关注
PADMAVATHY R
PADMAVATHY R
Assistant profeaaor
在 nitw.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Anion assisted supramolecular self-assemblies of succinate and malate adducts: crystal structures and theoretical modelling
R Padmavathy, N Karthikeyan, D Sathya, R Jagan, RM Kumar, ...
RSC advances 6 (72), 68468-68484, 2016
162016
An improved fast and secure hash algorithm
S Agarwal, A Rungta, R Padmavathy, M Shankar, N Rajan
Journal of Information Processing Systems 8 (1), 119-132, 2012
152012
Discrete logarithm problem using index calculus method
R Padmavathy, C Bhagvati
Mathematical and computer modelling 55 (1-2), 161-169, 2012
122012
Methods to solve discrete logarithm problem for ephemeral keys
R Padmavathy, C Bhagvati
2009 International Conference on Advances in Recent Technologies in …, 2009
82009
Improved three party EKE protocol
R Padmavathy
Information Technology and control 39 (3), 2010
62010
Crystal structure, DFT study, hirshfeld surface and PIXEL energy calculations of benzimidazolium and hexadecylaminium hydrogen maleate salts
R Padmavathy, N Karthikeyan, D Sathya, R Jagan, RM Kumar, ...
Journal of Molecular Structure 1136, 144-156, 2017
52017
A Small Subgroup Attack for Recovering Ephemeral Keys in Chang and Chang Password Key Exchange Protocol.
R Padmavathy, C Bhagvati
J. Comput. 6 (4), 805-811, 2011
52011
A Key Recovery Attack on Chang-Chang Password Key Exchange Protocol
R Padmavathy, C Bhagvati
Computer And Network Technology, 176-181, 2010
52010
Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'
S Tallapally, R Padmavathy
Journal of Information processing systems 6 (1), 43-52, 2010
42010
Improved analysis on Chang and Chang Password Key Exchange Protocol
R Padmavathy, T Shirisha, M Rajkumar, J Gyani
2009 International Conference on Advances in Computing, Control, and …, 2009
42009
Secured Cloud Communication Using Lightweight Hash Authentication with PUF.
R Padmavathy, MN Rajkumar
Computer Systems Science & Engineering 43 (1), 2022
32022
Secure exchange and incentivised collaboration of machine learning models and datasets using blockchain
JJ D'souza, R Padmavathy, A Dayal, H Gnanaveni, S Ponnada
International Journal of Information and Computer Security 19 (3-4), 443-462, 2022
32022
An authenticated keyword searchable conditional proxy re-encryption scheme in cloud services
A Swarnakar, CJ Babu, R Padmavathy, R Kumar
2020 5th International Conference on Computing, Communication and Security …, 2020
32020
Reversible data hiding using prior pixel pairs in two-dimensional histogram with tri-directional modification of difference histogram
A Pinapati, R Padmavathy
IETE Technical Review, 2019
32019
N—H⋯ O, O—H⋯ O hydrogen-bonded supramolecular sheet formation in the bis (2-aminoanilinium) fumarate, 3-methylanilinium hydrogen fumarate and 4-chloroanilinium hydrogen …
D Sathya, R Jagan, R Padmavathy, RM Kumar, K Sivakumar
Acta Crystallographica Section C: Crystal Structure Communications 69 (8 …, 2013
32013
Block Lanczos to Solve Integer Factorization Problem Using GPU’s
H Malla, V SantKaustubh, R Ganesh
Advances in Computer Science and Information Technology. Networks and …, 2012
32012
Ephemeral key recovery using index calculus method
R Padmavathy, C Bhagvati
Journal of Discrete Mathematical Sciences and Cryptography 13 (1), 29-43, 2010
32010
Secure and lightweight authentication protocol for anonymous data access in cloud assisted iot system
V Mahor, R Padmavathy, S Chatterjee
Peer-to-Peer Networking and Applications 17 (1), 321-336, 2024
22024
Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption from Module-LWE for Cloud Storage
G Sravya, PS Kumar, R Padmavathy
2023 IEEE 16th International Conference on Cloud Computing (CLOUD), 554-556, 2023
22023
A Deep Learning Framework to Preserve Privacy in Federated (Collaborative) Learning
S Ganesh, C Dheeraj, R Padmavathy
Artificial Intelligence for Cyber Security: Methods, Issues and Possible …, 2021
22021
系统目前无法执行此操作,请稍后再试。
文章 1–20