[HTML][HTML] Survey on public key cryptography scheme for securing data in cloud computing

J Athena, V Sumathy - Circuits and Systems, 2017 - scirp.org
Numerous advancements in the Information Technology (IT) require the proper security
policy for the data storage and transfer among the cloud. With the increase in size of the …

A bit commitment signcryption protocol for wireless transport layer security (wtls)

V Shukla, N Srivastava… - 2016 IEEE Uttar Pradesh …, 2016 - ieeexplore.ieee.org
Signcryption is comparatively new approach in public key cryptography. Signcryption has
the virtue to provide the services of digital signature and public key encryption in a single …

[PDF][PDF] Secure wireless communication protocol: to avoid vulnerabilities in shared authentication

V Shukla, A Chaturvedi, N Srivastava - Communications on applied …, 2017 - caeaccess.org
Routers are used to connect both similar and dissimilar LANs. Routers are connected to
access points. Access point provides wireless connectivity of a wired LAN. Whenever we …

A new encryption/decryption approach using AES

MK Misra, R Mathur, R Tripathi - 2021 5th International …, 2021 - ieeexplore.ieee.org
Information security issues are the most important concerns in the information technology
driven world. The security concern of electronic data becomes so important and the …

Cryptography: Classical versus Post-Quantum

A Awasthi, A Chaturvedi - arXiv preprint arXiv:2402.10988, 2024 - arxiv.org
The advantages of post-quantum cryptography over classical cryptography are covered in
this survey. We address several post-quantum cryptography techniques. We conclude that …

[PDF][PDF] Double layer cryptographic protocol for mobile ad-hoc networks (MANETs) by commitment scheme

V Shukla, A Chaturvedi, N Srivastava - Communications on applied …, 2017 - academia.edu
In the modern world, with the ever-increasing demand of internet, the role of Cryptography
becomes vital. We use ecommerce (business to consumer or consumer to business) …

[PDF][PDF] Lightweight blockchain fuzzy decision scheme through MQTT and Fibonacci for sustainable transport

Z Yang, Y Bao, Y Liu, Q Zhao, H Zheng, W Xu - Math. Biosci. Eng, 2022 - aimspress.com
The unprecedented progress in field of IoT enabled rapid developments in the vehicle
intelligent transportation systems and most of these provide services in a centralized way …

Quantum Computing: Threats & Possible Remedies

J Singh, V Shukla, RK Bajaj - 2024 IEEE International Students' …, 2024 - ieeexplore.ieee.org
Information Security is a buzz word today. Due to the emergence and recent developments
of quantum computers, there is a possible threat on all present cryptographic methods …

Post-Quantum Cryptography

A Chaturvedi - arXiv preprint arXiv:2402.10576, 2024 - arxiv.org
In this survey we propose to cover the prose of post-quantum cryptography over classical
cryptography. We talk about the various cryptographic methods that are being practiced to …

A Secure Signature Verification Mechanism for Smooth Authentication Process

B Chadha, V Shukla, RK Bajaj - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Authentication is very important for information security. The importance increases when it
comes to financial transactions. In banking scenarios, the signatures on cheques and other …