Follow
Rashmi  Ramesh Rachh
Rashmi Ramesh Rachh
Verified email at vtu.ac.in
Title
Cited by
Cited by
Year
Efficient implementations for AES encryption and decryption
RR Rachh, PVA Mohan, BS Anami
Circuits, Systems, and Signal Processing 31, 1765-1785, 2012
322012
Efficient implementations of S-box and inverse S-box for AES algorithm
RR Rachh, BS Anami, PVA Mohan
TENCON 2009-2009 IEEE Region 10 Conference, 1-6, 2009
282009
Analysis of Network log data using Machine Learning
S Allagi, R Rachh
2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 1-3, 2019
222019
Implementation of AES S-Boxes using combinational logic
RR Rachh, PVA Mohan
2008 IEEE International Symposium on Circuits and Systems (ISCAS), 3294-3297, 2008
182008
Analysis of access control methods in cloud computing
M Mulimani, R Rachh
Preprints, 2016
122016
RNS-to-Binary Converters for a Three-Moduli Set {2n−1 − 1, 2n − 1, 2n+k}
MVNM Latha, RR Rachh, PVA Mohan
IETE Journal of Education 58 (1), 20-28, 2017
72017
High speed S-box architecture for advanced encryption standard
RR Rachh, PV AnandaMohan, BS Anami
2011 IEEE 5th International Conference on Internet Multimedia Systems …, 2011
62011
A context aware embedding for the detection of hate speech in social media networks
S Kavatagi, R Rachh
2021 International Conference on Smart Generation Computing, Communication …, 2021
42021
Edge computing in healthcare systems
MS Mulimani, RR Rachh
Deep Learning and Edge Computing Solutions for High Performance Computing …, 2021
42021
Ciphertext Policy Attribute Based Encryption
SC Parit, R Rachh
International Research Journal of Engineering and Technology (IRJET) 4 (04), 2017
42017
An improved RNS-to-binary converter for 7-modulus set {2n–5–1, 2n–3–1, 2n–2+1, 2n–1–1, 2n–1+1, 2n, 2n+1} for n even
MVN Madhavi Latha, RR Rachh, PV Ananda Mohan
Sādhanā 45 (1), 239, 2020
32020
Implementation of AES Key Schedule Using Look-Ahead Technique
RR Rachh, PVA Mohan, BS Anami
Circuits, Systems, and Signal Processing 33, 3663-3670, 2014
32014
VTU_BGM at CheckThat! 2022: An Autoregressive Encoding Model for Detecting Check-worthy Claims
S Kavatagi, R Rachh, M Mulimani
22022
A hybrid model for data security and preserving anonymity using machine learning
S Allagi, R Rachh, B Anami
International Journal of Information Technology 13 (6), 2397-2410, 2021
22021
A robust support vector machine based auto-encoder for DoS attacks identification in computer networks
S Allagi, R Rachh, B Anami
2021 International Conference on Intelligent Technologies (CONIT), 1-6, 2021
22021
VTUBGM@ LT-EDI-2023: Hope Speech Identification using Layered Differential Training of ULMFit
SM Kavatagi, RR Rachh, SS Biradar
Proceedings of the Third Workshop on Language Technology for Equality …, 2023
12023
Machine learning algorithms for prediction of heart disease
R Rachh, S Allagi, BK Shravan
Demystifying Big Data, Machine Learning, and Deep Learning for Healthcare …, 2021
12021
Residue-to-Binary converters for the seven moduli set {2n-5-1, 2n-3-1, 2n-2+1, 2n-1-1, 2n-1+1, 2n, 2n+1} for n even
MVNM Latha, RR Rachh, PVA Mohan
2019 IEEE Asia Pacific Conference on Postgraduate Research in …, 2019
12019
Design of Arithmetic unit for RNS using 2n-3 as Base
N Aiholli, R Rachh, U Wali
2018 International Conference on Electrical, Electronics, Communication …, 2018
12018
An efficient residue-to-binary converter for the moduli set {2n−1−1, 2n+k, 2n−1}
MVNM Latha, RR Rachh, PVA Mohan
2017 IEEE Asia Pacific Conference on Postgraduate Research in …, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20