Follow
Vikas Tiwari
Vikas Tiwari
CRRao AIMSCS, University of Hyderabad
Verified email at crraoaimscs.res.in
Title
Cited by
Cited by
Year
Authenticated key agreement scheme for IoT networks exploiting lightweight linear algebraic computations
A Singh, V Tiwari, AN Tentu
International Journal of Information Technology 15 (4), 1803-1811, 2023
92023
Machine learning approach for analysing encrypted data
KV Pradeepthi, V Tiwari, A Saxena
2018 Tenth International Conference on Advanced Computing (ICoAC), 70-73, 2018
92018
A machine vision attack model on image based captchas challenge: Large scale evaluation
A Singh, V Tiwari, AN Tentu
Security, Privacy, and Applied Cryptography Engineering: 8th International …, 2018
92018
Identification of cryptographic algorithms using clustering techniques
V Tiwari, KV Pradeepthi, A Saxena
Proceedings of the Third International Conference on Computational …, 2020
42020
An optimal dimension reduction-based feature selection and classification strategy for geospatial imagery
A Singh, V Tiwari
International Journal of Knowledge Engineering and Soft Data Paradigms 6 (2 …, 2019
42019
Reasoning for uncertainty and rough set-based approach for an efficient biometric identification: An application scenario
A Singh, V Tiwari, P Garg, AN Tentu
Computational Intelligence: Theories, Applications and Future Directions …, 2019
32019
Analysis of Password Protected Documents Using Statistical Approaches on High Performance Computing
A Singh, V Tiwari, AS Naidu, AN Tentu, KS Raju, A Saxena
Advances in Micro-Electronics, Embedded Systems and IoT: Proceedings of …, 2022
22022
Ceiling improvement on breast cancer prediction accuracy using unary KNN and binary LightGBM stacked ensemble learning
A Singh, V Tiwari, AN Tentu
Proceedings of the Seventh International Conference on Mathematics and …, 2022
22022
Towards Finding Active Number of S-Boxes in Block Ciphers using Mixed Integer Linear Programming
V Tiwari, N Jampala, AN Tentu, A Saxena
Informatica 45 (6), 2021
22021
Differential cryptanalysis on DES cryptosystem up to eight rounds
V Tiwari, A Singh, AN Tentu
International Journal of Information Privacy, Security and Integrity 4 (1), 1-29, 2019
22019
A (2, λ) Anonymous Decision Logic for Secure Multi-Agent Computing
A Singh, V Tiwari, P Garg
ICIC express letters. Part B, Applications: an international journal of …, 2018
12018
Differential Cryptanalysis on Block Ciphers: New Research Directions
V Tiwari, P Garg, A Singh
International Journal of Computer Applications 168 (5), 1-7, 2017
12017
Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT
S Sutar, V Tiwari, A Singh
International Journal of Information and Computer Security 21 (3-4), 336-359, 2023
2023
Generation of 8× 8 S-boxes using 4× 4 optimal S-boxes
V Tiwari, A Singh, AN Tentu, A Saxena
International Journal of Information and Computer Security 20 (3-4), 399-413, 2023
2023
Securing Communication in IoT Environment Using Lightweight Key Generation-Assisted Homomorphic Authenticated Encryption
A Singh, V Tiwari, AN Tentu, A Saxena
Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021 …, 2022
2022
Fault Analysis Against Final Round of L-Block
S Sutar, V Tiwari, A Singh, A Saxena
Smart Intelligent Computing and Applications, Volume 2: Proceedings of Fifth …, 2022
2022
Construction of MDS Matrices for Lightweight Block Ciphers
V Tiwari, AS Naidu, A Singh, A Saxena
2021 IEEE International Conference on Advanced Networks and …, 2021
2021
Sufficient Conditions for Hamiltonicity in Communication Networks through Graph Modeling: New Research Challenges
A Singh, V Tiwari
International Journal of Computer Applications 975, 8887, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–18