Appala Naidu Tentu

According to our database1, Appala Naidu Tentu authored at least 19 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Generation of 8 × 8 S-boxes using 4 × 4 optimal S-boxes.
Int. J. Inf. Comput. Secur., 2023

An ECC based Anonymous Authentication Protocol for Internet of Things.
Proceedings of the IEEE International Conference on Public Key Infrastructure and its Applications, 2023

2021
Towards Finding Active Number of S-Boxes in Block Ciphers using Mixed Integer Linear Programming.
Informatica (Slovenia), 2021

A dynamic key management paradigm for secure wireless ad hoc network communications.
Int. J. Inf. Comput. Secur., 2021

Ceiling Improvement on Breast Cancer Prediction Accuracy Using Unary KNN and Binary LightGBM Stacked Ensemble Learning.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
McEliece cryptosystem: simulation and security vulnerabilities.
Int. J. Comput. Sci. Math., 2020

2019
Differential cryptanalysis on DES cryptosystem up to eight rounds.
Int. J. Inf. Priv. Secur. Integr., 2019

2018
CRT based multi-secret sharing schemes: revisited.
Int. J. Secur. Networks, 2018

Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures.
IACR Cryptol. ePrint Arch., 2018

A Machine Vision Attack Model on Image Based CAPTCHAs Challenge: Large Scale Evaluation.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018

2017
Multi-secret Sharing Scheme for Level-Ordered Access Structures.
Proceedings of the Number-Theoretic Methods in Cryptology - First International Conference, 2017

2016
Sequential Secret Sharing Scheme Based on Level Ordered Access Structure.
Int. J. Netw. Secur., 2016

2015
New secret sharing scheme for multipartite access structures with threshold changeability.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Computationally perfect compartmented secret sharing schemes based on MDS codes.
Int. J. Trust. Manag. Comput. Commun., 2014

Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures.
Proceedings of the Security in Computing and Communications, 2014

Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Efficient Verifiable Multi-Secret Sharing Based on Y.C.H Scheme.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

2013
Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes.
IACR Cryptol. ePrint Arch., 2013

Conjunctive Hierarchical Secret Sharing Scheme Based on MDS Codes.
Proceedings of the Combinatorial Algorithms - 24th International Workshop, 2013


  Loading...