Efficient implementations for AES encryption and decryption RR Rachh, PVA Mohan, BS Anami Circuits, Systems, and Signal Processing 31, 1765-1785, 2012 | 32 | 2012 |
Efficient implementations of S-box and inverse S-box for AES algorithm RR Rachh, BS Anami, PVA Mohan TENCON 2009-2009 IEEE Region 10 Conference, 1-6, 2009 | 28 | 2009 |
Analysis of Network log data using Machine Learning S Allagi, R Rachh 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 1-3, 2019 | 22 | 2019 |
Implementation of AES S-Boxes using combinational logic RR Rachh, PVA Mohan 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 3294-3297, 2008 | 18 | 2008 |
Analysis of access control methods in cloud computing M Mulimani, R Rachh Preprints, 2016 | 12 | 2016 |
RNS-to-Binary Converters for a Three-Moduli Set {2n−1 − 1, 2n − 1, 2n+k} MVNM Latha, RR Rachh, PVA Mohan IETE Journal of Education 58 (1), 20-28, 2017 | 7 | 2017 |
High speed S-box architecture for advanced encryption standard RR Rachh, PV AnandaMohan, BS Anami 2011 IEEE 5th International Conference on Internet Multimedia Systems …, 2011 | 6 | 2011 |
A context aware embedding for the detection of hate speech in social media networks S Kavatagi, R Rachh 2021 International Conference on Smart Generation Computing, Communication …, 2021 | 4 | 2021 |
Edge computing in healthcare systems MS Mulimani, RR Rachh Deep Learning and Edge Computing Solutions for High Performance Computing …, 2021 | 4 | 2021 |
Ciphertext Policy Attribute Based Encryption SC Parit, R Rachh International Research Journal of Engineering and Technology (IRJET) 4 (04), 2017 | 4 | 2017 |
An improved RNS-to-binary converter for 7-modulus set {2n–5–1, 2n–3–1, 2n–2+1, 2n–1–1, 2n–1+1, 2n, 2n+1} for n even MVN Madhavi Latha, RR Rachh, PV Ananda Mohan Sādhanā 45 (1), 239, 2020 | 3 | 2020 |
Implementation of AES Key Schedule Using Look-Ahead Technique RR Rachh, PVA Mohan, BS Anami Circuits, Systems, and Signal Processing 33, 3663-3670, 2014 | 3 | 2014 |
VTU_BGM at CheckThat! 2022: An Autoregressive Encoding Model for Detecting Check-worthy Claims S Kavatagi, R Rachh, M Mulimani | 2 | 2022 |
A hybrid model for data security and preserving anonymity using machine learning S Allagi, R Rachh, B Anami International Journal of Information Technology 13 (6), 2397-2410, 2021 | 2 | 2021 |
A robust support vector machine based auto-encoder for DoS attacks identification in computer networks S Allagi, R Rachh, B Anami 2021 International Conference on Intelligent Technologies (CONIT), 1-6, 2021 | 2 | 2021 |
VTUBGM@ LT-EDI-2023: Hope Speech Identification using Layered Differential Training of ULMFit SM Kavatagi, RR Rachh, SS Biradar Proceedings of the Third Workshop on Language Technology for Equality …, 2023 | 1 | 2023 |
Machine learning algorithms for prediction of heart disease R Rachh, S Allagi, BK Shravan Demystifying Big Data, Machine Learning, and Deep Learning for Healthcare …, 2021 | 1 | 2021 |
Residue-to-Binary converters for the seven moduli set {2n-5-1, 2n-3-1, 2n-2+1, 2n-1-1, 2n-1+1, 2n, 2n+1} for n even MVNM Latha, RR Rachh, PVA Mohan 2019 IEEE Asia Pacific Conference on Postgraduate Research in …, 2019 | 1 | 2019 |
Design of Arithmetic unit for RNS using 2n-3 as Base N Aiholli, R Rachh, U Wali 2018 International Conference on Electrical, Electronics, Communication …, 2018 | 1 | 2018 |
An efficient residue-to-binary converter for the moduli set {2n−1−1, 2n+k, 2n−1} MVNM Latha, RR Rachh, PVA Mohan 2017 IEEE Asia Pacific Conference on Postgraduate Research in …, 2017 | 1 | 2017 |