A survey on cybersecurity awareness concerns, practices and conceptual measures SS Tirumala, MR Valluri, GA Babu 2019 International Conference on Computer Communication and Informatics …, 2019 | 38 | 2019 |
Cryptanalysis of Xinyu et al.'s NTRU-Lattice Based Key Exchange Protocol MR Valluri Journal of Information and Optimization Sciences 39 (2), 475-479, 2018 | 23 | 2018 |
Authentication schemes using polynomials over non-commutative rings MR Valluri International Journal on Cryptography and Information Security 2 (4), 51-58, 2012 | 11 | 2012 |
Quaternion public key cryptosystems MR Valluri, SV Narayan 2016 World Congress on Industrial Control Systems Security (WCICSS), 1-4, 2016 | 10 | 2016 |
Zero-Knowledge Authentication Schemes Using Quasi-Polynomials over Non-Commutative Groups MR Valluri OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 1 (1), 43-49, 2014 | 10 | 2014 |
Evaluation of feature and signature based training approaches for malware classification using autoencoders SS Tirumala, MR Valluri, D Nanadigam 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS …, 2020 | 8 | 2020 |
NTRUCipher-Lattice Based Secret Key Encryption MR Valluri https://arxiv.org/abs/1710.01928, 2017 | 8 | 2017 |
Digital Signature Scheme over Lattices R Chand, MR Valluri, MGM Khan 2021 25th International Conference on Circuits, Systems, Communications and …, 2021 | 7 | 2021 |
Digital signature scheme based on the conjugate twisted root extraction problem MR Valluri 2015 Second International Conference on Mathematics and Computers in …, 2015 | 6 | 2015 |
An identification protocol based on the twisted ring-root extraction problem MR Valluri 2015 World Congress on Industrial Control Systems Security (WCICSS), 95-97, 2015 | 4 | 2015 |
Implementation of the advanced encryption standard algorithm on an FPGA for image processing through the universal asynchronous receiver-transmitter protocol TL Prasanna, N Siddaiah, BM Krishna, MR Valluri International Journal of Electrical and Computer Engineering 12 (6), 6114-6122, 2022 | 3 | 2022 |
Public key authentication scheme over quaternions M Rao Valluri, SV Narayan Journal of Discrete Mathematical Sciences and Cryptography 24 (1), 169-181, 2021 | 3 | 2021 |
Digital signature scheme based on truncated polynomial over finite fields MR Valluri 2016 14th Annual Conference on Privacy, Security and Trust (PST), 702-705, 2016 | 2 | 2016 |
A zero-knowledge identification protocol in the ring of Gaussian integers M Rao Valluri Journal of Discrete Mathematical Sciences and Cryptography 19 (1), 93-101, 2016 | 2 | 2016 |
Combinatorial Primality Test MR Valluri ACM Communications in Computer Algebra 54 (4/214), 129-133, 2020 | 1 | 2020 |
Preface for the Number-Theoretic Methods in Cryptology conferences A Joux, J Pomykała Journal of Mathematical Cryptology 14 (1), 393-396, 2020 | 1 | 2020 |
Digital Signature Scheme over Lattices R Chand Suva: The University of the South Pacific, 2019 | 1 | 2019 |
Elliptic Curves in Generalized Huff's Model RP Chand, MR Valluri Cryptology ePrint Archive, 2018 | 1 | 2018 |
Maximum solution of fuzzy relation equation NK Mitra, MR Valluri Asia-Pacific World Congress on Computer Science and Engineering, 1-5, 2014 | 1 | 2014 |
Blind Signature Scheme based on Chebyshev Polynomials MR Valluri International Journal of Network Security&Its Application (IJN-SA) 3 (6 …, 2011 | 1 | 2011 |