    Journal of Mathematics

    Manish Kant Dubey, Pakhi Aggarwal

    On 2-absoring Primary Submodules of Modules over Commutative Rings with Unity

    Asian European Journal of mathematics

    Susil Kumar Bishoi, Himanshu K Haran, Sartajul Hasan

    Construction of Efficient Multiple-recursive Matrix Method for Generating Pseudorandom Vectors

    Indocrypt 2015

    Manish Kant Dubey, Pakhi Aggarwal

    On n-absoring Primary Submodules of Modules over Commutative Rings

    BeitrageZur Algebra and Geometrie/ Contribution to Algebra and Geometry

    Neha  Goel, Indivar Gupta, B K Dass

    Survey of SAP and its Application in Public Key Cryptography

    Journal of Mathematical Cryptology

    Manish Kant Dubey, Poonam Sarohe

    Generalisation of Prime and Prime Ideals in Semirings

    South East Asian Bulletin of Mathematics of 2015

    Richa Tyagi, Naveen Kumar Sharma, Kamini Malhotra

    Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad-hoc Networks

    CSI Gulden Jubilee Annual Convention, New Delhi

    Ambrish Awasthi, RK Sharma

    Primitive Transformation Shift Registers of Order Two over Fields of Characteristic Two

    Design Codes & Cryptography

    A K Bhateja, Aditi Bhateja, Shantanu Chaudhary & P K Saxena

    Cryptanalysis of Vigenere cipher using Cuckoo Search

    International Journal, Elevier Applied Soft Computing

    M K Dubey, Poonam  Sarohe

    on (n-1,n)-Phi--prime ideals in Commutative semirings

    International Journal, Mathematics Vesnik

    2016

    A K Bhateja, Shikhar Sharma, Shantanu Chaudhary & Nitin Agarwal

    Iris Recognisation based on Sparse Representation and K-nearest subspace with Genetic Algorithm

    International Journal Elevier Pattern Recognisation Letter

    Neha Goel, Indivar Gupta & B K Dass

    Provably Secure  Zero Knowledge Undeniable Signature Scheme over Non-abelian Group

    International Journal of Pure   & Applied Mathematics

    Neha Goel, Indiver Gupta, B K Dass

    Computational Hard Problem in Periodic Monoids and Its Applications to Cryptography

    International Journal of Algebra and Computation

    Gajraj Kuldeep, Devendra Kumar Yadav, A K Sharma

    Weakness in Hadmard Based Symmetric Key  Encryption Scheme

    Journal of Applied Mathematics & Bio-Informatics

    Maiya Din, Anjali Jain

    Applying Cuckoo Search for Analysis of LFSR Based Cryptosystem

    International Conference, ICEMS 2016

    Anand Sharma, Dr N Rajesh Pillai

    Blind Recognition of Parameters of Linear Block Codes from Intercepted Bit Stream

    International conference on Computing Communication and Automation (ICCCA 2016)

    Yogesh Kumar, PR Mishra, N R Pillai, R K Sharma

    On Non-Linearity and Affine Equivalence of Permutations over an Arbitrary Finite Commutative Ring with unity

    Communication in Algebra

    Neha Goel, Indivar Gupta, B K Das

    Zero Knowledge Undeniable Signature Scheme over Semigroup Action Problem

    Italian Journal of Pure and Applied Mathematics

    Arvind Kumar Singh, SP Mishra, BM Suri, Anu Khosla

    Application of Signal Processing to Optimize EM Attack on AES running on FPGA

    International Conference on Communication and Computing System

    Sartaj Ul hasan, Daniel Panario & Qiang Wang

    Tweaked Transformation Shift Registers

    International Conference on "Sequences and their application (SETA) 2016

    Tarun Yadav, KoustavSadhukhan, Rao Arvind Mallari

    Approximation Algorithm for N-Distance Vertex Cover Problem

    International Conference on Contemporary Computing (IC3), 2016

    Sanchit Gupta, Harshit Sharma, Sarvjeet Kaur

    Malware Characterization using Windows API Call Sequences

    International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016)

    M K Dubey, Navneet Gaba, S SBedi

    FASER 128 and Its Countermeasure

    International Conference ICMC, Haldia

    M K Dubey, NavneetGaba, S SBedi

    Cryptanalysis of FASER 256

    IET Information Theory

    Sushma Verma, SK Muttoo

    An Android Malware Detection Framework Based on Permissions and Intents

    Defence Science Journal

    Dhananjoy Dey, Manoj Kumar, KhushbooBassi, BK Dass

    Neeva: A Lightweight Hash Function

    Defence Science Journal

    Manoj Kumar, DhananjoyDey, SK Pal, AnupamaPanigarahi

    HeW: A Hash Function Based on Lightweight Block Cipher FeW

    Defence Science Journal

    Manish Kant Dubey, Poonam Sarohe

    Generalizations of Prime Subsemimodules

    South East Asian Bulletin of Mathematics

    Manish Kant Dubey, Poonam Sarohe and Pratibha Kumar

    on 2-absoring and weekly 2-oabsoring primary ideals in Commutative semirings

    European Journal of Pure and Applied Mathematics

    Neha Goel, Indivar Gupta,M K Dubey& B K Dass

    Undeniable Signature Scheme over Group Ring

    Applicable Algebra in Engineering Communication and Computing

    Santu Pal, Saibal K Pal

    A Novel Key Exchange and Encryption Scheme using Companion Matrix

    International Conference on Recent Trends in Engineering and Material Sciences (ICEMS-2016)

    Smaranika Dasgupta, Saibal  K Pal

    Design of a Polynomial Ring Based Symmetric Homomorphic Encryption Scheme

    International Conference on Recent Trends in Engineering and Material Sciences (ICEMS-2016)

    A Kaushal, Chavan, Indivar Gupta, D B Kulkarani

    A Review on Solving ECDLP over Large Finite Field Using Parallel Pollard's Rho method

    IOSR Journal of Computer Engg

    Harish Kumar Sahu, Indivar Gupta, N Rajesh Pillai, R K Sharma

    BDD based Cryptanalysis of Stream Cipher- A practical approach

    IET Information Theory

    Prateek Yadav, Indivar Gupta & S K Murthy

    Study and Analysis of ESTREAM Cipher Salsa and ChaCha

    International Conference on Engineering and Technology

    AK Bhateja

    Cache Optimized Solution for Sparse Linear System over Large Order Finite Fields

    IICMC 2017, Haldia

    Pratibha Kumar, M K Dubey, Poonam Sarohe

    On 2-absorbing ideals in commutative semirings

    Quasigroups and Related Systems

    2017

    Manoj Kumar, Pratibha Yadav, SK Pal, AnupamaPanigrahi

    Secure and Efficient Diffusion Layers for Block Ciphers

    Defence Science Journal

    Yogesh Kumar,  Dr P R Mishra, Prof R K Sharma

    Non-linearity of k-cycle Permutations on Zn

    Journal of Discrete Mathematics

    Yogesh  Kumar, P R Mishra, Nupur Gupta, R K Sharma

    Differential ϭ-  uniformity and non-linearity of permutation over Zn

    Group Complexity and Cryptography

    Yogesh Kumar, Dr P R Mishra, Prof R K Sharma

    A New Class of Differential 4-Uniform Permutation from Exponential permutation

    Journal of Discrete Mathematics

    Maiya Din, Dr S K Pal, Dr S K Muttoo

    A Review of Computational Swarm Intelligence Techniques for Solving Crypto Problems

    International Journal of System Assurance Engg.

    Manoj Kumar, TS Suresh, Anupama Panigrahi

    Optimal Differential Trails in Lightweight Block Ciphers ANU and PICO

    Cryptologia

    P R Mishra, Yogesh Kumar, R K Sharma

    Inversion Permutation on Z(p^2) and Its Properties

    SIAM Journal Applied Algebra & Geometry

    Arvind Kumar Singh, BM Suri and SP Mishra

    VHDL Implementation of AES with Random Delay to Resist the Power Attack and to Confuse with DES

    National Conference on Information Technology, Electronics and Management, NCITEM-2017

    Shruti Rawal, S K Pal

    Hybrid Parallel Solution of Large Sparse Linear System of Equation over GF(2)

    International Conference HiPC-2017

    Devendra Kumar Yadav, Gajrajkuldeep, S D Joshi

    Ramanujan Sums as Derivatives and Applications

    IEEE Signal Processing Letters

    Devendra Kumar Yadav, Gajraj Kuldeep, S D Joshi

    Orthogonal Ramanujan Sums, Its Properties and Applications in Multiresolution Analysis

    IEEE Transaction on Signal Analysis

    Maiya Din, Dr S K Pal, Dr S K Muttoo

    A Review of Computational Swarm Intelligence Techniques for Solving Crypto Problems

    Soft Computing: Theories & Applications (SoSCTA-2017)

    Arvind Kumar, P R Mishra, S K Pal

    A Heuristic Approach Toward Variability of HC- 128

    Defence Science Journal

    Girish Mishra, Meenakshi Shenoy, Somanchi K Murthy

    Machine Learning Based Identification of regional Indian Language

    Defence Science Journal

    Prashant Verma, Indivar Gupta & NVIDIA team

    GPU-Accelerated Scalable Solver for Large Linear System over Finite Fields

    GPU Technology Conference at Silicon Valley 26-29 March 2018

    Manoj Kumar Singh, Dr Indivar Gupta, Dr Abhay Kumar Singh, Pooja Mishra

    Construction of Dual Cyclic Codes over F2[u,v]/ <u2,v2-v,uv-vu> for DNA Computation

    Defence Science Journal

    Rakesh Kumar Sahu, Narendra S Chaudhari

    Algorithm for Reliability Estimation of Leaf Routing Protocol of Mobile Adhoc network

    Defence Science Journal

    SidheshwarMukhede, Anmol Prakash, Maiya Din

    Identification of Hindi Plain text using Artificial neural Network

    INTL Conference on Harmony Search Soft Computing and Application

    Maiya Din, Dr S K Pal, Dr S K Muttoo

    Applying PSO Based Techniques for Analysis of Geffe Generator Cryptosystem

    INTL Conference on Harmony Search Soft Computing and Application

    .
    .
    .
    .
    Top