Chandra Sekhar A.

Chandra Sekhar A.

Professor, Mathematics, GSS , VSP

Education
Ph. D.
Email ID
cakkaped@gitam.edu
Education
Ph. D.
Research Areas
  • Number Theory
  • Cryptography
Consulting hours
Select
List of courses
Select

Education

Degree Name Institute & College name Year of Graduation/Award
On Some Arithmetic operations on Finite Fields and Recurrence RelationsApplications to CryptSystems JNTU Hyderabad 2008
Fluid Mechanics ANDHRA UNVERSITY 2000
MSc 1990
BSc 1987

Experience

Designation Organization From Date To Date
LECTURER GVP Degree college 06-09-1991 31-10-1995

Enhancing eBanking Security of Two Factor Authentication using Elliptic Curve Cryptography with Laplace TransformSolid State Technology, Scopus, FEB-2021, 64, 979-995

An implementation of ElGamal scheme for Laplace transform cryptosystem Indian Journal of Computer Science and Engineering, Scopus, FEB-2020, 11, 48-56

An Implementation of ElGamal Scheme for Laplace Transform Cryptosystem Indian JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, Scopus, NOV-2020, 11, 48-56

Enhancing the data security by using RSA algorithm with application of laplace transform cryptosystemInternational Journal of Recent Technology and Engineering, Scopus, JUL-2019, 8, 6142-6147

Dynamic stability margin evaluation of multimachine power systems using genetic algorithmAdvances in Intelligent Systems and Computing, Scopus, MAY-2018, 628, 1-16

A Diffie Hellman key exchange for self encryption over points on the Elliptic curve CryptographyJournal of Information and Computing Science, Google scholar, -2017, 12, 83-87

An Encryption Scheme of points on the Elliptic Curve and Golden MatricesAsian Journal Mathematics and Computer research, Google scholar, -2017, 15, 113-122

Multiple Encryptions of Fibonacci Lucas transformationsIOSR Journal of Mathematics (IOSRJM), Others, -2016, Volume 12,, 66-72

MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERSInternational Journal of Engineering Science Invention Research & Development, Others, -2016, II, 582-588

Symmetric Key Cryptosystem for Multiple EncryptionsInternational Journal of Mathematics Trends and Technology, Others, -2016, 29, 140-146

MULTIPLE ENCRYPTIONS OF INDEPENDENT CIPHERSInternational Journal of Mathematical Archive, Others, -2016, 7, 103-110

TRIPLE ENCRYPTION OF MULTIPLE KEYS FOR SYMMETRIC KEY CRYPTO SYSTEMSInternational Journal of DEVELOPMENT RESEARCH, Others, -2016, 6, 7079-7089

Triple Encryption Scheme Using two Independent KeysInternational Journal of Engineering Science and Technology (IJEST), Others, -2016, 8, 60-64

An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesCOMPUSOFT, An international journal of advanced computer technology, Google scholar, -2015, 4, 1548-1554

Linearly independent spanning sets and linear transformations for Multilevel EncryptionJournal of Information and Optimization Sciences, Others, -2015, Online, 01-10

A Novel ElGamal Encryption Scheme of Elliptic Curve CryptographyInternational Journal of Computer Trends and Technology, Google scholar, -2015, 20, 70-73

An ElGamal Encryption of Finite State Machines and points on the Elliptic CurveJournal of theoretical physics & Cryptography, Google scholar, -2015, 9, 1-5

An ElGamal Encryption Scheme of Pauli Spin Matrices and Finite MachinesInternational Journal of Mechatronics, Electrical and Computer Technology (IJMEC), Google scholar, -2015, 5, 2577-2584

An Elgamal Encryption scheme of Fibonacci Q Matrix and Finite State MachineJournal of Applied Computer Science & Mathematics, Google scholar, -2015, 20, 13-17

Fixed Point Theorems For A Self Map In Ordered Cone Metric Space Under Lattice Ordered CDistanceInternational journal of micro circuits and electronic, Others, SEP-2015, 6, 1-14

Fixed Point Theorems For A Self Map In Ordered Cone Metric Space Under Lattice Ordered CDistanceInternational journal of micro circuits and electronic, Others, SEP-2015, 6, 1-14

CRYPTOGRAPHIC SECRET SHARING SCHEME OF FINITE STATE MACHINES USING LU DECOMPOSITIONInternational journal of Mathematical Archive , Others, MAR-2013, 4, 209-214

Application of Mealy machine and Recurrence Matrices in CryptologyInternational Journal of Computer Science and Management Research, Others, SEP-2013, 2, 2656-2661

Application of Mealy machine and Recurrence Matrices in cryptographyinternational Journal of computer science and management research, Others, JUN-2013, 2, 2656-2661

A fixed point theorem in a lattice ordered semigroup cone valued cone metric spacesJournal of Non linear Science and Applications, Google scholar, APR-2013, 1, 285-292

EXISTENCE OF COMMON FIXED POINTS FOR A PAIR OF SELF MAPS ON A CONE Advances in Fixed Point Theory , Others, MAR-2013, 1, 49-59

A coincidence point theorem for a pair of self maps on a partially ordered cone metric Journal of Advanced Research in Pure Mathematics , Others, MAR-2013, 5, 98-106

Finite State Machines and Recurrence Matrices of CryptologyIJMA , Others, MAY-2013, 1, 219-222

A Novel Encryption Scheme for Secure Communication using Mealay MachineIJMA , Others, MAY-2013, 4, 223-228

Application Of Mealy Machine And Recurrence Relations In CryptographyInternational Journal of Engineering Research & Technology, Others, MAY-2013, 2, 1286-1290

A NOVEL ENCRYPTION FOR SECRET SHARING USING FINITE STATE MACHINEInternational Journal of Mathematical Archieve, Others, MAY-2013, 4, 267-272

A Common fixed point theorem in metric spaces for an asymptotically regular self mapsInternational Journal of pure Algebra, Google scholar, SEP-2013, 3, 1-5

A One to One Correspondence in Elliptic curve CryptographyInternational Journal of Mathematical Archive, Google scholar, -2013, 4, 300-304

Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fieldsInternational Journal of Computer Applications, Google scholar, -2012, 36, 27-30

ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDSInternational Journal of Distributed and Parallel Systems , Google scholar, -2012, 3, 301-308

A Key Scheduled Block Cipher Using element wise Linear Transformation and Logical XOR OperationInternational Journal of Engineering Research and Applications , Google scholar, -2012, 2, 417-425

CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDSInternational Journal of Engineering Science and Technology , Google scholar, -2012, 4, 81-86

AUTHENTIC KEY TRANSPORT IN SYMMETRIC CRYPTOGRAPHIC PROTOCOLS USING SOME ELLIPTIC CURVES OVER FINITE FIELDS International journal of mathematical archives, Google scholar, -2012, 3, 1-6

Fuzzy CMeans clustering for robust decentralized load frequency controlElsevier,Electrical Power and Energy Systems , Others, FEB-2012, 37, 58-66

Encryption of Data Streams using Pauli Spins 12 Matrices and Finite State MachineInternational Jouranal of computer Applications , Google scholar, JAN-2012, 37, 8-12

A Common fixed point theorem for two self maps on a cone metric space with wdistanceInternational Journal of Mathematics in Operational Research, Others, SEP-2012, 4, 689-697

A Fixed Point Theorem for Cone Convex Contractions of order m2International Journal of Mathematical Sciences and Engineering Applications , Others, JAN-2012, 6, 263-271

Secure Key Transport in Symmetric Cryptographic Protocolsusing Some Elliptic curvesInternational Journal of Computer Applications , Google scholar, DEC-2011, 36, 27-30

Cryptographic Scheme for Digital Signals using Finite State MachinesInternational Journal of Computer Applications , Google scholar, SEP-2011, 29, 61-63

ON NON METRIZABILITY OF CONE METRIC SPACESInt. J. of Mathematical Sciences and Applications , Others, SEP-2011, 1, 1533-1535

A Block Cipher Using Rotation and Logical XOR OperationsInternational Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011 , EBSCO Host, -2011, 6, 142-147

A Block Cipher Using Logical XNOR And NOT OperationsInternational Journal of Science and Advanced Technology , Google scholar, -2011, 1, 59-62

A fixed point theorem in cone metric spaces under weak contractionsGen.Math.Notes , Others, DEC-2011, 7, 38-44

A Block Cipher using Graph Structures and Logical XOR OperationInternational Journal of Computer Applications , Google scholar, -2011, 33, 6-10

A Cryptographic Scheme of Finite Fields Using Logical OperatorsInternational Journal of Computer Applications, Google scholar, -2011, 31, 1-4

Cyclic Groups of Elliptic Curves An Implementation to Cryptography International Journal of Advanced Research in Computer Science, Google scholar, -2011, 2, 544-546

A Study on Group Theoretic Elliptic Curves an Implementation to CryptographyInternational Journal of Science and Advanced Technology, Google scholar, -2011, 1, 6-9

A Cryptographic Scheme Of Laplace TransformsInternational Journal of Mathematical Archive, Google scholar, -2011, 2, 2515-2519

A Novel Encryption scheme based on Double Based Canonical Number SystemInternational Journal of Engineering Science and Technology , Others, -2010, 2, 1085-1087

ENCRYPTION OF DATA STREAMS USING PAULI SPINS MATRICESInternational Journal of Engineering Science and Technology , Google scholar, -2010, 2, 2020-2028

Self Encrypting data streams of digital signalInternational Journal of Computer and Network Security , Others, APR-2010, 2, 111-113

Fast Fourier Transforms and Quadratic forms for digital audio water markingIEEE , Others, MAY-2009, 1, 203-206

Self encrypting Data Streams using Graph StructuresIETECH international journal of advanced computations , Others, NOV-2008, 1, 7-9

Cryptographic scheme for digital signalsIETECH international journal of advanced computations , Others, NOV-2008, 1, 195-200

Cryptographic protection of Digital Signal Using some recurrence relationsIJCSNS , Others, MAY-2007, 1, 203-207

Some Algebraic Curves in public Key crypto systemsInternational Journal of Ultra Scientist of Physical Sciences , Others, MAY-2007, 1, 533-540

Data Encryption Tecgniques using random number generatorIEEE , Others, MAY-2007, 1, 576-579

Title of the book Book / Chapter Name of the publisher Subject area Edition Page numbers ISBN Published year
Engineering Mathematics Book Acme learning Mathematics I 978_93_80408_89 2012
Board name Journal name
JNIT Member of Journal of Next generation Information Technology
ournal of Computer Science Engineering and Software Testing Member of Journal of Computer Science Engineering and Software Testing
IJAMSS Member of International journal of Applied Mathematics and statistics Sciences
AISS Korea Member of Advanced information & Services (AISS)
Board name Journal name
Seminar name Organized by Venue Start date End date Title of the paper presented Role Co presenter
National Deparment of Engineering Mathematics Deparment of Engineering Mathematics,college of engineering ANDHRA UN IVERSITY 29-Jun-2011 30-Jun-2011 Participated
National GITAM Institute of Technology Department of Mathematics GITAM University 15-Apr-2011 16-Apr-2010 Organized
National ARTCOM Kottayam 28-Oct-2009 28-Oct-2009 Participated
National VASAVI COLLEGE OF ENGINEERING Vasavi college of engineering 10-Mar-2008 11-Mar-2008 Participated
National Deparment of Mathematics OSMANIA UNIVERSITY 18-Mar-2006 19-Mar-2006 ON SMOOTH NUMBERS AND ROUGH NUMBERS Participated
National ISTAM NIT WARANGAL 22-Dec-1999 25-Dec-1999 Participated
Seminar name Organized by Venue Start date End date Title of the paper presented Role Co presenter
International GITAM Institute of Technology Department of Mathematics GITAM University 15-Jul-2011 16-Apr-2011 Organized
Title of the thesis Name of the student Name of the college / university Major subject area Year of admission Type of admission Thesis specification
A Study on Skewed Classical Ciphers for Robust Crypto _Systems Jayanthi Sravani GIS Cryptography 2020 Full time PhD
Title of the thesis Name of the student Name of the college / university Major subject area Year of admission Type of admission Thesis specification
Title of the thesis Name of the student Name of the college / university Major subject area Year of admission Type of admission Thesis specification
A STUDY OF A CRYPTOGRAPHIC SCHEME IN ALGEBRAIC STRUCTURES AN IMPLEMENTATION TO MULTI LEVEL ENCRYPTION SCHEME V.ANUSHA MATHEMATICS 2014 Part time M.Phil
CONTRIBUTIONS TO FIXED POINT THEORY IN CONE METRIC SPACES KAMBHAMPATI SUJATHA MATHEMATICS 2013 Part time PhD
A STUDY OF MULTIPLE ENCRYPTIONS FOR SYMMETRIC KEY CRYPTO SYSTEMS AN ANALYTIC APPROACH WITH IMPLEMENTATIONS S.ASHOK KUMAR MATHEMATICS 2013 Part time PhD
A STUDY ON CYCLIC GROUPS OF ELLIPTIC CURVESAN IMPLEMENTATION TO CRYPTOGRAPHY G.SIVANAGA MALLESWAR RAO MATHEMATICS 2011 Part time M.Phil
SOME CONTRIBUTIONS TO FIXED POINT THEORY IN CONE METRIC SPACES MOTHUKURI BALAIAH MATHEMATICS 2010 Part time PhD
Applications of Mathematical Techniques in Cryptosystems Ch.SUNEETHA MATHEMATICS 2010 Part time PhD
CRYPTOGRAPHIC SCHEMES OF QUADRATIC FORMS G.NAGA LAKSHMI MATHEMATICS 2009 Part time M.Phil
A STUDY ON GROUP THEORETIC ELLIPTIC CURVE CRYPTOSYSTEM PATCHA VENKATESWAR RAO MATHEMATICS 2009 Part time M.Phil
Name of the award Awarded by Awarded year
Best Teacher Department of Computer science 2010
Title Type Organized by Venue Start date End date Role
National Instructional workshop on on Cryptology Quality improvement program CryptologyResearch Society of INDIA,KOLKATA Deparment of Computer Science,college of engineering ANDHRA UN IVERSITY 10-Mar-2017 12-Mar-2017 Participated
National workshop on Applications of advanced Mathematics in Engineering and Science Quality improvement program Deparment of Engineering Mathematics Deparment of Engineering Mathematics,college of engineering ANDHRA UN IVERSITY 28-Feb-2017 01-Mar-2017 Participated
Refresher course Faculty development program ANDHRA UNIVERSITY ACADEMIC STAFF COLLEGE 22-Dec-2003 11-Jan-2004 Participated
Title Type Organized by Venue Start date End date Role
Title of the lecture Name of the college / university Place Date
Mathematical models in Cryptography BERHAMPUR UNIVERSITY BERHAMPUR 22-Dec-2010
Title Application number Category Submitted date
Title Application number Category Submitted date
Title Application number Category Submitted date
Design of an Asymmetrical Multilevel Inverter Using Cascaded H Bridges 202141029277 Indian 29 Jun, 2021
Graphical, Hierarchical and Orthogonal Maximum Power Point Tracking Statecharts for Photovoltaic System 202141020890 Indian 07 May, 2021