
Chandra Sekhar A.
Professor, Mathematics, GSS , VSP
Education
Ph. D.Email ID
Education
Ph. D.Research Areas
- Number Theory
- Cryptography
Office room coordinates
Bulding Name: MVB,Floor NO: Select, Room No: 406.Consulting hours
SelectList of courses
IMSCEducation
Degree Name | Institute & College name | Year of Graduation/Award |
---|---|---|
On Some Arithmetic operations on Finite Fields and Recurrence RelationsApplications to CryptSystems | JNTU Hyderabad | 2008 |
Fluid Mechanics | ANDHRA UNVERSITY | 2000 |
MSc | 1990 | |
BSc | 1987 |
Experience
Designation | Organization | From Date | To Date |
---|---|---|---|
LECTURER | GVP Degree college | 06-09-1991 | 31-10-1995 |
Enhancing eBanking Security of Two Factor Authentication using Elliptic Curve Cryptography with Laplace TransformSolid State Technology, Scopus, FEB-2021, 64, 979-995
An implementation of ElGamal scheme for Laplace transform cryptosystem Indian Journal of Computer Science and Engineering, Scopus, FEB-2020, 11, 48-56
An Implementation of ElGamal Scheme for Laplace Transform Cryptosystem Indian JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, Scopus, NOV-2020, 11, 48-56
Enhancing the data security by using RSA algorithm with application of laplace transform cryptosystemInternational Journal of Recent Technology and Engineering, Scopus, JUL-2019, 8, 6142-6147
Dynamic stability margin evaluation of multimachine power systems using genetic algorithmAdvances in Intelligent Systems and Computing, Scopus, MAY-2018, 628, 1-16
A Diffie Hellman key exchange for self encryption over points on the Elliptic curve CryptographyJournal of Information and Computing Science, Google scholar, -2017, 12, 83-87
An Encryption Scheme of points on the Elliptic Curve and Golden MatricesAsian Journal Mathematics and Computer research, Google scholar, -2017, 15, 113-122
Multiple Encryptions of Fibonacci Lucas transformationsIOSR Journal of Mathematics (IOSRJM), Others, -2016, Volume 12,, 66-72
MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERSInternational Journal of Engineering Science Invention Research & Development, Others, -2016, II, 582-588
Symmetric Key Cryptosystem for Multiple EncryptionsInternational Journal of Mathematics Trends and Technology, Others, -2016, 29, 140-146
MULTIPLE ENCRYPTIONS OF INDEPENDENT CIPHERSInternational Journal of Mathematical Archive, Others, -2016, 7, 103-110
TRIPLE ENCRYPTION OF MULTIPLE KEYS FOR SYMMETRIC KEY CRYPTO SYSTEMSInternational Journal of DEVELOPMENT RESEARCH, Others, -2016, 6, 7079-7089
Triple Encryption Scheme Using two Independent KeysInternational Journal of Engineering Science and Technology (IJEST), Others, -2016, 8, 60-64
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesCOMPUSOFT, An international journal of advanced computer technology, Google scholar, -2015, 4, 1548-1554
Linearly independent spanning sets and linear transformations for Multilevel EncryptionJournal of Information and Optimization Sciences, Others, -2015, Online, 01-10
A Novel ElGamal Encryption Scheme of Elliptic Curve CryptographyInternational Journal of Computer Trends and Technology, Google scholar, -2015, 20, 70-73
An ElGamal Encryption of Finite State Machines and points on the Elliptic CurveJournal of theoretical physics & Cryptography, Google scholar, -2015, 9, 1-5
An ElGamal Encryption Scheme of Pauli Spin Matrices and Finite MachinesInternational Journal of Mechatronics, Electrical and Computer Technology (IJMEC), Google scholar, -2015, 5, 2577-2584
An Elgamal Encryption scheme of Fibonacci Q Matrix and Finite State MachineJournal of Applied Computer Science & Mathematics, Google scholar, -2015, 20, 13-17
Fixed Point Theorems For A Self Map In Ordered Cone Metric Space Under Lattice Ordered CDistanceInternational journal of micro circuits and electronic, Others, SEP-2015, 6, 1-14
Fixed Point Theorems For A Self Map In Ordered Cone Metric Space Under Lattice Ordered CDistanceInternational journal of micro circuits and electronic, Others, SEP-2015, 6, 1-14
CRYPTOGRAPHIC SECRET SHARING SCHEME OF FINITE STATE MACHINES USING LU DECOMPOSITIONInternational journal of Mathematical Archive , Others, MAR-2013, 4, 209-214
Application of Mealy machine and Recurrence Matrices in CryptologyInternational Journal of Computer Science and Management Research, Others, SEP-2013, 2, 2656-2661
Application of Mealy machine and Recurrence Matrices in cryptographyinternational Journal of computer science and management research, Others, JUN-2013, 2, 2656-2661
A fixed point theorem in a lattice ordered semigroup cone valued cone metric spacesJournal of Non linear Science and Applications, Google scholar, APR-2013, 1, 285-292
EXISTENCE OF COMMON FIXED POINTS FOR A PAIR OF SELF MAPS ON A CONE Advances in Fixed Point Theory , Others, MAR-2013, 1, 49-59
A coincidence point theorem for a pair of self maps on a partially ordered cone metric Journal of Advanced Research in Pure Mathematics , Others, MAR-2013, 5, 98-106
Finite State Machines and Recurrence Matrices of CryptologyIJMA , Others, MAY-2013, 1, 219-222
A Novel Encryption Scheme for Secure Communication using Mealay MachineIJMA , Others, MAY-2013, 4, 223-228
Application Of Mealy Machine And Recurrence Relations In CryptographyInternational Journal of Engineering Research & Technology, Others, MAY-2013, 2, 1286-1290
A NOVEL ENCRYPTION FOR SECRET SHARING USING FINITE STATE MACHINEInternational Journal of Mathematical Archieve, Others, MAY-2013, 4, 267-272
A Common fixed point theorem in metric spaces for an asymptotically regular self mapsInternational Journal of pure Algebra, Google scholar, SEP-2013, 3, 1-5
A One to One Correspondence in Elliptic curve CryptographyInternational Journal of Mathematical Archive, Google scholar, -2013, 4, 300-304
Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fieldsInternational Journal of Computer Applications, Google scholar, -2012, 36, 27-30
ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDSInternational Journal of Distributed and Parallel Systems , Google scholar, -2012, 3, 301-308
A Key Scheduled Block Cipher Using element wise Linear Transformation and Logical XOR OperationInternational Journal of Engineering Research and Applications , Google scholar, -2012, 2, 417-425
CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDSInternational Journal of Engineering Science and Technology , Google scholar, -2012, 4, 81-86
AUTHENTIC KEY TRANSPORT IN SYMMETRIC CRYPTOGRAPHIC PROTOCOLS USING SOME ELLIPTIC CURVES OVER FINITE FIELDS International journal of mathematical archives, Google scholar, -2012, 3, 1-6
Fuzzy CMeans clustering for robust decentralized load frequency controlElsevier,Electrical Power and Energy Systems , Others, FEB-2012, 37, 58-66
Encryption of Data Streams using Pauli Spins 12 Matrices and Finite State MachineInternational Jouranal of computer Applications , Google scholar, JAN-2012, 37, 8-12
A Common fixed point theorem for two self maps on a cone metric space with wdistanceInternational Journal of Mathematics in Operational Research, Others, SEP-2012, 4, 689-697
A Fixed Point Theorem for Cone Convex Contractions of order m2International Journal of Mathematical Sciences and Engineering Applications , Others, JAN-2012, 6, 263-271
Secure Key Transport in Symmetric Cryptographic Protocolsusing Some Elliptic curvesInternational Journal of Computer Applications , Google scholar, DEC-2011, 36, 27-30
Cryptographic Scheme for Digital Signals using Finite State MachinesInternational Journal of Computer Applications , Google scholar, SEP-2011, 29, 61-63
ON NON METRIZABILITY OF CONE METRIC SPACESInt. J. of Mathematical Sciences and Applications , Others, SEP-2011, 1, 1533-1535
A Block Cipher Using Rotation and Logical XOR OperationsInternational Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011 , EBSCO Host, -2011, 6, 142-147
A Block Cipher Using Logical XNOR And NOT OperationsInternational Journal of Science and Advanced Technology , Google scholar, -2011, 1, 59-62
A fixed point theorem in cone metric spaces under weak contractionsGen.Math.Notes , Others, DEC-2011, 7, 38-44
A Block Cipher using Graph Structures and Logical XOR OperationInternational Journal of Computer Applications , Google scholar, -2011, 33, 6-10
A Cryptographic Scheme of Finite Fields Using Logical OperatorsInternational Journal of Computer Applications, Google scholar, -2011, 31, 1-4
Cyclic Groups of Elliptic Curves An Implementation to Cryptography International Journal of Advanced Research in Computer Science, Google scholar, -2011, 2, 544-546
A Study on Group Theoretic Elliptic Curves an Implementation to CryptographyInternational Journal of Science and Advanced Technology, Google scholar, -2011, 1, 6-9
A Cryptographic Scheme Of Laplace TransformsInternational Journal of Mathematical Archive, Google scholar, -2011, 2, 2515-2519
A Novel Encryption scheme based on Double Based Canonical Number SystemInternational Journal of Engineering Science and Technology , Others, -2010, 2, 1085-1087
ENCRYPTION OF DATA STREAMS USING PAULI SPINS MATRICESInternational Journal of Engineering Science and Technology , Google scholar, -2010, 2, 2020-2028
Self Encrypting data streams of digital signalInternational Journal of Computer and Network Security , Others, APR-2010, 2, 111-113
Fast Fourier Transforms and Quadratic forms for digital audio water markingIEEE , Others, MAY-2009, 1, 203-206
Self encrypting Data Streams using Graph StructuresIETECH international journal of advanced computations , Others, NOV-2008, 1, 7-9
Cryptographic scheme for digital signalsIETECH international journal of advanced computations , Others, NOV-2008, 1, 195-200
Cryptographic protection of Digital Signal Using some recurrence relationsIJCSNS , Others, MAY-2007, 1, 203-207
Some Algebraic Curves in public Key crypto systemsInternational Journal of Ultra Scientist of Physical Sciences , Others, MAY-2007, 1, 533-540
Data Encryption Tecgniques using random number generatorIEEE , Others, MAY-2007, 1, 576-579
Title of the book | Book / Chapter | Name of the publisher | Subject area | Edition | Page numbers | ISBN | Published year |
---|---|---|---|---|---|---|---|
Engineering Mathematics | Book | Acme learning | Mathematics | I | 978_93_80408_89 | 2012 |
Board name | Journal name |
---|---|
JNIT | Member of Journal of Next generation Information Technology |
ournal of Computer Science Engineering and Software Testing | Member of Journal of Computer Science Engineering and Software Testing |
IJAMSS | Member of International journal of Applied Mathematics and statistics Sciences |
AISS Korea | Member of Advanced information & Services (AISS) |
Board name | Journal name |
---|
Seminar name | Organized by | Venue | Start date | End date | Title of the paper presented | Role | Co presenter |
---|---|---|---|---|---|---|---|
National | Deparment of Engineering Mathematics | Deparment of Engineering Mathematics,college of engineering ANDHRA UN IVERSITY | 29-Jun-2011 | 30-Jun-2011 | Participated | ||
National | GITAM Institute of Technology Department of Mathematics | GITAM University | 15-Apr-2011 | 16-Apr-2010 | Organized | ||
National | ARTCOM | Kottayam | 28-Oct-2009 | 28-Oct-2009 | Participated | ||
National | VASAVI COLLEGE OF ENGINEERING | Vasavi college of engineering | 10-Mar-2008 | 11-Mar-2008 | Participated | ||
National | Deparment of Mathematics | OSMANIA UNIVERSITY | 18-Mar-2006 | 19-Mar-2006 | ON SMOOTH NUMBERS AND ROUGH NUMBERS | Participated | |
National | ISTAM | NIT WARANGAL | 22-Dec-1999 | 25-Dec-1999 | Participated |
Seminar name | Organized by | Venue | Start date | End date | Title of the paper presented | Role | Co presenter |
---|---|---|---|---|---|---|---|
International | GITAM Institute of Technology Department of Mathematics | GITAM University | 15-Jul-2011 | 16-Apr-2011 | Organized |
Title of the thesis | Name of the student | Name of the college / university | Major subject area | Year of admission | Type of admission | Thesis specification |
---|---|---|---|---|---|---|
A Study on Skewed Classical Ciphers for Robust Crypto _Systems | Jayanthi Sravani | GIS | Cryptography | 2020 | Full time | PhD |
Title of the thesis | Name of the student | Name of the college / university | Major subject area | Year of admission | Type of admission | Thesis specification |
---|
Title of the thesis | Name of the student | Name of the college / university | Major subject area | Year of admission | Type of admission | Thesis specification |
---|---|---|---|---|---|---|
A STUDY OF A CRYPTOGRAPHIC SCHEME IN ALGEBRAIC STRUCTURES AN IMPLEMENTATION TO MULTI LEVEL ENCRYPTION SCHEME | V.ANUSHA | MATHEMATICS | 2014 | Part time | M.Phil | |
CONTRIBUTIONS TO FIXED POINT THEORY IN CONE METRIC SPACES | KAMBHAMPATI SUJATHA | MATHEMATICS | 2013 | Part time | PhD | |
A STUDY OF MULTIPLE ENCRYPTIONS FOR SYMMETRIC KEY CRYPTO SYSTEMS AN ANALYTIC APPROACH WITH IMPLEMENTATIONS | S.ASHOK KUMAR | MATHEMATICS | 2013 | Part time | PhD | |
A STUDY ON CYCLIC GROUPS OF ELLIPTIC CURVESAN IMPLEMENTATION TO CRYPTOGRAPHY | G.SIVANAGA MALLESWAR RAO | MATHEMATICS | 2011 | Part time | M.Phil | |
SOME CONTRIBUTIONS TO FIXED POINT THEORY IN CONE METRIC SPACES | MOTHUKURI BALAIAH | MATHEMATICS | 2010 | Part time | PhD | |
Applications of Mathematical Techniques in Cryptosystems | Ch.SUNEETHA | MATHEMATICS | 2010 | Part time | PhD | |
CRYPTOGRAPHIC SCHEMES OF QUADRATIC FORMS | G.NAGA LAKSHMI | MATHEMATICS | 2009 | Part time | M.Phil | |
A STUDY ON GROUP THEORETIC ELLIPTIC CURVE CRYPTOSYSTEM | PATCHA VENKATESWAR RAO | MATHEMATICS | 2009 | Part time | M.Phil |
Name of the award | Awarded by | Awarded year |
---|---|---|
Best Teacher | Department of Computer science | 2010 |
Title | Type | Organized by | Venue | Start date | End date | Role |
---|---|---|---|---|---|---|
National Instructional workshop on on Cryptology | Quality improvement program | CryptologyResearch Society of INDIA,KOLKATA | Deparment of Computer Science,college of engineering ANDHRA UN IVERSITY | 10-Mar-2017 | 12-Mar-2017 | Participated |
National workshop on Applications of advanced Mathematics in Engineering and Science | Quality improvement program | Deparment of Engineering Mathematics | Deparment of Engineering Mathematics,college of engineering ANDHRA UN IVERSITY | 28-Feb-2017 | 01-Mar-2017 | Participated |
Refresher course | Faculty development program | ANDHRA UNIVERSITY | ACADEMIC STAFF COLLEGE | 22-Dec-2003 | 11-Jan-2004 | Participated |
Title | Type | Organized by | Venue | Start date | End date | Role |
---|
Title of the lecture | Name of the college / university | Place | Date |
---|---|---|---|
Mathematical models in Cryptography | BERHAMPUR UNIVERSITY | BERHAMPUR | 22-Dec-2010 |
Title | Application number | Category | Submitted date |
---|
Title | Application number | Category | Submitted date |
---|
Title | Application number | Category | Submitted date |
---|---|---|---|
Design of an Asymmetrical Multilevel Inverter Using Cascaded H Bridges | 202141029277 | Indian | 29 Jun, 2021 |
Graphical, Hierarchical and Orthogonal Maximum Power Point Tracking Statecharts for Photovoltaic System | 202141020890 | Indian | 07 May, 2021 |