Follow
Chungath Srinivasan
Title
Cited by
Cited by
Year
Hash‐One: a lightweight cryptographic hash function
P Megha Mukundan, S Manayankath, C Srinivasan, M Sethumadhavan
IET Information Security 10 (5), 225-231, 2016
562016
Healthcare security using blockchain for pharmacogenomics
KN Abraham Misha, Hima Vyshnavi, Chungath Srinivasan
Journal of International Pharmaceutical Research 46, 529-533, 2019
222019
Cube attack on stream ciphers using a modified linearity test
C Srinivasan, UU Pillai, KV Lakshmy, M Sethumadhavan
Journal of Discrete Mathematical Sciences and Cryptography 18 (3), 301-311, 2015
132015
White-box cryptography based data encryption-decryption scheme for iot environment
A Saha, C Srinivasan
2019 5th International Conference on Advanced Computing & Communication …, 2019
112019
Measuring diffusion in stream ciphers using statistical testing methods
C Srinivasan, KV Lakshmy, M Sethumadhavan
Defence Science Journal 62 (1), 6, 2012
92012
Complex texture features for glaucomatous image classification system using fundus images
C Srinivasan, S Dubey, TR Ganeshbabu
International Journal of Engineering Research & Science 2 (12), 106-113, 2016
82016
XUBA: An authenticated encryption scheme
R Neethu, M Sindhu, C Srinivasan
Data Engineering and Intelligent Computing: Proceedings of IC3T 2016, 647-655, 2018
62018
Analysis of algebraic attack on Trivium and minute modification to Trivium
AS Raj, C Srinivasan
Advances in Network Security and Applications: 4th International Conference …, 2011
62011
A secure protocol for the delivery of firmware updates over the air in iot devices
K Sowmya, C Srinivasan, KV Lakshmy, T Kumar Bansal
Soft Computing and Signal Processing: Proceedings of 3rd ICSCSP 2020, Volume …, 2021
52021
Clean technologies for optimization of solid waste management in village of Majerdari, West Bengal
P Jyothi Swaroop, KS Praveen Kumar, R Reddy, V Purushotham, ...
ICDSMLA 2019: Proceedings of the 1st International Conference on Data …, 2020
42020
Analysis of sponge function based authenticated encryption schemes
LR Krishnan, M Sindhu, C Srinivasan
2017 4th International Conference on Advanced Computing and Communication …, 2017
42017
A quasigroup based synchronous stream cipher for lightweight applications
S Lakshmi, C Srinivasan, KV Lakshmy, M Sindhu
Security in Computing and Communications: 5th International Symposium, SSCC …, 2017
42017
Decrypting shared encrypted data files stored in a cloud using dynamic key aggregation
M James, C Srinivasan, KV Lakshmy, M Sethumadhavan
Computational Intelligence, Cyber Security and Computational Models …, 2016
42016
On the Statistical Analysis of ZUC, Espresso and Grain v1
S Shrivastava, KV Lakshmy, C Srinivasan
International Journal of Computing 20 (3), 384-390, 2021
32021
Enabling multi-factor authentication and verification in searchable encryption
SD Panguluri, KV Lakshmy, C Srinivasan
International Conference on Micro-Electronics and Telecommunication …, 2021
32021
Matrix Lie group as an algebraic structure for NTRU like cryptosystem
PM Sree Parvathi, C Srinivasan
Journal of Discrete Mathematical Sciences and Cryptography 23 (7), 1455-1464, 2020
32020
An algorithm for k-error joint linear complexity of binary multisequences
M Sethumadhavan, M Sindhu, C Srinivasan, C Kavitha
Journal of Discrete Mathematical Sciences and Cryptography 11 (3), 297-304, 2008
32008
Panther: a sponge based lightweight authenticated encryption scheme
KVL Bhargavi, C Srinivasan, KV Lakshmy
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
22021
Design and implementation of the protocol for secure software-based remote attestation in IoT devices
MAA Shriny, C Srinivasan
Soft Computing and Signal Processing: Proceedings of 2nd ICSCSP 2019 1118, 189, 2020
22020
Novel authentication system for personal and domestic network systems using image feature comparison and digital signatures
H Narayanankutty, C Srinivasan
Intelligent Systems Design and Applications: 18th International Conference …, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20