A new authentication procedure for client-server applications using HMAC

V Shukla, MK Misra, A Chaturvedi - Journal of discrete …, 2021 - Taylor & Francis
Hash functions are used for data integrity and authentication but unfortunately they suffer
with man in the middle attack problem. An intruder who has command over the …

Three party key sharing protocol using polynomial rings

A Chaturvedi, V Shukla… - 2018 5th IEEE Uttar …, 2018 - ieeexplore.ieee.org
All of us know that authentication and key agreement are the two cryptographic services very
important for data communication. People use online methods for information exchange …

An authenticated and secure electronic health record system

V Shukla, A Mishra, A Yadav - 2019 IEEE Conference on …, 2019 - ieeexplore.ieee.org
Now a day's electronic health record (EHR) systems are in vogue. Many big countries like
Australia and China are implementing new secure ways to store patient's data. This data can …

[PDF][PDF] Secure wireless communication protocol: to avoid vulnerabilities in shared authentication

V Shukla, A Chaturvedi, N Srivastava - Communications on applied …, 2017 - caeaccess.org
Routers are used to connect both similar and dissimilar LANs. Routers are connected to
access points. Access point provides wireless connectivity of a wired LAN. Whenever we …

A new encryption/decryption approach using AES

MK Misra, R Mathur, R Tripathi - 2021 5th International …, 2021 - ieeexplore.ieee.org
Information security issues are the most important concerns in the information technology
driven world. The security concern of electronic data becomes so important and the …

[PDF][PDF] Double layer cryptographic protocol for mobile ad-hoc networks (MANETs) by commitment scheme

V Shukla, A Chaturvedi, N Srivastava - Communications on applied …, 2017 - academia.edu
In the modern world, with the ever-increasing demand of internet, the role of Cryptography
becomes vital. We use ecommerce (business to consumer or consumer to business) …

Quantum Computing: Threats & Possible Remedies

J Singh, V Shukla, RK Bajaj - 2024 IEEE International Students' …, 2024 - ieeexplore.ieee.org
Information Security is a buzz word today. Due to the emergence and recent developments
of quantum computers, there is a possible threat on all present cryptographic methods …

A Secure Signature Verification Mechanism for Smooth Authentication Process

B Chadha, V Shukla, RK Bajaj - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Authentication is very important for information security. The importance increases when it
comes to financial transactions. In banking scenarios, the signatures on cheques and other …

A Secure RSA-Based Image Encryption Method

V Shukla, SN Tiwari, MA Al-Shareeda… - … Conference on Cryptology …, 2023 - Springer
Modern world moves around data communication, and its security is a key issue nowadays.
It is very unsafe to transmit images over insecure wireless communication channels. In this …

A New Data Communication Method Using RSA and Steganography Check for updates

V Shukla, MK Misra, S Dixit… - Cryptology and Network …, 2023 - books.google.com
Information exchange is an inseparable part in modern life. The security of information is a
key term. Cryptography is all about keeping data secure. Cryptography provides various …