Anion assisted supramolecular self-assemblies of succinate and malate adducts: crystal structures and theoretical modelling R Padmavathy, N Karthikeyan, D Sathya, R Jagan, RM Kumar, ... RSC advances 6 (72), 68468-68484, 2016 | 16 | 2016 |
An improved fast and secure hash algorithm S Agarwal, A Rungta, R Padmavathy, M Shankar, N Rajan Journal of Information Processing Systems 8 (1), 119-132, 2012 | 15 | 2012 |
Discrete logarithm problem using index calculus method R Padmavathy, C Bhagvati Mathematical and computer modelling 55 (1-2), 161-169, 2012 | 12 | 2012 |
Methods to solve discrete logarithm problem for ephemeral keys R Padmavathy, C Bhagvati 2009 International Conference on Advances in Recent Technologies in …, 2009 | 8 | 2009 |
Improved three party EKE protocol R Padmavathy Information Technology and control 39 (3), 2010 | 6 | 2010 |
Crystal structure, DFT study, hirshfeld surface and PIXEL energy calculations of benzimidazolium and hexadecylaminium hydrogen maleate salts R Padmavathy, N Karthikeyan, D Sathya, R Jagan, RM Kumar, ... Journal of Molecular Structure 1136, 144-156, 2017 | 5 | 2017 |
A Small Subgroup Attack for Recovering Ephemeral Keys in Chang and Chang Password Key Exchange Protocol. R Padmavathy, C Bhagvati J. Comput. 6 (4), 805-811, 2011 | 5 | 2011 |
A Key Recovery Attack on Chang-Chang Password Key Exchange Protocol R Padmavathy, C Bhagvati Computer And Network Technology, 176-181, 2010 | 5 | 2010 |
Cryptanalysis on a Three Party Key Exchange Protocol-STPKE' S Tallapally, R Padmavathy Journal of Information processing systems 6 (1), 43-52, 2010 | 4 | 2010 |
Improved analysis on Chang and Chang Password Key Exchange Protocol R Padmavathy, T Shirisha, M Rajkumar, J Gyani 2009 International Conference on Advances in Computing, Control, and …, 2009 | 4 | 2009 |
Secured Cloud Communication Using Lightweight Hash Authentication with PUF. R Padmavathy, MN Rajkumar Computer Systems Science & Engineering 43 (1), 2022 | 3 | 2022 |
Secure exchange and incentivised collaboration of machine learning models and datasets using blockchain JJ D'souza, R Padmavathy, A Dayal, H Gnanaveni, S Ponnada International Journal of Information and Computer Security 19 (3-4), 443-462, 2022 | 3 | 2022 |
An authenticated keyword searchable conditional proxy re-encryption scheme in cloud services A Swarnakar, CJ Babu, R Padmavathy, R Kumar 2020 5th International Conference on Computing, Communication and Security …, 2020 | 3 | 2020 |
Reversible data hiding using prior pixel pairs in two-dimensional histogram with tri-directional modification of difference histogram A Pinapati, R Padmavathy IETE Technical Review, 2019 | 3 | 2019 |
N—H⋯ O, O—H⋯ O hydrogen-bonded supramolecular sheet formation in the bis (2-aminoanilinium) fumarate, 3-methylanilinium hydrogen fumarate and 4-chloroanilinium hydrogen … D Sathya, R Jagan, R Padmavathy, RM Kumar, K Sivakumar Acta Crystallographica Section C: Crystal Structure Communications 69 (8 …, 2013 | 3 | 2013 |
Block Lanczos to Solve Integer Factorization Problem Using GPU’s H Malla, V SantKaustubh, R Ganesh Advances in Computer Science and Information Technology. Networks and …, 2012 | 3 | 2012 |
Ephemeral key recovery using index calculus method R Padmavathy, C Bhagvati Journal of Discrete Mathematical Sciences and Cryptography 13 (1), 29-43, 2010 | 3 | 2010 |
Secure and lightweight authentication protocol for anonymous data access in cloud assisted iot system V Mahor, R Padmavathy, S Chatterjee Peer-to-Peer Networking and Applications 17 (1), 321-336, 2024 | 2 | 2024 |
Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption from Module-LWE for Cloud Storage G Sravya, PS Kumar, R Padmavathy 2023 IEEE 16th International Conference on Cloud Computing (CLOUD), 554-556, 2023 | 2 | 2023 |
A Deep Learning Framework to Preserve Privacy in Federated (Collaborative) Learning S Ganesh, C Dheeraj, R Padmavathy Artificial Intelligence for Cyber Security: Methods, Issues and Possible …, 2021 | 2 | 2021 |