Development of many Software Packages based on advanced mathematical techniques such as
- Boolean function
- Binary sequence
- Algebraic concepts - Universal algebra and finite fields
- Artificial Intelligence & ANN
- Pattern Recognition and Clustering
- Genetic Algorithms
- Development of tools and techniques for speech recognition, coding and digital/analog speech analysis.
- Designing and development of electronic hardware and PC based cards for communication .
- Creation of Infrastructure - H/V/UHF and microwave communication and analysis post.
Development of Cyber Security Tools
- USB-Authorization Controller Engine (USB-ACE)
- Secure File/Folder Deletion Tool (SWIPE)
- Automated File Integrity Testing Tool (AFITT)
- Development of tools for Malware Analysis
- Development of framework for Network Security Assessment
Research Papers
Year 2009
Authors | Title | Presented / Published in |
---|---|---|
Kamini Malhotra Anu Khosla | GMM based Identification of Regional Indian Languages from Spoken Utterances | 4th Indian International Conference on Artificial Intelligence |
PK Saxena Pratibha Yadav, Girish Mishra | Index of Gabledness for Automatic Identification of Plain English Texts | Defence Science Journal |
MK Dubey | A note on Quasi k-ideals and Bi k-ideals in Ternary Semi rings | Italian Journal of Pure and Applied Mathematics |
Ram Ratan | Key Independent Retrieval of Chaotic Encrypted Images | International Conference on Pattern Recognition and Machine Intelligence(PReMI) PReMI 2009, LNCS 5909, pp 483-488 |
Mahesh Chander | A review on Green Buildings in Indian Perspective | Silver Jubilee Souvenir of CCE Secunderbad |
Year 2010
Authors | Title | Presented / Published in |
---|---|---|
Ram Ratan | Retrieval of Graphically Encrypted Images | Pacific Asia Conference on Knowledge Discovery and Data Mining 2010 |
Girish Mishra Sohan Lal Nitharwal Sarvjeet Kaur | Language Identification using Fuzzy - SVM Technique | International Conference on Computing, Communication & Network Technologies |
Indivar Gupta Dr. PK Saxena | Distributed Signcryption Schemes from Pairing | International Conference |
SK Bhambri Manish Kant Dubey | Exact, Proper Exact Sequences and Projective Semimodules | International Journal of Algebra |
Manoj Kumar, Pratibha Yadav , MeenaKumari | Flaws in Differential Cryptanalysis of Reduced Round PRESENT | Cryptology ePrint Archive |
Indivar Gupta, PK Saxena | Distributed Signcryption from Pairing | IWSEC 2010, Kobe, Japan |
SK Pal, Shivam Kapoor | Securing Digital Information using Quasigroups | IJCNS - 2010 |
SK Bhambri, Manish Kant Dubey | On Commutative Diagrams of semimodules and k-projective semimodules | Journal of the Indian Mathematical Society |
MK Dubey | A Note on P-regular semirings | Italian Journal of Pure and Applied Mathematics |
SK Pal Akanksha Jaiswal & Vibhanshu Chamoli | Quasigroup based Design of New Cryptography Schemes | ICMS-2010 |
Rajan Gupta & SK Pal | Key based Multimedia Encryption using Fibonacci Transform | ICMSA-2010 |
Rajan Gupta, Ankur Aggarwal & SK Pal | A New Secure and Efficient Multimedia Encryption Scheme | NCETCS - 2010 |
Navin Ketu & SK Pal | Homomorphic Encryption Schemes | ICM-2010 |
Nisha Goyal, Pallavi Nanda & SK Pal | Hard Problems in Lattice Based Cryptography | ICWM-2010 |
Nisha Goyal, Pallavi Nanda & SK Pal | Construction of Lattice based Cryptographic Schemes | ICM-2010 |
Navin Ketu & SK Pal | Elliptic Curve based Homomorphic Encryption | ICM-2010 |
Rajan Gupta & SK Pal | Properties of Cryptographic Applications of Fibonacci Numbers | ICM-2010 |
SK Pal Ravish Kumar & Dhruvesh Kumar | Public Key Cryptography using Multiple Hard Problems | ICM-2010 |
SK Pal &Umesh Kumar | Properties & Applications of Non-Polynomial Latin Squares | ICM-2010 |
SK Pal Shivam Kapoor Alka Arora, Reshu Chaudhary &Jatin Khurana | Design of Strong Cryptographic Schemes based on Latin Squares | JDMS&C |
Badal Saxena & SK Pal | Some New Concepts in Fuzzy Arithmetic | JDMS&C |
SK Pal Sarvesh Kumar Sarvajeet Kumar & Mukesh Vaidya | A Framework for Secure Communication using Hindi for Web based Mobile Applications | TSI Conference - 2010 |
S Dhall & SK Pal | Design of a New Block Cipher based on Conditional Encryption | ISISP - 2010 |
SK Pal Deekshita Bisht & AmolChandla | Design & Analysis of Scalable Encryption Schemes for Multimeida | Innovations and Advances in Communications Information and Network Security, Macmillan Advanced research Series 2010 |
Rajan Gupta, Ankur Aggarwal & SK Pal | New Shuffle Encrytpion Schemes for Scrambling digital Images | |
Adhar Mittal & SK Pal | Attacks on chaos based Encryption Schemes | |
SK Pal Rajeev Khandelwal & Manish Nandal | Design of Probabilistic Encryption Algorithms | AMS WS on Probability & Stats, Princeton New Jersey |
SK Pal AkankshaJaiswal & VibhanshuChamoli | New Quasigroup Generation Schemes for Cryptographic Applications | ICC - 2010 |
Girish Mishra Sarvjeet Kaur & Anil Uppal | Breaking Hill Cipher using a New Scoring Scheme | Cryptologia |
RichaTyagi & SuniataMaithani | A Hybrid Speech Enhancement System based on Wavelet Denoising | 13th Oriental COCOSDA 2010 |
N Rajesh Pillai, SS Bedi, Sanjay Kumar, Roopika Chaudhary | Relation for Algebraic Attack on E0 Combiner | eprint: Digital Cryptology Archieve, Paper No. 129 in 2010 |
Year 2011
Authors | Title | Presented / Published in |
---|---|---|
Ram Ratan | Lightweight Image Encryption Method using Inversion and Circular Shift Schemes | LightSec-2011 |
Gurjit Singh Walia Gajraj Kuldeep AK Sharma Rajiv Kapoor | An overview - FPGA Based Secure System | Advanced Communication Systems and Design Techniques, Haldia, WB |
PR Mishra Indivar Gupta NR Pillai | Generalised Avalanche Test for Stream Cipher Analysis | International Conference on Inforsec Hicom Net 2011 |
Yogesh Kumar Lather, N. Rajesh Pillai | Cryptanalysis of Bean a lightweight Stream Cipher | Security of Information and Networks |
Manish Kant Dubey Anuradha | On (m,pq),n)-Quasi-ideals in Ternary Semirings | International Journal of Pure and Applied Mathematics |
Arbind Kumar Singh | Efficient End Point Detection of a Spoken Word Recognition System | International Journal of Computer Science and System Analysis |
Dhananjoy Dey, Noopur Shrotriya, Indranath Sengupta | R-Hash Function using Random Polynomials over GF(2) | Journal of Systems and Software |
Yogesh Kumar | Algebraic Attack on BEAN - a Lightweight Stream Cipher | 4th International Conference on Security of Information Networks |
Ram Ratan | Securing Images using Inversion & Shifting | International Conference on Advances in Communication & Information Technology |
Gurjit Singh Walia Gajraj Kuldeep Ajaj Singh, Rajiv Kapoor | An effective model for earlier Detection of Fire in Video Sequences using Color Statistical Model | International Conference of Microwave, Antenna, Propagation and Remote Sensing |
Manish Kant Dubey | On minimal Bi-ideal in Ternary Semirings | International Jouranal of Algebra, Vol 6, 2012, no. 1,15-22 |
Arbind Kumar Singh, BM Suri | Automatic Detection of Push Peak from Acoustic Emanation of a Keyboard sing Majority Voting | International Conference on Signal Image and Video Processing (ICSIVP - 2012) |
Maiya Din, AK Bhateja | Impact of changing Dimensions of population in Developing India | Demographic Dividend of India |
Ram Ratan | Necessity of Appropriate Handling of Challenging Issues in Addition to Demographic Dividend for Developing India | Demographic Dividend of India |
Saibal K Pal, Akanksha Jaiswal &VibhanshuChamoli | Quasigroup Based Design of New Cryptographic Schemes | Aryabhatt Journal of Mathematics & Informatics, Vol 3, No. 2, Jul - Dec 2011, pp 277 - 294 |
JitinLuthra&Saibal K Pal | A Hybrid Firefly Algorithm using Genetic Operators for Cryptanalysis of Mon-alphabetic Substitution cipher | Proceedings of the World Congress on Information &Communication Technologies, 2011, pp 202 - 206. |
Rajan Gupta & Saibal K Pal | Key based Multimedia Encryption using Fibonacci Transform | Proceedings of the international Congress on Producttivity, Quality, Relability, Oprimization and Modeling (ICPQROM-2011) |
A Singh & Saibal K Pal | Hybrid Computational Intelligence Techniques in Intrusion Detection and Prevention System | International Journal of Elecronics & Computers, Vol 3, No.1, 2011, pp - 25-31 |
Saibal K Pal &PuneetSardana | Enterprise Cloud Computing in India : Challenges & Practical Solutions | Published in the book - IT for Business Excellence, Macmillan Advanced Research Series, Macmillan Publishers 2012, pp197-207 |
Saibal K Pal, Disha Gupta & Priyanka Kochhar | Design and Implementation of Smart Home Security Schemes. | Published in the book - IT for Business Excellence, Macmillan Advanced Research Series, Macmillan Publishers 2012, pp 232-246 |
Saibal K Pal , Trina Dey & Shruti Kamboj | Web 2.0 based Enterprise Solutions, Published in the book | IT for Business Excellence, Macmillan Advanced Research Series, Macmillan Publisher, 2012, pp 247-262 |
Rajan Gupta, Saibal K Pal & Pooja Gupta | An Efficient and Secure Chaotic Encryption Scheme for Multimedia | Proceedings of the International Conference on Advances in Modelling, Optimization and computing (AMOC-2011), IIT Roorkee, pp 990-999 |
Saibal K Pal, D Upadhyay& Nitin | Design of Practical & Efficient Homomorphic Encryption Schemes. | Proceedings of the International Conference on Advances in Modelling, Optimization and computing (AMOC-2011), IIT Roorkee, Dec 2011 |
Anjali Arora &Saibal K Pal | Design & Analysis of Tweak able Block Ciphers | National Workshop on Cryptology, CD Proceedings, Neemrana, Nov 2011 |
Dhananjoy Dey, Prasanna R Mishra, Indranath Sengupta | HF-hash: Hash Functions using Restricted HFE Challenge -1 | International Journal of Advanced Science & Technology |
Year 2012
Authors | Title | Presented / Published in |
---|---|---|
Manish Kant Dubey Anuradha | On (m,(p,q),n) bi-ideals in Ternary Semirings | Lobachevskii Journal of Mathematics (Springer) |
Gurjit Singh Walia, GajrajKuldeep, Rajiv Kapoor, AK Sharma, NavneetGaba | FPGA Based Secure System Design - an overview | International Journal of Soft computing and Engineering, ISSN:2231-2307, vol - 1, issue -6 |
Manish Kant Dubey | On minimal Bi-ideal in Ternary Semirings | International Journal of Algebra, Vol 6, 2012, No. 1,15 - 22 |
Anand Sharma, AK Sharma | Analysis of Enhanced CCK Modulation for Multipath Interference under Multi-user Environment | International Journal of Communications Network and system Sciences |
Rajiv Kapoor, Gurjit Singh Walia, Imran Arshad, Monika Tomar | Particle Filter Based on Biogeography Based Optimization for Non-linear State Estimation | 8th IEEE Colloquium of Signal Processing & Its Applications, Published by International Conference on Information, Computing & Telecommunications) |
Dhananjoy Dey, PR Mishra, Indranath Sengupta | GB-Hash Functions using Groebner Basis | International Journal of Modern Engineering research (IJMER), Vol 2, Issue 2, Mar-Apr 2012, pp 462-470 |
Gurpreet Kaur, Viydyavati S Nayak, Dhananjoy Dey, Saibal K Pal | Modified Grostl: An Efficient Hash Function, | CSIA - 2012, Advances in Intelligent and Soft Computing Book Series, Springer |
Vinay Verma, Rajeev Thaman | Secure Coding Practices for Information Security | Cyber Security Workshop, DIAT Pune |
Rachita Juneja, Vinod Kumar | Quorum based Distributed Mutual Exclusion Algorithms in Mobile Networks | International Journal of Computer Applications |
Manish Kant Dubey | Prime and Weakly Prime Ideals in Semirings, Quasigroups and related Systems | International Journal |
Gurpreet Kaur, Viydyavati S Nayak, DhananjoyDey, Saibal K Pal | Analysis of the Hash Functions - Modified Grostl | International Journal of Computer Applications, Vol 44, No. 21, May 2012 |
GS Gupta, Prof Tapash Ghoshal | Up Against the Odds - Successful Implementation of a project in a Govt R&D Orgn. : A case Study | "GROWTH" Journal of Management Training Institute, SAIL, Ranchi, Jan-Mar 2013 issue, pp 43 - 52 |
AK Bhateja, Maiya Din | ANN Based Distinguishing Attack on RC 4 Stream Cipher | International Conference on Bio-Implied Computing (BICTA) -2012 |
Manoj Kumar, Saibal K Pal, Pratibha Yadav | Mathematical Constructs of Lightweight Block Ciphers-A survey | International Conference on Mathematical Sciences and Applications |
Ashok K Bhateja, PK Saxena | Secure Cancellable Fingerprint Key Generation for symmetric Cipher system | ICVGIP 2012 |
MK Dubey | on h-Hemiregular Hemirings | International Mathematical Forum |
Maiya Din, Ram Ratan, AK Bhateja | Growth Oriented Talent Management in R&D Organizations | IMS Noida, |
PR Mishra, Indivar Gupta, Navneet Gaba | Cryptanalysis of Multilanguage Encryption Techniques | Cryptologia Journal |
Sucheta Chakrabarti, Saibal K Pal, Sugata Gangopadhyay | An Improved 3-Quasigroup based Encryption Scheme | ICT Innovations 2012 Conference |
DhananjoyDey, Noopur Shrotriya, Indranath Sengupta | R-Hash Function using Random Quradratic Polynomials over GF(2) | International Journal of Computer Science and Information Technology (IJCSIT), Vol 4, No. 6, December 2012 |
Maiya Din, AK Bhateja | Multimedia Classification using ANN | Soft Computing for Problem Solving |
GS Walia, Rajiv Kapoor | Particle Filter Based on Cuckoo Search for non-linear State Estimation | IEEE International Advance Computing Conference, IACC - 2013 |
Year 2013
Authors | Title | Presented / Published in |
---|---|---|
PR Mishra, Indivar Gupta; Navneet Gaba | Infinitude of Primes and its Applications | |
Viacheslav A Artamonov, SuchtaChakrabarti, SugataGangopadhyay, Saibal K Pal | On Polynomials complete finite quasigroups | Quasigroup ad Related Systems Journal |
PR Mishra, Indivar Gupta, N Rajesh Pillai | Non-Linearity and Affine Equivalence of Permutations and its Cryptographic Significance | |
Manish Kant Dubey, Poonam Sarohe | On 2-absorbing sub semi modules | Quasigroup ad Related Systems Journal |
Manish Kant Dubey, Anuradha | On Generalized Quasi-ideals and bi-ideals in ternary semigroups | Journal of Mathematics and Applications |
Manish Kant Dubey, Anuradha | A note on prime quasi-ideals in ternary semigings | Kragujevac Journal of Mathematics |
GS Walia, Ankit Gupta, Rajiv Kapoor | Intelligent Fire-detection model using statistical color models data fusion with Dezert-Smarandache method | International Journal of Image and Data Fusion |
Praneesh Gupta, PR Mishra | A New Method of Cryptography using Laplace Transform | Soft Computing for Problem Solving |
Manish Kant Dubey, Ram Ratan, Neelam Verma, PK Saxena | Cryptanalytic Attacks and their Counter Measures on RSA Cryptosystem | Soft Computing for Problem Solving |
Girish Mishra, Sarvjeet Kaur | System Identification for Classical Cryptosystems | International Conference on Soft computing for Problem Solving |
Ram Ratan | On Application of Genetic Algorithm in Cryptology | International Conference on Soft computing for Problem Solving |
Manish Kant Dubey, Anuradha | On quasi-ideals in Ternary Semirings | International Conference on Computer Science, Haldia |
Pooja Yadav, Sarvjeet Kaur | Language Identification and Correction in Corrupted Texts of Regional Indian Languages | International Oriental COCOSDA - 2013 Conference |
Rajesh K. Asthana, Neelam Verma | Generation of Cryptographically Strong Boolean Functions using Genetic Algorithm | International Conference on Soft Computing for Problem Solving |
Hetal G Borisagar, Prasanna R Mishra, NavneetGaba | A Method for k Error Linear Complexity Test for binary sequences | International Conference on Soft Computing for Problem Solving |
Dr Sucheta Chakrabarti, Dr Saibal K. Pal | On Increasing Key Space of Quasigroup Based Ciphers | National Workshop on Cryptology 2013 (NWC-2013) at SAG |
Maiya Din, AK Bhateja | Cryptanalysis of Geffie Generator using Genetic Algorithm | International Conference on Soft Computing for Problem Solving |
Anand Sharma | Technique for Blind Identification of Parameters of unknown Error Correcting Codes | International Conference on Mathematics and Computing (ICMC - 2013) |
GS Walia, Rajiv Kapoor, Neelam Verma, S Arora | A Robust Algorithm for Analysis of Intercepted Traffic under Highly Noisy Environment | Defence Science Journal |
Anand Sharma, AK Sharma | Blind Synchronization and Identification of unknown Cyclic error Correcting codes under Noisy Condition | International Journal of Advanced Science &Technology / International Journal of Engg Research & Tech / Defence Science Journal / International Journal of Computer Applications |
Sushma Verma, SK Muttoo, Saibal K Pal | Lightweight Encryption for securing data at rest on Android | IEEE International Conference - 2014 |
Year 2014
Authors | Title | Presented / Published in |
---|---|---|
GS Walia, Rajiv Kapoor | Human Detection in Video and Images - A State of Art Survey | International Journal of Pattern Recognition and Artificial Intelligence, Impact Factor 0.7 |
GS Walia, Rajiv Kapoor | Intelligent Video Tracking using Evolutionary Particle Filter based upon Improved Cuckoo Search | International Journal Expert Systems with Applications, Elsevier, Science Direct, Impact Factor 2.339 |
Neha Goel, Indivar Gupta, Manish Kant Dubey | Digital Signature Scheme over Non-abelian Group | International Conference on Mathematics and Computing (ICMC - 2014) |
Manish Kant Dubey, Pakhi Aggarwal | On 2-absorbing sub-modules over commutative rings | Journal of Mathematics |
Manish Kant Dubey, Poonam Sarohe | Generalizations of Prime Sub-semi-modules | South East Asian Bulletin of Mathematics of 2014 |
Pratibha Kumar, Manish Kant Dubey, Poonam Sarohe | Some results on 2-absorbing ideals in commutative semirings. | Journal of Mathematics and Applications |
Gireesh Pandey, Dr.Saibal K Pal | Integer Factorization using Number Field Sieve | Investigations in Mathematical Sciences Journal of Mathematical Sciences & Cryptology |
Archajain, Ashokbhateja and Kanika Bhagchandani | Construction of Polynomial over Finite Field | IEEE Conference on Electrical, Electronics and Computer Science(SCEECS) |
Ashok K Bhateja,Shantanu Chaudhary PK Saxena | A Robust Online Signature based Cryptosystem | 14th International Conference on Frontier in Handwriting Recognition(ICHFR-2014),Crete Greece |
A. Tandon and S.K.Pal | Designing Smart Nations | Accepted in the Third International Conference on Smart System,Devices & Technology, France, 2014 |
Girish Mishra and Sarvjeet Kaur | Cryptanalysis of Transposition Cipher Using Hill Climbing and Simulated Annealing | Accepted in International Conference SocPros 2014 |
M.Mishra, U.Chaturvedi and S.K.Pal | A Multithreaded Bond Varying Chaotic Firefly for Prime Factorization | Proceeding of IEEE Advance Computing Conference,2014,IEEE Xplore,pp 1322-1325 |
N.Chaudhary and S.K Pal | Bitcoin and Analysis of its Cryptographic Primitives | INROADS Special Issue Vol 3 No.1, 2014, pp307-312 |
Praitbhakumar, Manish K. Dubey and Poonam Sarhoe | On 2-absorbing Ideal and Weakly 2-absorbing Ideals in Primary Ideals in Commutative Semirings | Accepted for Publication in European journal of Pure and Applied Mathematics |
Rajesh Asthana,Annad Sharma, Ram Ratan and Neelam Verma | Classification of Error Correcting Coded Data using Multidimensional Feature Vectors | Accepted in International Conference SocPros 2014 |
Rajesh Asthana, Ram Ratan and Neelam Verma | Generation of Boolean Functions using Genetic Algorithm for Cryptographic Applications | Proceeding of IEEE International Conference,IACC 2014,IEEE Xplore,pp 1360-1365 |
R.Kumar,S.K Pal, Arvind | Optimal Priring and Design Pairing Friendly Curves | INROADS Special Issue Vol 3 No.1, 2014, pp313-318 |
R.Kumar,S.K Pal, Arvind | Design of Identity Based Cryptographic Scheme from Pairing | Accepted in publication in American Journal of Mathematics and Sciences, 2014 |
S.Dhall, SK Pal and K Sharma | New Primitives for Multimedia Encryption using Chaos, Concept of Rough Sets and Rule Based Decision Making | International Conference of Mathematician-Mathematical Aspects of Computer Science, Seoul, Korea, 2014 |
S.Dhall, SK Pal and K Sharma | New Lightweight Conditional Scheme for Multimedia | Proceeding of 3rd International Conference on Soft Computing for problem solving, Advance in Intelligent System and Computing, 258, Springer, 2014 |
Sanjay Kumar and SK Pal | Genetic Attack on elliptic curve discrete log problem | Accepted in publication in American Journal of Mathematics and Sciences, 2014 |
Sanjay Kumar , SK Pal and A Kumar | Cryptographic scheme based on elliptic curve over integer rings | INROADS special issue vol 3 no. 1, 2014, pp 319-322 |
Sanjay Kumar , SK Pal and A Kumar | Design and Implementation of ECC using koblitz and ElGamal method | Proceedings of International Conference on innovative advancement in engineering and technology, Mar 2014, Jaipur |
SK Pal, P Sardana and A Sardana | Efficient search on encrypted data using bloom filter | Proceedings of the International Conference on Computing sustainable global development (INDIA Comm),2014,IEEE Xplore |
S.Verma,S.K Pal and S.K Mutto | A new tools for Lightweight encryption on Android | Proceeding of the IEEE advance Computing Conferece,2014,IEEE Xplore, pp 306-311 |
Year 2015
Authors | Title | Presented / Published in |
---|---|---|
Manish Kant Dubey, Poonam Sarohe, | On 2-absoring Primary Subsemimodules over Commutative Semirings | BulletinulAcademie De Stiinte A Republica Moldova, Mathematica |
P R Mishra, Indivar Gupta, Navneet gaba | Distribution of primitive Polynomials with Respect to Their weight | International Conference on Mathematics and Computing, ICMC |
Pratibha Kumar, Manish Kant Dubey, Poonam Sarohe | Some results on 2-absorbing ideals in commutative semirings. | Journal of Mathematics and Applications |
Rajesh Asthana, Ram Ratan and Neelam Verma | Classification of Corrupted Text and Speech Using Projection Pursuit Technique | IEEE International Conference - 2015 |
Akash Gupta, SP Mishra, BM Suri | Differential Power Attack on trivium Implemented on FPGA | Soft Computing for Problem Solving (SocProS-2015) |
Manoj Kumr, Saibal K Pal, Anupama Panigrahi | On the security of Extended Generalized Feistel Networks | IACR e-Print Archive/Information Processing letters / International Journal |
Manish Kant Dubey, Pakhi Aggarwal | On 2-absorbing submodules over commutative rings | Journal of Mathematics |
Manish Kant Dubey, Pakhi Aggarwal | On 2-absoring Primary Submodules of Modules over Commutative Rings with Unity | Asian European Journal of mathematics |
Susil Kumar Bishoi, Himanshu K Haran, Sartajul Hasan | Construction of Efficient Multiple-recursive Matrix Method for Generating Pseudorandom Vectors | Indocrypt 2015 |
Manish Kant Dubey, Pakhi Aggarwal | On n-absoring Primary Submodules of Modules over Commutative Rings | BeitrageZur Algebra and Geometrie/ Contribution to Algebra and Geometry |
Neha Goel, Indivar Gupta, B K Dass | Survey of SAP and its Application in Public Key Cryptography | Journal of Mathematical Cryptology |
Manish Kant Dubey, Poonam Sarohe | Generalisation of Prime and Prime Ideals in Semirings | South East Asian Bulletin of Mathematics of 2015 |
Richa Tyagi, Naveen Kumar Sharma, Kamini Malhotra | Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad-hoc Networks | CSI Gulden Jubilee Annual Convention, New Delhi |
Ambrish Awasthi, RK Sharma | Primitive Transformation Shift Registers of Order Two over Fields of Characteristic Two | Design Codes & Cryptography |
A K Bhateja, Aditi Bhateja, Shantanu Chaudhary & P K Saxena | Cryptanalysis of Vigenere cipher using Cuckoo Search | International Journal, Elevier Applied Soft Computing |
M K Dubey, Poonam Sarohe | on (n-1,n)-Phi--prime ideals in Commutative semirings | International Journal, Mathematics Vesnik |
Year 2016
Authors | Title | Presented / Published in |
---|---|---|
A K Bhateja, Shikhar Sharma, Shantanu Chaudhary & Nitin Agarwal | Iris Recognisation based on Sparse Representation and K-nearest subspace with Genetic Algorithm | International Journal Elevier Pattern Recognisation Letter |
Neha Goel, Indivar Gupta & B K Dass | Provably Secure Zero Knowledge Undeniable Signature Scheme over Non-abelian Group | International Journal of Pure & Applied Mathematics |
Neha Goel, Indiver Gupta, B K Dass | Computational Hard Problem in Periodic Monoids and Its Applications to Cryptography | International Journal of Algebra and Computation |
Gajraj Kuldeep, Devendra Kumar Yadav, A K Sharma | Weakness in Hadmard Based Symmetric Key Encryption Scheme | Journal of Applied Mathematics & Bio-Informatics |
Maiya Din, Anjali Jain | Applying Cuckoo Search for Analysis of LFSR Based Cryptosystem | International Conference, ICEMS 2016 |
Anand Sharma, Dr N Rajesh Pillai | Blind Recognition of Parameters of Linear Block Codes from Intercepted Bit Stream | International conference on Computing Communication and Automation (ICCCA 2016) |
Yogesh Kumar, PR Mishra, N R Pillai, R K Sharma | On Non-Linearity and Affine Equivalence of Permutations over an Arbitrary Finite Commutative Ring with unity | Communication in Algebra |
Neha Goel, Indivar Gupta, B K Das | Zero Knowledge Undeniable Signature Scheme over Semigroup Action Problem | Italian Journal of Pure and Applied Mathematics |
Arvind Kumar Singh, SP Mishra, BM Suri, Anu Khosla | Application of Signal Processing to Optimize EM Attack on AES running on FPGA | International Conference on Communication and Computing System |
Sartaj Ul hasan, Daniel Panario & Qiang Wang | Tweaked Transformation Shift Registers | International Conference on "Sequences and their application (SETA) 2016 |
Tarun Yadav, KoustavSadhukhan, Rao Arvind Mallari | Approximation Algorithm for N-Distance Vertex Cover Problem | International Conference on Contemporary Computing (IC3), 2016 |
Sanchit Gupta, Harshit Sharma, Sarvjeet Kaur | Malware Characterization using Windows API Call Sequences | International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016) |
M K Dubey, Navneet Gaba, S SBedi | FASER 128 and Its Countermeasure | International Conference ICMC, Haldia |
M K Dubey, NavneetGaba, S SBedi | Cryptanalysis of FASER 256 | IET Information Theory |
Sushma Verma, SK Muttoo | An Android Malware Detection Framework Based on Permissions and Intents | Defence Science Journal |
Dhananjoy Dey, Manoj Kumar, KhushbooBassi, BK Dass | Neeva: A Lightweight Hash Function | Defence Science Journal |
Manoj Kumar, DhananjoyDey, SK Pal, AnupamaPanigarahi | HeW: A Hash Function Based on Lightweight Block Cipher FeW | Defence Science Journal |
Manish Kant Dubey, Poonam Sarohe | Generalizations of Prime Subsemimodules | South East Asian Bulletin of Mathematics |
Manish Kant Dubey, Poonam Sarohe and Pratibha Kumar | on 2-absoring and weekly 2-oabsoring primary ideals in Commutative semirings | European Journal of Pure and Applied Mathematics |
Neha Goel, Indivar Gupta,M K Dubey& B K Dass | Undeniable Signature Scheme over Group Ring | Applicable Algebra in Engineering Communication and Computing |
Santu Pal, Saibal K Pal | A Novel Key Exchange and Encryption Scheme using Companion Matrix | International Conference on Recent Trends in Engineering and Material Sciences (ICEMS-2016) |
Smaranika Dasgupta, Saibal K Pal | Design of a Polynomial Ring Based Symmetric Homomorphic Encryption Scheme | International Conference on Recent Trends in Engineering and Material Sciences (ICEMS-2016) |
A Kaushal, Chavan, Indivar Gupta, D B Kulkarani | A Review on Solving ECDLP over Large Finite Field Using Parallel Pollard's Rho method | IOSR Journal of Computer Engg |
Harish Kumar Sahu, Indivar Gupta, N Rajesh Pillai, R K Sharma | BDD based Cryptanalysis of Stream Cipher- A practical approach | IET Information Theory |
Prateek Yadav, Indivar Gupta & S K Murthy | Study and Analysis of ESTREAM Cipher Salsa and ChaCha | International Conference on Engineering and Technology |
AK Bhateja | Cache Optimized Solution for Sparse Linear System over Large Order Finite Fields | IICMC 2017, Haldia |
Pratibha Kumar, M K Dubey, Poonam Sarohe | On 2-absorbing ideals in commutative semirings | Quasigroups and Related Systems |
Year 2017
Authors | Title | Presented / Published in |
---|---|---|
Manoj Kumar, Pratibha Yadav, SK Pal, AnupamaPanigrahi | Secure and Efficient Diffusion Layers for Block Ciphers | Defence Science Journal |
Yogesh Kumar, Dr P R Mishra, Prof R K Sharma | Non-linearity of k-cycle Permutations on Zn | Journal of Discrete Mathematics |
Yogesh Kumar, P R Mishra, Nupur Gupta, R K Sharma | Differential ϭ- uniformity and non-linearity of permutation over Zn | Group Complexity and Cryptography |
Yogesh Kumar, Dr P R Mishra, Prof R K Sharma | A New Class of Differential 4-Uniform Permutation from Exponential permutation | Journal of Discrete Mathematics |
Maiya Din, Dr S K Pal, Dr S K Muttoo | A Review of Computational Swarm Intelligence Techniques for Solving Crypto Problems | International Journal of System Assurance Engg. |
Manoj Kumar, TS Suresh, Anupama Panigrahi | Optimal Differential Trails in Lightweight Block Ciphers ANU and PICO | Cryptologia |
P R Mishra, Yogesh Kumar, R K Sharma | Inversion Permutation on Z(p^2) and Its Properties | SIAM Journal Applied Algebra & Geometry |
Arvind Kumar Singh, BM Suri and SP Mishra | VHDL Implementation of AES with Random Delay to Resist the Power Attack and to Confuse with DES | National Conference on Information Technology, Electronics and Management, NCITEM-2017 |
Shruti Rawal, S K Pal | Hybrid Parallel Solution of Large Sparse Linear System of Equation over GF(2) | International Conference HiPC-2017 |
Devendra Kumar Yadav, Gajrajkuldeep, S D Joshi | Ramanujan Sums as Derivatives and Applications | IEEE Signal Processing Letters |
Devendra Kumar Yadav, Gajraj Kuldeep, S D Joshi | Orthogonal Ramanujan Sums, Its Properties and Applications in Multiresolution Analysis | IEEE Transaction on Signal Analysis |
Maiya Din, Dr S K Pal, Dr S K Muttoo | A Review of Computational Swarm Intelligence Techniques for Solving Crypto Problems | Soft Computing: Theories & Applications (SoSCTA-2017) |
Arvind Kumar, P R Mishra, S K Pal | A Heuristic Approach Toward Variability of HC- 128 | Defence Science Journal |
Girish Mishra, Meenakshi Shenoy, Somanchi K Murthy | Machine Learning Based Identification of regional Indian Language | Defence Science Journal |
Prashant Verma, Indivar Gupta & NVIDIA team | GPU-Accelerated Scalable Solver for Large Linear System over Finite Fields | GPU Technology Conference at Silicon Valley 26-29 March 2018 |
Manoj Kumar Singh, Dr Indivar Gupta, Dr Abhay Kumar Singh, Pooja Mishra | Construction of Dual Cyclic Codes over F2[u,v]/ <u2,v2-v,uv-vu> for DNA Computation | Defence Science Journal |
Rakesh Kumar Sahu, Narendra S Chaudhari | Algorithm for Reliability Estimation of Leaf Routing Protocol of Mobile Adhoc network | Defence Science Journal |
SidheshwarMukhede, Anmol Prakash, Maiya Din | Identification of Hindi Plain text using Artificial neural Network | INTL Conference on Harmony Search Soft Computing and Application |
Maiya Din, Dr S K Pal, Dr S K Muttoo | Applying PSO Based Techniques for Analysis of Geffe Generator Cryptosystem | INTL Conference on Harmony Search Soft Computing and Application |