Secure reversible data hiding using block-wise histogram shifting S Kamil Khudhair, M Sahu, R KR, AK Sahu
Electronics 12 (5), 1222, 2023
21 2023 Key generation using generalized Pell’s equation in public key cryptography based on the prime fake modulus principle to image encryption and its security analysis KR Raghunandan, A Ganesh, S Surendra, K Bhavya
Cybernetics and Information Technologies 20 (3), 86-101, 2020
21 2020 Chaotic-map based encryption for 3D point and 3D mesh fog data in edge computing KR Raghunandan, R Dodmane, K Bhavya, NSK Rao, AK Sahu
IEEE Access 11, 3545-3554, 2022
17 2022 Efficient audio encryption algorithm for online applications using transposition and multiplicative non-binary system,” KR Raghunandhan, GA Radhakrishna Dodmane
International Journal of Engineering Research & Technology 2 (6), 2013
15 2013 Comparative analysis of encryption and decryption techniques using mersenne prime numbers and phony modulus to avoid factorization attack of RSA KR Raghunandan, G Aithal, S Shetty
2019 International Conference on Advanced Mechatronic Systems (ICAMechS …, 2019
13 2019 Image encryption scheme in public key cryptography based on cubic pells quadratic case BK Raghunandan K. R., Ganesh Aithal, Surendra Shetty
Indonesian Journal of Electrical Engineering and Computer Science 20 (1 …, 2020
12 2020 Key generation and security analysis of text cryptography using cubic power of Pell's equation KR Raghunandan, R Shetty, G Aithal
2017 international conference on intelligent computing, instrumentation and …, 2017
12 2017 Analysis of an enhanced dual RSA algorithm using Pell’s equation to hide public key exponent and a fake modulus to avoid factorization attack KR Raghunandan, RR Dsouza, N Rakshith, S Shetty, G Aithal
Advances in Artificial Intelligence and Data Engineering: Select Proceedings …, 2021
10 2021 Secure RSA Variant System to Avoid Factorization Attack using Phony Modules and Phony Public Key Exponent SS Raghunandan K R, Ganesh Aithal
International Journal of Innovative Technology and Exploring Engineering …, 2019
9 2019 Enhanced RSA algorithm using fake modulus and fake public key exponent KR Raghunandan, S Shetty, G Aithal, N Rakshith
2018 International Conference on Electrical, Electronics, Communication …, 2018
9 2018 Securing media information using hybrid transposition using fisher yates algorithm and RSA public key algorithm using Pell’s cubic equation KR Raghunandan, SN Nireshwalya, S Sudhir, MS Bhat, HM Tanvi
Advances in Artificial Intelligence and Data Engineering: Select Proceedings …, 2021
8 2021 A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem RK Ramesh, R Dodmane, S Shetty, G Aithal, M Sahu, AK Sahu
Cryptography 7 (3), 44, 2023
4 2023 Blockchain-Based Automated Market Makers for a Decentralized Stock Exchange R Dodmane, R KR, KR NS, B Kallapu, S Shetty, M Aslam, SF Jilani
Information 14 (5), 280, 2023
4 2023 Usage of Internet of Things in Agriculture Automation K Raghunandan K R, Jason Quadras, Gurunandan S
International Journal of Computer Trends and Technology (IJCTT) 58 (1), 35-39, 2018
3 2018 Security Attacks and Key Challenges in Blockchain Technology: A survey KR NS, KR Raghunadan, R Dodmane, K Bhavya, SMN Islam, S Shetty
2022 Third International Conference on Smart Technologies in Computing …, 2022
2 2022 Preserving Confidentiality against Factorization Attacks using Fake Modulus ( ) Approach in RSA and its Security Analysis BR Puneeth, KR Raghunandan, K Bhavya, S Shetty, KR NS, R Dodmane, ...
2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical …, 2022
1 2022 Product key activation for software products using Collatz Conjuncture and asymmetric key cryptography KR Raghunandan, L Gagnani, K Amarendra, BV Santhosh Krishna
Materials Today: Proceedings. https://doi. org/10.1016/J. MATPR 907, 2020
1 2020 Web and Server Attacks: Research and Analysis S Kumar, SJ Serrao, GNG Sumanth, KR Raghunandan
Self-Powered AIoT Systems, 295-314, 2025
2025 Integration of Sensors and Secure Exchange of Information to Improve Surrounding Estimation in Automated Electric Vehicles KR Raghunandan, D Radhakrishna, K Bhavya, N Rakshith
Self-Powered AIoT Systems, 239-249, 2025
2025 RSA‐Based Encryption Approach for Preserving Confidentiality Against Factorization Attacks KR Raghunandan
Modeling and Optimization of Optical Communication Networks, 331-348, 2023
2023