Multi-stage multi-secret sharing scheme for hierarchical access structure A Basit, NC Kumar, VC Venkaiah, SA Moiz, AN Tentu, W Naik 2017 International Conference on Computing, Communication and Automation …, 2017 | 33 | 2017 |
Sequential secret sharing scheme based on Chinese remainder theorem N Singh, AN Tentu, A Basit, VC Venkaiah 2016 IEEE International Conference on Computational Intelligence and …, 2016 | 22 | 2016 |
Ideal and perfect hierarchical secret sharing schemes based on mds codes AN Tentu, P Paul, VC Venkaiah Cryptology ePrint Archive, 2013 | 16 | 2013 |
Conjunctive hierarchical secret sharing scheme based on MDS codes AN Tentu, P Paul, CV Vadlamudi Combinatorial Algorithms: 24th International Workshop, IWOCA 2013, Rouen …, 2013 | 16 | 2013 |
CRT based multi-secret sharing schemes: revisited AN Tentu, VC Venkaiah, VK Prasad International Journal of Security and Networks 13 (1), 1-9, 2018 | 15 | 2018 |
Reusable multi-stage multi-secret sharing schemes based on CRT A Endurthi, OB Chanu, AN Tentu, VC Venkaiah Journal of Communications Software and Systems 11 (1), 15-24, 2015 | 15 | 2015 |
Computationally perfect compartmented secret sharing schemes based on MDS codes AN Tentu, P Paul, VC Venkaiah International Journal of Trust Management in Computing and Communications 2 …, 2014 | 13 | 2014 |
Authenticated key agreement scheme for IoT networks exploiting lightweight linear algebraic computations A Singh, V Tiwari, AN Tentu International Journal of Information Technology 15 (4), 1803-1811, 2023 | 12 | 2023 |
Sequential Secret Sharing Scheme Based on Level Ordered Access Structure. DK Pattipati, AN Tentu, VC Venkaiah, AA Rao Int. J. Netw. Secur. 18 (5), 874-881, 2016 | 12 | 2016 |
Multi-secret sharing scheme for level-ordered access structures AN Tentu, A Basit, K Bhavani, VC Venkaiah Number-Theoretic Methods in Cryptology: First International Conference …, 2018 | 11 | 2018 |
Multi-level secret sharing scheme for mobile ad-hoc networks PVS Kumar, RR Kurra, AN Tentu, G Padmavathi International Journal of Advanced Networking and Applications 6 (2), 2253, 2014 | 10 | 2014 |
A dynamic key management paradigm for secure wireless ad hoc network communications A Singh, AN Tentu, VC Venkaiah International Journal of Information and Computer Security 14 (3-4), 380-402, 2021 | 9 | 2021 |
A machine vision attack model on image based captchas challenge: Large scale evaluation A Singh, V Tiwari, AN Tentu Security, Privacy, and Applied Cryptography Engineering: 8th International …, 2018 | 9 | 2018 |
Multi-stage multi-secret sharing schemes based on Chinese remainder theorem OB Chanu, AN Tentu, VC Venkaiah Proceedings of the 2015 International Conference on Advanced Research in …, 2015 | 9 | 2015 |
Sequential (t, n) multi secret sharing scheme for level-ordered access structure AN Tentu, K Bhavani, A Basit, VC Venkaiah International Journal of Information Technology 13, 2265-2275, 2021 | 8 | 2021 |
A review on evolution of symmetric key block ciphers and their applications AN Tentu IETE Journal of Education 61 (1), 34-46, 2020 | 8 | 2020 |
McEliece cryptosystem: simulation and security vulnerabilities R Kumar, AS Naidu, A Singh, AN Tentu International Journal of Computing Science and Mathematics 12 (1), 64-81, 2020 | 7 | 2020 |
New secret sharing scheme for multipartite access structures with threshold changeability AN Tentu, B Mahapatra, VC Venkaiah, VK Prasad 2015 International Conference on Advances in Computing, Communications and …, 2015 | 6 | 2015 |
State Transition Analysis of GSM Encryption Algorithm A5/1 PK Gundaram, AN Tentu, SN Allu Journal of Communications Software and Systems 18 (1), 36-41, 2022 | 5 | 2022 |
Cryptanalysis of a Group Key Transfer Protocol: Generalization and Countermeasures. AN Tentu, K Raju, V Venkaiah Journal of Combinatorics & System Sciences 44, 2019 | 5 | 2019 |