Hash‐One: a lightweight cryptographic hash function P Megha Mukundan, S Manayankath, C Srinivasan, M Sethumadhavan IET Information Security 10 (5), 225-231, 2016 | 58 | 2016 |
Healthcare security using blockchain for pharmacogenomics KN Abraham Misha, Hima Vyshnavi, Chungath Srinivasan Journal of International Pharmaceutical Research 46, 529-533, 2019 | 23 | 2019 |
Cube attack on stream ciphers using a modified linearity test C Srinivasan, UU Pillai, KV Lakshmy, M Sethumadhavan Journal of Discrete Mathematical Sciences and Cryptography 18 (3), 301-311, 2015 | 13 | 2015 |
White-box cryptography based data encryption-decryption scheme for iot environment A Saha, C Srinivasan 2019 5th International Conference on Advanced Computing & Communication …, 2019 | 11 | 2019 |
Complex texture features for glaucomatous image classification system using fundus images C Srinivasan, S Dubey, TR Ganeshbabu International Journal of Engineering Research & Science 2 (12), 106-113, 2016 | 9 | 2016 |
Measuring diffusion in stream ciphers using statistical testing methods C Srinivasan, KV Lakshmy, M Sethumadhavan Defence Science Journal 62 (1), 6, 2012 | 9 | 2012 |
XUBA: An authenticated encryption scheme R Neethu, M Sindhu, C Srinivasan Data Engineering and Intelligent Computing: Proceedings of IC3T 2016, 647-655, 2018 | 7 | 2018 |
Analysis of algebraic attack on Trivium and minute modification to Trivium AS Raj, C Srinivasan Advances in Network Security and Applications: 4th International Conference …, 2011 | 7 | 2011 |
A secure protocol for the delivery of firmware updates over the air in iot devices K Sowmya, C Srinivasan, KV Lakshmy, T Kumar Bansal Soft Computing and Signal Processing: Proceedings of 3rd ICSCSP 2020, Volume …, 2021 | 5 | 2021 |
Analysis of sponge function based authenticated encryption schemes LR Krishnan, M Sindhu, C Srinivasan 2017 4th International Conference on Advanced Computing and Communication …, 2017 | 5 | 2017 |
Clean technologies for optimization of solid waste management in village of Majerdari, West Bengal P Jyothi Swaroop, KS Praveen Kumar, R Reddy, V Purushotham, ... ICDSMLA 2019: Proceedings of the 1st International Conference on Data …, 2020 | 4 | 2020 |
A quasigroup based synchronous stream cipher for lightweight applications S Lakshmi, C Srinivasan, KV Lakshmy, M Sindhu Security in Computing and Communications: 5th International Symposium, SSCC …, 2017 | 4 | 2017 |
Decrypting shared encrypted data files stored in a cloud using dynamic key aggregation M James, C Srinivasan, KV Lakshmy, M Sethumadhavan Computational Intelligence, Cyber Security and Computational Models …, 2016 | 4 | 2016 |
On the Statistical Analysis of ZUC, Espresso and Grain v1 S Shrivastava, KV Lakshmy, C Srinivasan International Journal of Computing 20 (3), 384-390, 2021 | 3 | 2021 |
Enabling multi-factor authentication and verification in searchable encryption SD Panguluri, KV Lakshmy, C Srinivasan International Conference on Micro-Electronics and Telecommunication …, 2021 | 3 | 2021 |
Panther: a sponge based lightweight authenticated encryption scheme KVL Bhargavi, C Srinivasan, KV Lakshmy Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021 | 3 | 2021 |
Matrix Lie group as an algebraic structure for NTRU like cryptosystem PM Sree Parvathi, C Srinivasan Journal of Discrete Mathematical Sciences and Cryptography 23 (7), 1455-1464, 2020 | 3 | 2020 |
An algorithm for k-error joint linear complexity of binary multisequences M Sethumadhavan, M Sindhu, C Srinivasan, C Kavitha Journal of Discrete Mathematical Sciences and Cryptography 11 (3), 297-304, 2008 | 3 | 2008 |
Design and implementation of the protocol for secure software-based remote attestation in IoT devices MAA Shriny, C Srinivasan Soft Computing and Signal Processing: Proceedings of 2nd ICSCSP 2019 1118, 189, 2020 | 2 | 2020 |
An Algorithm for Constructing Support of Bent Functions by Extending a Set J Nelson, C Srinivasan, KV Lakshmy International Journal of Mathematical, Engineering and Management Sciences 8 …, 2023 | 1 | 2023 |