Chivukula Suneetha

Chivukula Suneetha

Associate Professor, Appmaths, GSS, VSP

Education
Ph. D.
Email ID
schivuku@gitam.edu
Education
Ph. D.
Research Areas
  • Cryptography
  • Algebra

Education

Degree NameInstitute & College nameYear of Graduation/Award
APPLICATION OF SOIME MATHEMATICAL TECHNIQUES IN CRYPTOSYSTEMSGITAM UNIVERSITY2013
ALGEBREMK UNIVERSITY2005
UGC CSIR NETCSIR2002
M.Sc.SV University college of arts and sciences1991
B.ScVR College Nellore1989

Experience

DesignationOrganizationFrom DateTo Date
lecturergovernment degree college20-11-200031-03-2006

Awards

Award nameAward OrganizationAwarded year
University First RankSV University, Tirupathi1993
National Merit ScholarshipGovernment of India1989
Telugu Vignana ParithoshikamAP State Government1987

DIGITAL SIGNATURE ALGORITHM TO MAINTAIN PERFECT FORWARD SECRECY (PFS) USING HYPERELLIPTIC CURVE CRYPTOSYSTEMJournal of Design Engineering, Scopus, JUL-2021, 2021, 1584-1593

Implementation of double fold text encryption based on elliptic curve cryptography (ECC) with digital signature International journal of recent technology and engineering, Scopus, JAN-2020, 8, 3840-3846

Reductions of the cipher size of elliptic curve cryptographyJournal of advanced research in dynamical and control systems, Scopus, MAR-2020, 12, 1211-1217

ELLIPTIC CURVE CRYPTOGRAPHY WITH A SPECIAL FOCUS ON REDUCTION OF THE CIPHER SIZE USING CHEBYSHEV POLYNOMIALJOURNAL OF TEST ENGINEERING AND MANAGEMENT, Scopus, APR-2020, 83, 13645-13654

A comprehensive survey of best practices of moving sensitive data using cryptographic aspects for securing communication in wireless IOT and wired unsecure networkJournal of Critical Reviews, Scopus, JUL-2020, 7, 1891-1900

Survey of professional procedures of moving Sensitive data using cryptographic methods for securing communication in Wireless network systemsInternational journal of future generation communication and networking, Web of science, AUG-2020, 13, 2968-2978

A two phase block Cipher based on graph structure with Linear Feedback Shift Register (LFSR) as diffusion layerJournal of Critical Reviews, Scopus, AUG-2020, 7, 3956-3963

Fixed size text based encryption using elliptic curve CryptographyJournal of solid state technology, Scopus, OCT-2020, 63, 2964-2973

New password embedding technique using elliptic curve over finite fieldAdvances in intelligent systems and computing , Scopus, -2019, 906, 1-11

cryptographic key communication protocol using elliptic curve over finite field using nested construction of Hash message authentication codeinternational journal of advanced research in computer science, Google scholar, -2018, 9, 605-609

307New Random Walk Technique and Collision Detection Algorithm to Improve the Pollard RHO Attack of Solving Discrete Logarithm Problem on Elliptic CurvesInternational Journal of Mathematics Trends and Technolog, Google scholar, -2018, 56, 307-319

Safe communication and custody of the password using Elliptic Curve over finite fieldInternational Journal of Pure and Applied Mathematics 13143395 (online version) url httpwww.acadpubl.euhub, Scopus, -2018, 119, 1043-1049

Symmetric Stream Cipher Based On Chebyshev PolynomialInternational Journal Of Engineering And Computer Science, Google scholar, -2017, 6, 21650-656

Security and Authentication Architecture of block cipher using Mathematical operation and one way hash functionInternational Journal of Mathematics Trends and Technology, Citeseer, -2017, 49, 226-231

Secure Cryptosystem based on Braiding Entanglement of Pauli 32 MatricesInternational Journal of Computer Applications June 2016, Google scholar, -2016, 143 , 37-41

CASCADE BLOCK CIPHER USING BRAIDING ENTANGLEMENT OF SPIN MATRICES AND BIT ROTATIONInternational Journal of Network Security & Its Applications, EBSCO Host, -2016, 8, 71-84

SECURE CRYPTOSYSTEM BASED ON BRAIDING ENTANGLEMENT OF PAULI 52 MATRICESBulletin of mathematics and statistics research, Google scholar, -2016, 4, 41-51

SECURE CRYPTOSYSTEM BASED ON BRAIDING ENTANGLEMENT OF PAULI 52MATRICESBulletin of Mathematics and Statistics Research, Google scholar, -2016, 4, 41-51

Novel encryption schemes based on catalan numbersInternational Journal of Engineering Research and Applications, Google scholar, -2012, 2, 161-166

AUTHENTIC KEY TRANSPORT IN SYMMETRIC CRYPTOGRAPHIC PROTOCOLS USING SOME ELLIPTIC CURVES OVER FINITE FIELDSInternational Journal of Mathematical Archives, Google scholar, -2012, 3, 1-6

ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDSInternational Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012, Google scholar, -2012, 3, 301-308

(IJERA) ISSN Vol. 2, Issue 1, JanFeb 2012, pp. 417425417 P a g eA KeyScheduled Block Cipher Using elementwise LinearTransformation and Logical XOR OperationInternational Journal of Engineering Research and Applications, Citeseer, -2012, 2, 417-425

A Block Cipher using Graph Structures and Logical XOR OperationInternational Journal of Computer Applications (0975 8887) Volume 33 No.7, November 2011, EBSCO Host, -2011, 33, 6-10

A Block Cipher using Graph Structures and Logical XOR OperationInternational Journal of Computer Applications, EBSCO Host, -2011, 33, 6-10

A Block Cipher using logical XNOR and NOT OperationsInternational journal of Science and Advanced technology, Google scholar, -2011, 1, 59-62

Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fieldsInternational Journal of Computer Applications , EBSCO Host, -2011, 36, 27-30

Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fieldsInternational Journal of Computer Applications , EBSCO Host, -2011, 36, 27-30

A Block Cipher Using Rotation and Logical XOROperations International Journal of Computer Science Issues www.IJCSI.org, Google scholar, -2011, 8, 142-147

Cryptographic scheme of finite fields using logical operatorsInternational journal computer applications, Google scholar, -2011, 31, 1-4

A Novel encryption scheme based on double based number systsemInternational Journal of Engineering Science and Technology , Google scholar, -2010, 2, 1085-1087

ENCRYPTION OF DATA STREAMS USING PAULI SPINS MATRICESInternational Journal of Engineering Science and Technology, Google scholar, -2010, 2, 2020-2028

self encrypting data streams for digital signalsinternational journal of computer and network security, Google scholar, -2010, 2, 111-113

Fast Fourier transforms and quadratic forms for digital audio watermarking IEEE international conference on advances in recent technologies in communication and computing, Google scholar, -2009, 978, 449-452

Title of the projectFunded byDurationSanctioned date
Title of the projectFunded byDurationSanctioned date
encryption for data security using mathematical techniqueGITAM1227-Mar-2010
Board nameJournal name
Board nameJournal name
ReviewersInternational journal network security and its applications
Seminar nameOrganized byVenueStart dateEnd dateTitle of the paper presentedRoleCo presenter
NationalSMSMSSt. Joseph college, Visakhapatnam15-Nov-201916-Nov-2019Participated
NationalGITAM VIZAGGITAM VIZAG27-Dec-201229-Dec-2012Participated
NationalGITAM VIZAGGITAM VIZAG15-Mar-201116-Mar-2011Participated
NationalUGC DSTMrs. AVN college, Visakhapatnam11-Dec-200913-Dec-2009Participated
Seminar nameOrganized byVenueStart dateEnd dateTitle of the paper presentedRoleCo presenter
InternationalNotte Meenakshi Institute of Technology, BangaloreNotte Meenakshi Institute of Technology, Bangalore28-Jul-201829-Jul-2018New password embedding technique using Elliptic curve over finite fieldsParticipated
InternationalNMIT BANGALORENMIT BANGALORE27-Jul-201828-Jul-2018New Password Embedding technique using elliptic curve over finite fieldParticipatedD. Sravana Kumar
InternationalNIT RourkelaNIT Rourkela11-Jan-201013-Jan-2010Cryptographic schemes using Boolean matricesParticipatedD. Sravana Kumar
Title of the thesisName of the studentName of the college / universityMajor subject areaYear of admissionType of admissionThesis specification
PURSUINGCH. NEELIMAGITAM UniversityCryptographyPart timePhD
Title of the thesisName of the studentName of the college / universityMajor subject areaYear of admissionType of admissionThesis specification
Title of the thesisName of the studentName of the college / universityMajor subject areaYear of admissionType of admissionThesis specification
APPLICATION OF ELLIPTIC CURVES AND SOME OTHER MATHEMATICAL TECHNIQUES IN CRYPTOSYSTEMSB. SIRISHAGITAM UNIVERSITYCRYPTOGRAPHY2019Part timePhD
Name of the awardAwarded byAwarded year
Prof. M. Satyanarayana prizeSV University Tirupathi1993
TitleTypeOrganized byVenueStart dateEnd dateRole
National workshop on mathematical techniques in engineering poblemsTraining of tutorsGMRIT RAJAMGMRIT RAJAM06-Nov-200907-Nov-2009Participated
Workshop on Algebra and AnalysisTraining of tutorsGVP Degree college VizagGVP Degree college Vizag24-Mar-200824-Mar-2008Participated
TitleTypeOrganized byVenueStart dateEnd dateRole