Authenticated key agreement scheme for IoT networks exploiting lightweight linear algebraic computations A Singh, V Tiwari, AN Tentu
International Journal of Information Technology 15 (4), 1803-1811, 2023
9 2023 Machine learning approach for analysing encrypted data KV Pradeepthi, V Tiwari, A Saxena
2018 Tenth International Conference on Advanced Computing (ICoAC), 70-73, 2018
9 2018 A machine vision attack model on image based captchas challenge: Large scale evaluation A Singh, V Tiwari, AN Tentu
Security, Privacy, and Applied Cryptography Engineering: 8th International …, 2018
9 2018 Identification of cryptographic algorithms using clustering techniques V Tiwari, KV Pradeepthi, A Saxena
Proceedings of the Third International Conference on Computational …, 2020
4 2020 An optimal dimension reduction-based feature selection and classification strategy for geospatial imagery A Singh, V Tiwari
International Journal of Knowledge Engineering and Soft Data Paradigms 6 (2 …, 2019
4 2019 Reasoning for uncertainty and rough set-based approach for an efficient biometric identification: An application scenario A Singh, V Tiwari, P Garg, AN Tentu
Computational Intelligence: Theories, Applications and Future Directions …, 2019
3 2019 Analysis of Password Protected Documents Using Statistical Approaches on High Performance Computing A Singh, V Tiwari, AS Naidu, AN Tentu, KS Raju, A Saxena
Advances in Micro-Electronics, Embedded Systems and IoT: Proceedings of …, 2022
2 2022 Ceiling improvement on breast cancer prediction accuracy using unary KNN and binary LightGBM stacked ensemble learning A Singh, V Tiwari, AN Tentu
Proceedings of the Seventh International Conference on Mathematics and …, 2022
2 2022 Towards Finding Active Number of S-Boxes in Block Ciphers using Mixed Integer Linear Programming V Tiwari, N Jampala, AN Tentu, A Saxena
Informatica 45 (6), 2021
2 2021 Differential cryptanalysis on DES cryptosystem up to eight rounds V Tiwari, A Singh, AN Tentu
International Journal of Information Privacy, Security and Integrity 4 (1), 1-29, 2019
2 2019 A (2, λ) Anonymous Decision Logic for Secure Multi-Agent Computing A Singh, V Tiwari, P Garg
ICIC express letters. Part B, Applications: an international journal of …, 2018
1 2018 Differential Cryptanalysis on Block Ciphers: New Research Directions V Tiwari, P Garg, A Singh
International Journal of Computer Applications 168 (5), 1-7, 2017
1 2017 Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT S Sutar, V Tiwari, A Singh
International Journal of Information and Computer Security 21 (3-4), 336-359, 2023
2023 Generation of 8× 8 S-boxes using 4× 4 optimal S-boxes V Tiwari, A Singh, AN Tentu, A Saxena
International Journal of Information and Computer Security 20 (3-4), 399-413, 2023
2023 Securing Communication in IoT Environment Using Lightweight Key Generation-Assisted Homomorphic Authenticated Encryption A Singh, V Tiwari, AN Tentu, A Saxena
Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021 …, 2022
2022 Fault Analysis Against Final Round of L-Block S Sutar, V Tiwari, A Singh, A Saxena
Smart Intelligent Computing and Applications, Volume 2: Proceedings of Fifth …, 2022
2022 Construction of MDS Matrices for Lightweight Block Ciphers V Tiwari, AS Naidu, A Singh, A Saxena
2021 IEEE International Conference on Advanced Networks and …, 2021
2021 Sufficient Conditions for Hamiltonicity in Communication Networks through Graph Modeling: New Research Challenges A Singh, V Tiwari
International Journal of Computer Applications 975, 8887, 2017
2017