
Suneetha Ch.
Associate Professor, Mathematics, GSS , VSP
Education
Ph. D.Email ID
Education
Ph. D.Research Areas
- Cryptography
- Algebra
Education
Degree Name | Institute & College name | Year of Graduation/Award |
---|---|---|
APPLICATION OF SOIME MATHEMATICAL TECHNIQUES IN CRYPTOSYSTEMS | GITAM UNIVERSITY | 2013 |
ALGEBRE | MK UNIVERSITY | 2005 |
UGC CSIR NET | CSIR | 2002 |
M.Sc. | SV University college of arts and sciences | 1991 |
B.Sc | VR College Nellore | 1989 |
Experience
Designation | Organization | From Date | To Date |
---|---|---|---|
lecturer | government degree college | 20-11-2000 | 31-03-2006 |
Awards
Award name | Award Organization | Awarded year |
---|---|---|
University First Rank | SV University, Tirupathi | 1993 |
National Merit Scholarship | Government of India | 1989 |
Telugu Vignana Parithoshikam | AP State Government | 1987 |
DIGITAL SIGNATURE ALGORITHM TO MAINTAIN PERFECT FORWARD SECRECY (PFS) USING HYPERELLIPTIC CURVE CRYPTOSYSTEMJournal of Design Engineering, Scopus, JUL-2021, 2021, 1584-1593
Implementation of double fold text encryption based on elliptic curve cryptography (ECC) with digital signature International journal of recent technology and engineering, Scopus, JAN-2020, 8, 3840-3846
Reductions of the cipher size of elliptic curve cryptographyJournal of advanced research in dynamical and control systems, Scopus, MAR-2020, 12, 1211-1217
ELLIPTIC CURVE CRYPTOGRAPHY WITH A SPECIAL FOCUS ON REDUCTION OF THE CIPHER SIZE USING CHEBYSHEV POLYNOMIALJOURNAL OF TEST ENGINEERING AND MANAGEMENT, Scopus, APR-2020, 83, 13645-13654
A comprehensive survey of best practices of moving sensitive data using cryptographic aspects for securing communication in wireless IOT and wired unsecure networkJournal of Critical Reviews, Scopus, JUL-2020, 7, 1891-1900
Survey of professional procedures of moving Sensitive data using cryptographic methods for securing communication in Wireless network systemsInternational journal of future generation communication and networking, Web of science, AUG-2020, 13, 2968-2978
A two phase block Cipher based on graph structure with Linear Feedback Shift Register (LFSR) as diffusion layerJournal of Critical Reviews, Scopus, AUG-2020, 7, 3956-3963
Fixed size text based encryption using elliptic curve CryptographyJournal of solid state technology, Scopus, OCT-2020, 63, 2964-2973
New password embedding technique using elliptic curve over finite fieldAdvances in intelligent systems and computing , Scopus, -2019, 906, 1-11
cryptographic key communication protocol using elliptic curve over finite field using nested construction of Hash message authentication codeinternational journal of advanced research in computer science, Google scholar, -2018, 9, 605-609
307New Random Walk Technique and Collision Detection Algorithm to Improve the Pollard RHO Attack of Solving Discrete Logarithm Problem on Elliptic CurvesInternational Journal of Mathematics Trends and Technolog, Google scholar, -2018, 56, 307-319
Safe communication and custody of the password using Elliptic Curve over finite fieldInternational Journal of Pure and Applied Mathematics 13143395 (online version) url httpwww.acadpubl.euhub, Scopus, -2018, 119, 1043-1049
Symmetric Stream Cipher Based On Chebyshev PolynomialInternational Journal Of Engineering And Computer Science, Google scholar, -2017, 6, 21650-656
Security and Authentication Architecture of block cipher using Mathematical operation and one way hash functionInternational Journal of Mathematics Trends and Technology, Citeseer, -2017, 49, 226-231
Secure Cryptosystem based on Braiding Entanglement of Pauli 32 MatricesInternational Journal of Computer Applications June 2016, Google scholar, -2016, 143 , 37-41
CASCADE BLOCK CIPHER USING BRAIDING ENTANGLEMENT OF SPIN MATRICES AND BIT ROTATIONInternational Journal of Network Security & Its Applications, EBSCO Host, -2016, 8, 71-84
SECURE CRYPTOSYSTEM BASED ON BRAIDING ENTANGLEMENT OF PAULI 52 MATRICESBulletin of mathematics and statistics research, Google scholar, -2016, 4, 41-51
SECURE CRYPTOSYSTEM BASED ON BRAIDING ENTANGLEMENT OF PAULI 52MATRICESBulletin of Mathematics and Statistics Research, Google scholar, -2016, 4, 41-51
Novel encryption schemes based on catalan numbersInternational Journal of Engineering Research and Applications, Google scholar, -2012, 2, 161-166
AUTHENTIC KEY TRANSPORT IN SYMMETRIC CRYPTOGRAPHIC PROTOCOLS USING SOME ELLIPTIC CURVES OVER FINITE FIELDSInternational Journal of Mathematical Archives, Google scholar, -2012, 3, 1-6
ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDSInternational Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012, Google scholar, -2012, 3, 301-308
(IJERA) ISSN Vol. 2, Issue 1, JanFeb 2012, pp. 417425417 P a g eA KeyScheduled Block Cipher Using elementwise LinearTransformation and Logical XOR OperationInternational Journal of Engineering Research and Applications, Citeseer, -2012, 2, 417-425
A Block Cipher using Graph Structures and Logical XOR OperationInternational Journal of Computer Applications (0975 8887) Volume 33 No.7, November 2011, EBSCO Host, -2011, 33, 6-10
A Block Cipher using Graph Structures and Logical XOR OperationInternational Journal of Computer Applications, EBSCO Host, -2011, 33, 6-10
A Block Cipher using logical XNOR and NOT OperationsInternational journal of Science and Advanced technology, Google scholar, -2011, 1, 59-62
Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fieldsInternational Journal of Computer Applications , EBSCO Host, -2011, 36, 27-30
Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fieldsInternational Journal of Computer Applications , EBSCO Host, -2011, 36, 27-30
A Block Cipher Using Rotation and Logical XOROperations International Journal of Computer Science Issues www.IJCSI.org, Google scholar, -2011, 8, 142-147
Cryptographic scheme of finite fields using logical operatorsInternational journal computer applications, Google scholar, -2011, 31, 1-4
A Novel encryption scheme based on double based number systsemInternational Journal of Engineering Science and Technology , Google scholar, -2010, 2, 1085-1087
ENCRYPTION OF DATA STREAMS USING PAULI SPINS MATRICESInternational Journal of Engineering Science and Technology, Google scholar, -2010, 2, 2020-2028
self encrypting data streams for digital signalsinternational journal of computer and network security, Google scholar, -2010, 2, 111-113
Fast Fourier transforms and quadratic forms for digital audio watermarking IEEE international conference on advances in recent technologies in communication and computing, Google scholar, -2009, 978, 449-452
Title of the project | Funded by | Duration | Sanctioned date |
---|
Title of the project | Funded by | Duration | Sanctioned date |
---|---|---|---|
encryption for data security using mathematical technique | GITAM | 12 | 27-Mar-2010 |
Board name | Journal name |
---|
Board name | Journal name |
---|---|
Reviewers | International journal network security and its applications |
Seminar name | Organized by | Venue | Start date | End date | Title of the paper presented | Role | Co presenter |
---|---|---|---|---|---|---|---|
National | SMSMS | St. Joseph college, Visakhapatnam | 15-Nov-2019 | 16-Nov-2019 | Participated | ||
National | GITAM VIZAG | GITAM VIZAG | 27-Dec-2012 | 29-Dec-2012 | Participated | ||
National | GITAM VIZAG | GITAM VIZAG | 15-Mar-2011 | 16-Mar-2011 | Participated | ||
National | UGC DST | Mrs. AVN college, Visakhapatnam | 11-Dec-2009 | 13-Dec-2009 | Participated |
Seminar name | Organized by | Venue | Start date | End date | Title of the paper presented | Role | Co presenter |
---|---|---|---|---|---|---|---|
International | Notte Meenakshi Institute of Technology, Bangalore | Notte Meenakshi Institute of Technology, Bangalore | 28-Jul-2018 | 29-Jul-2018 | New password embedding technique using Elliptic curve over finite fields | Participated | |
International | NMIT BANGALORE | NMIT BANGALORE | 27-Jul-2018 | 28-Jul-2018 | New Password Embedding technique using elliptic curve over finite field | Participated | D. Sravana Kumar |
International | NIT Rourkela | NIT Rourkela | 11-Jan-2010 | 13-Jan-2010 | Cryptographic schemes using Boolean matrices | Participated | D. Sravana Kumar |
Title of the thesis | Name of the student | Name of the college / university | Major subject area | Year of admission | Type of admission | Thesis specification |
---|---|---|---|---|---|---|
PURSUING | CH. NEELIMA | GITAM University | Cryptography | Part time | PhD |
Title of the thesis | Name of the student | Name of the college / university | Major subject area | Year of admission | Type of admission | Thesis specification |
---|
Title of the thesis | Name of the student | Name of the college / university | Major subject area | Year of admission | Type of admission | Thesis specification |
---|---|---|---|---|---|---|
APPLICATION OF ELLIPTIC CURVES AND SOME OTHER MATHEMATICAL TECHNIQUES IN CRYPTOSYSTEMS | B. SIRISHA | GITAM UNIVERSITY | CRYPTOGRAPHY | 2019 | Part time | PhD |
Name of the award | Awarded by | Awarded year |
---|---|---|
Prof. M. Satyanarayana prize | SV University Tirupathi | 1993 |
Title | Type | Organized by | Venue | Start date | End date | Role |
---|---|---|---|---|---|---|
National workshop on mathematical techniques in engineering poblems | Training of tutors | GMRIT RAJAM | GMRIT RAJAM | 06-Nov-2009 | 07-Nov-2009 | Participated |
Workshop on Algebra and Analysis | Training of tutors | GVP Degree college Vizag | GVP Degree college Vizag | 24-Mar-2008 | 24-Mar-2008 | Participated |
Title | Type | Organized by | Venue | Start date | End date | Role |
---|