Akkapeddi Chandra Sekhar

Akkapeddi Chandra Sekhar

Professor, Mathematics, GSS, VSP

Education
Ph. D.
Email ID
cakkaped@gitam.edu
Education
Ph. D.
Research Areas
  • Number Theory
  • Cryptography

Education

Degree NameInstitute & College nameYear of Graduation/Award
On Some Arithmetic operations on Finite Fields and Recurrence RelationsApplications to CryptSystemsJNTU Hyderabad2008
Fluid MechanicsANDHRA UNVERSITY2000
MSc1990
BSc1987

Experience

DesignationOrganizationFrom DateTo Date
LECTURERGVP Degree college06-09-199131-10-1995

Enhancing eBanking Security of Two Factor Authentication using Elliptic Curve Cryptography with Laplace TransformSolid State Technology, Scopus, FEB-2021, 64, 979-995

An implementation of ElGamal scheme for Laplace transform cryptosystem Indian Journal of Computer Science and Engineering, Scopus, FEB-2020, 11, 48-56

An Implementation of ElGamal Scheme for Laplace Transform Cryptosystem Indian JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, Scopus, NOV-2020, 11, 48-56

Enhancing the data security by using RSA algorithm with application of laplace transform cryptosystemInternational Journal of Recent Technology and Engineering, Scopus, JUL-2019, 8, 6142-6147

Dynamic stability margin evaluation of multimachine power systems using genetic algorithmAdvances in Intelligent Systems and Computing, Scopus, MAY-2018, 628, 1-16

A Diffie Hellman key exchange for self encryption over points on the Elliptic curve CryptographyJournal of Information and Computing Science, Google scholar, -2017, 12, 83-87

An Encryption Scheme of points on the Elliptic Curve and Golden MatricesAsian Journal Mathematics and Computer research, Google scholar, -2017, 15, 113-122

Multiple Encryptions of Fibonacci Lucas transformationsIOSR Journal of Mathematics (IOSRJM), Others, -2016, Volume 12,, 66-72

MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERSInternational Journal of Engineering Science Invention Research & Development, Others, -2016, II, 582-588

Symmetric Key Cryptosystem for Multiple EncryptionsInternational Journal of Mathematics Trends and Technology, Others, -2016, 29, 140-146

MULTIPLE ENCRYPTIONS OF INDEPENDENT CIPHERSInternational Journal of Mathematical Archive, Others, -2016, 7, 103-110

TRIPLE ENCRYPTION OF MULTIPLE KEYS FOR SYMMETRIC KEY CRYPTO SYSTEMSInternational Journal of DEVELOPMENT RESEARCH, Others, -2016, 6, 7079-7089

Triple Encryption Scheme Using two Independent KeysInternational Journal of Engineering Science and Technology (IJEST), Others, -2016, 8, 60-64

An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesCOMPUSOFT, An international journal of advanced computer technology, Google scholar, -2015, 4, 1548-1554

Linearly independent spanning sets and linear transformations for Multilevel EncryptionJournal of Information and Optimization Sciences, Others, -2015, Online, 01-10

A Novel ElGamal Encryption Scheme of Elliptic Curve CryptographyInternational Journal of Computer Trends and Technology, Google scholar, -2015, 20, 70-73

An ElGamal Encryption of Finite State Machines and points on the Elliptic CurveJournal of theoretical physics & Cryptography, Google scholar, -2015, 9, 1-5

An ElGamal Encryption Scheme of Pauli Spin Matrices and Finite MachinesInternational Journal of Mechatronics, Electrical and Computer Technology (IJMEC), Google scholar, -2015, 5, 2577-2584

An Elgamal Encryption scheme of Fibonacci Q Matrix and Finite State MachineJournal of Applied Computer Science & Mathematics, Google scholar, -2015, 20, 13-17

Fixed Point Theorems For A Self Map In Ordered Cone Metric Space Under Lattice Ordered CDistanceInternational journal of micro circuits and electronic, Others, SEP-2015, 6, 1-14

Fixed Point Theorems For A Self Map In Ordered Cone Metric Space Under Lattice Ordered CDistanceInternational journal of micro circuits and electronic, Others, SEP-2015, 6, 1-14

CRYPTOGRAPHIC SECRET SHARING SCHEME OF FINITE STATE MACHINES USING LU DECOMPOSITIONInternational journal of Mathematical Archive , Others, MAR-2013, 4, 209-214

Application of Mealy machine and Recurrence Matrices in CryptologyInternational Journal of Computer Science and Management Research, Others, SEP-2013, 2, 2656-2661

Application of Mealy machine and Recurrence Matrices in cryptographyinternational Journal of computer science and management research, Others, JUN-2013, 2, 2656-2661

A fixed point theorem in a lattice ordered semigroup cone valued cone metric spacesJournal of Non linear Science and Applications, Google scholar, APR-2013, 1, 285-292

EXISTENCE OF COMMON FIXED POINTS FOR A PAIR OF SELF MAPS ON A CONE Advances in Fixed Point Theory , Others, MAR-2013, 1, 49-59

A coincidence point theorem for a pair of self maps on a partially ordered cone metric Journal of Advanced Research in Pure Mathematics , Others, MAR-2013, 5, 98-106

Finite State Machines and Recurrence Matrices of CryptologyIJMA , Others, MAY-2013, 1, 219-222

A Novel Encryption Scheme for Secure Communication using Mealay MachineIJMA , Others, MAY-2013, 4, 223-228

Application Of Mealy Machine And Recurrence Relations In CryptographyInternational Journal of Engineering Research & Technology, Others, MAY-2013, 2, 1286-1290

A NOVEL ENCRYPTION FOR SECRET SHARING USING FINITE STATE MACHINEInternational Journal of Mathematical Archieve, Others, MAY-2013, 4, 267-272

A Common fixed point theorem in metric spaces for an asymptotically regular self mapsInternational Journal of pure Algebra, Google scholar, SEP-2013, 3, 1-5

A One to One Correspondence in Elliptic curve CryptographyInternational Journal of Mathematical Archive, Google scholar, -2013, 4, 300-304

Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fieldsInternational Journal of Computer Applications, Google scholar, -2012, 36, 27-30

ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDSInternational Journal of Distributed and Parallel Systems , Google scholar, -2012, 3, 301-308

A Key Scheduled Block Cipher Using element wise Linear Transformation and Logical XOR OperationInternational Journal of Engineering Research and Applications , Google scholar, -2012, 2, 417-425

CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDSInternational Journal of Engineering Science and Technology , Google scholar, -2012, 4, 81-86

AUTHENTIC KEY TRANSPORT IN SYMMETRIC CRYPTOGRAPHIC PROTOCOLS USING SOME ELLIPTIC CURVES OVER FINITE FIELDS International journal of mathematical archives, Google scholar, -2012, 3, 1-6

Fuzzy CMeans clustering for robust decentralized load frequency controlElsevier,Electrical Power and Energy Systems , Others, FEB-2012, 37, 58-66

Encryption of Data Streams using Pauli Spins 12 Matrices and Finite State MachineInternational Jouranal of computer Applications , Google scholar, JAN-2012, 37, 8-12

A Common fixed point theorem for two self maps on a cone metric space with wdistanceInternational Journal of Mathematics in Operational Research, Others, SEP-2012, 4, 689-697

A Fixed Point Theorem for Cone Convex Contractions of order m2International Journal of Mathematical Sciences and Engineering Applications , Others, JAN-2012, 6, 263-271

Secure Key Transport in Symmetric Cryptographic Protocolsusing Some Elliptic curvesInternational Journal of Computer Applications , Google scholar, DEC-2011, 36, 27-30

Cryptographic Scheme for Digital Signals using Finite State MachinesInternational Journal of Computer Applications , Google scholar, SEP-2011, 29, 61-63

ON NON METRIZABILITY OF CONE METRIC SPACESInt. J. of Mathematical Sciences and Applications , Others, SEP-2011, 1, 1533-1535

A Block Cipher Using Rotation and Logical XOR OperationsInternational Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011 , EBSCO Host, -2011, 6, 142-147

A Block Cipher Using Logical XNOR And NOT OperationsInternational Journal of Science and Advanced Technology , Google scholar, -2011, 1, 59-62

A fixed point theorem in cone metric spaces under weak contractionsGen.Math.Notes , Others, DEC-2011, 7, 38-44

A Block Cipher using Graph Structures and Logical XOR OperationInternational Journal of Computer Applications , Google scholar, -2011, 33, 6-10

A Cryptographic Scheme of Finite Fields Using Logical OperatorsInternational Journal of Computer Applications, Google scholar, -2011, 31, 1-4

Cyclic Groups of Elliptic Curves An Implementation to Cryptography International Journal of Advanced Research in Computer Science, Google scholar, -2011, 2, 544-546

A Study on Group Theoretic Elliptic Curves an Implementation to CryptographyInternational Journal of Science and Advanced Technology, Google scholar, -2011, 1, 6-9

A Cryptographic Scheme Of Laplace TransformsInternational Journal of Mathematical Archive, Google scholar, -2011, 2, 2515-2519

A Novel Encryption scheme based on Double Based Canonical Number SystemInternational Journal of Engineering Science and Technology , Others, -2010, 2, 1085-1087

ENCRYPTION OF DATA STREAMS USING PAULI SPINS MATRICESInternational Journal of Engineering Science and Technology , Google scholar, -2010, 2, 2020-2028

Self Encrypting data streams of digital signalInternational Journal of Computer and Network Security , Others, APR-2010, 2, 111-113

Fast Fourier Transforms and Quadratic forms for digital audio water markingIEEE , Others, MAY-2009, 1, 203-206

Self encrypting Data Streams using Graph StructuresIETECH international journal of advanced computations , Others, NOV-2008, 1, 7-9

Cryptographic scheme for digital signalsIETECH international journal of advanced computations , Others, NOV-2008, 1, 195-200

Cryptographic protection of Digital Signal Using some recurrence relationsIJCSNS , Others, MAY-2007, 1, 203-207

Some Algebraic Curves in public Key crypto systemsInternational Journal of Ultra Scientist of Physical Sciences , Others, MAY-2007, 1, 533-540

Data Encryption Tecgniques using random number generatorIEEE , Others, MAY-2007, 1, 576-579

Title of the bookBook / ChapterName of the publisherSubject areaEditionPage numbersISBNPublished year
Engineering MathematicsBookAcme learningMathematicsI978_93_80408_892012
Board nameJournal name
JNITMember of Journal of Next generation Information Technology
ournal of Computer Science Engineering and Software TestingMember of Journal of Computer Science Engineering and Software Testing
IJAMSSMember of International journal of Applied Mathematics and statistics Sciences
AISS KoreaMember of Advanced information & Services (AISS)
Board nameJournal name
Seminar nameOrganized byVenueStart dateEnd dateTitle of the paper presentedRoleCo presenter
NationalDeparment of Engineering MathematicsDeparment of Engineering Mathematics,college of engineering ANDHRA UN IVERSITY29-Jun-201130-Jun-2011Participated
NationalGITAM Institute of Technology Department of MathematicsGITAM University15-Apr-201116-Apr-2010Organized
NationalARTCOMKottayam28-Oct-200928-Oct-2009Participated
NationalVASAVI COLLEGE OF ENGINEERINGVasavi college of engineering10-Mar-200811-Mar-2008Participated
NationalDeparment of MathematicsOSMANIA UNIVERSITY18-Mar-200619-Mar-2006ON SMOOTH NUMBERS AND ROUGH NUMBERSParticipated
NationalISTAMNIT WARANGAL22-Dec-199925-Dec-1999Participated
Seminar nameOrganized byVenueStart dateEnd dateTitle of the paper presentedRoleCo presenter
InternationalGITAM Institute of Technology Department of MathematicsGITAM University15-Jul-201116-Apr-2011Organized
Title of the thesisName of the studentName of the college / universityMajor subject areaYear of admissionType of admissionThesis specification
A Study on Skewed Classical Ciphers for Robust Crypto _SystemsJayanthi SravaniGISCryptography2020Full timePhD
Title of the thesisName of the studentName of the college / universityMajor subject areaYear of admissionType of admissionThesis specification
Title of the thesisName of the studentName of the college / universityMajor subject areaYear of admissionType of admissionThesis specification
A STUDY OF A CRYPTOGRAPHIC SCHEME IN ALGEBRAIC STRUCTURES AN IMPLEMENTATION TO MULTI LEVEL ENCRYPTION SCHEMEV.ANUSHAMATHEMATICS2014Part timeM.Phil
CONTRIBUTIONS TO FIXED POINT THEORY IN CONE METRIC SPACESKAMBHAMPATI SUJATHAMATHEMATICS2013Part timePhD
A STUDY OF MULTIPLE ENCRYPTIONS FOR SYMMETRIC KEY CRYPTO SYSTEMS AN ANALYTIC APPROACH WITH IMPLEMENTATIONSS.ASHOK KUMARMATHEMATICS2013Part timePhD
A STUDY ON CYCLIC GROUPS OF ELLIPTIC CURVESAN IMPLEMENTATION TO CRYPTOGRAPHYG.SIVANAGA MALLESWAR RAOMATHEMATICS2011Part timeM.Phil
SOME CONTRIBUTIONS TO FIXED POINT THEORY IN CONE METRIC SPACESMOTHUKURI BALAIAHMATHEMATICS2010Part timePhD
Applications of Mathematical Techniques in CryptosystemsCh.SUNEETHAMATHEMATICS2010Part timePhD
CRYPTOGRAPHIC SCHEMES OF QUADRATIC FORMSG.NAGA LAKSHMIMATHEMATICS2009Part timeM.Phil
A STUDY ON GROUP THEORETIC ELLIPTIC CURVE CRYPTOSYSTEMPATCHA VENKATESWAR RAOMATHEMATICS2009Part timeM.Phil
Name of the awardAwarded byAwarded year
Best TeacherDepartment of Computer science2010
TitleTypeOrganized byVenueStart dateEnd dateRole
National Instructional workshop on on CryptologyQuality improvement programCryptologyResearch Society of INDIA,KOLKATADeparment of Computer Science,college of engineering ANDHRA UN IVERSITY10-Mar-201712-Mar-2017Participated
National workshop on Applications of advanced Mathematics in Engineering and ScienceQuality improvement programDeparment of Engineering MathematicsDeparment of Engineering Mathematics,college of engineering ANDHRA UN IVERSITY28-Feb-201701-Mar-2017Participated
Refresher courseFaculty development programANDHRA UNIVERSITYACADEMIC STAFF COLLEGE22-Dec-200311-Jan-2004Participated
TitleTypeOrganized byVenueStart dateEnd dateRole
Title of the lectureName of the college / universityPlaceDate
Mathematical models in CryptographyBERHAMPUR UNIVERSITYBERHAMPUR22-Dec-2010
TitleApplication numberCategorySubmitted date
TitleApplication numberCategorySubmitted date
TitleApplication numberCategorySubmitted date
Design of an Asymmetrical Multilevel Inverter Using Cascaded H Bridges202141029277Indian29 Jun, 2021
Graphical, Hierarchical and Orthogonal Maximum Power Point Tracking Statecharts for Photovoltaic System202141020890Indian07 May, 2021