Suneetha Ch.

Suneetha Ch.

Associate Professor, Mathematics, GSS , VSP

Education
Ph. D.
Email ID
schivuku@gitam.edu
Education
Ph. D.
Research Areas
  • Cryptography
  • Algebra

Education

Degree Name Institute & College name Year of Graduation/Award
APPLICATION OF SOIME MATHEMATICAL TECHNIQUES IN CRYPTOSYSTEMS GITAM UNIVERSITY 2013
ALGEBRE MK UNIVERSITY 2005
UGC CSIR NET CSIR 2002
M.Sc. SV University college of arts and sciences 1991
B.Sc VR College Nellore 1989

Experience

Designation Organization From Date To Date
lecturer government degree college 20-11-2000 31-03-2006

Awards

Award name Award Organization Awarded year
University First Rank SV University, Tirupathi 1993
National Merit Scholarship Government of India 1989
Telugu Vignana Parithoshikam AP State Government 1987

DIGITAL SIGNATURE ALGORITHM TO MAINTAIN PERFECT FORWARD SECRECY (PFS) USING HYPERELLIPTIC CURVE CRYPTOSYSTEMJournal of Design Engineering, Scopus, JUL-2021, 2021, 1584-1593

Implementation of double fold text encryption based on elliptic curve cryptography (ECC) with digital signature International journal of recent technology and engineering, Scopus, JAN-2020, 8, 3840-3846

Reductions of the cipher size of elliptic curve cryptographyJournal of advanced research in dynamical and control systems, Scopus, MAR-2020, 12, 1211-1217

ELLIPTIC CURVE CRYPTOGRAPHY WITH A SPECIAL FOCUS ON REDUCTION OF THE CIPHER SIZE USING CHEBYSHEV POLYNOMIALJOURNAL OF TEST ENGINEERING AND MANAGEMENT, Scopus, APR-2020, 83, 13645-13654

A comprehensive survey of best practices of moving sensitive data using cryptographic aspects for securing communication in wireless IOT and wired unsecure networkJournal of Critical Reviews, Scopus, JUL-2020, 7, 1891-1900

Survey of professional procedures of moving Sensitive data using cryptographic methods for securing communication in Wireless network systemsInternational journal of future generation communication and networking, Web of science, AUG-2020, 13, 2968-2978

A two phase block Cipher based on graph structure with Linear Feedback Shift Register (LFSR) as diffusion layerJournal of Critical Reviews, Scopus, AUG-2020, 7, 3956-3963

Fixed size text based encryption using elliptic curve CryptographyJournal of solid state technology, Scopus, OCT-2020, 63, 2964-2973

New password embedding technique using elliptic curve over finite fieldAdvances in intelligent systems and computing , Scopus, -2019, 906, 1-11

cryptographic key communication protocol using elliptic curve over finite field using nested construction of Hash message authentication codeinternational journal of advanced research in computer science, Google scholar, -2018, 9, 605-609

307New Random Walk Technique and Collision Detection Algorithm to Improve the Pollard RHO Attack of Solving Discrete Logarithm Problem on Elliptic CurvesInternational Journal of Mathematics Trends and Technolog, Google scholar, -2018, 56, 307-319

Safe communication and custody of the password using Elliptic Curve over finite fieldInternational Journal of Pure and Applied Mathematics 13143395 (online version) url httpwww.acadpubl.euhub, Scopus, -2018, 119, 1043-1049

Symmetric Stream Cipher Based On Chebyshev PolynomialInternational Journal Of Engineering And Computer Science, Google scholar, -2017, 6, 21650-656

Security and Authentication Architecture of block cipher using Mathematical operation and one way hash functionInternational Journal of Mathematics Trends and Technology, Citeseer, -2017, 49, 226-231

Secure Cryptosystem based on Braiding Entanglement of Pauli 32 MatricesInternational Journal of Computer Applications June 2016, Google scholar, -2016, 143 , 37-41

CASCADE BLOCK CIPHER USING BRAIDING ENTANGLEMENT OF SPIN MATRICES AND BIT ROTATIONInternational Journal of Network Security & Its Applications, EBSCO Host, -2016, 8, 71-84

SECURE CRYPTOSYSTEM BASED ON BRAIDING ENTANGLEMENT OF PAULI 52 MATRICESBulletin of mathematics and statistics research, Google scholar, -2016, 4, 41-51

SECURE CRYPTOSYSTEM BASED ON BRAIDING ENTANGLEMENT OF PAULI 52MATRICESBulletin of Mathematics and Statistics Research, Google scholar, -2016, 4, 41-51

Novel encryption schemes based on catalan numbersInternational Journal of Engineering Research and Applications, Google scholar, -2012, 2, 161-166

AUTHENTIC KEY TRANSPORT IN SYMMETRIC CRYPTOGRAPHIC PROTOCOLS USING SOME ELLIPTIC CURVES OVER FINITE FIELDSInternational Journal of Mathematical Archives, Google scholar, -2012, 3, 1-6

ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDSInternational Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012, Google scholar, -2012, 3, 301-308

(IJERA) ISSN Vol. 2, Issue 1, JanFeb 2012, pp. 417425417 P a g eA KeyScheduled Block Cipher Using elementwise LinearTransformation and Logical XOR OperationInternational Journal of Engineering Research and Applications, Citeseer, -2012, 2, 417-425

A Block Cipher using Graph Structures and Logical XOR OperationInternational Journal of Computer Applications (0975 8887) Volume 33 No.7, November 2011, EBSCO Host, -2011, 33, 6-10

A Block Cipher using Graph Structures and Logical XOR OperationInternational Journal of Computer Applications, EBSCO Host, -2011, 33, 6-10

A Block Cipher using logical XNOR and NOT OperationsInternational journal of Science and Advanced technology, Google scholar, -2011, 1, 59-62

Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fieldsInternational Journal of Computer Applications , EBSCO Host, -2011, 36, 27-30

Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fieldsInternational Journal of Computer Applications , EBSCO Host, -2011, 36, 27-30

A Block Cipher Using Rotation and Logical XOROperations International Journal of Computer Science Issues www.IJCSI.org, Google scholar, -2011, 8, 142-147

Cryptographic scheme of finite fields using logical operatorsInternational journal computer applications, Google scholar, -2011, 31, 1-4

A Novel encryption scheme based on double based number systsemInternational Journal of Engineering Science and Technology , Google scholar, -2010, 2, 1085-1087

ENCRYPTION OF DATA STREAMS USING PAULI SPINS MATRICESInternational Journal of Engineering Science and Technology, Google scholar, -2010, 2, 2020-2028

self encrypting data streams for digital signalsinternational journal of computer and network security, Google scholar, -2010, 2, 111-113

Fast Fourier transforms and quadratic forms for digital audio watermarking IEEE international conference on advances in recent technologies in communication and computing, Google scholar, -2009, 978, 449-452

Title of the project Funded by Duration Sanctioned date
Title of the project Funded by Duration Sanctioned date
encryption for data security using mathematical technique GITAM 12 27-Mar-2010
Board name Journal name
Board name Journal name
Reviewers International journal network security and its applications
Seminar name Organized by Venue Start date End date Title of the paper presented Role Co presenter
National SMSMS St. Joseph college, Visakhapatnam 15-Nov-2019 16-Nov-2019 Participated
National GITAM VIZAG GITAM VIZAG 27-Dec-2012 29-Dec-2012 Participated
National GITAM VIZAG GITAM VIZAG 15-Mar-2011 16-Mar-2011 Participated
National UGC DST Mrs. AVN college, Visakhapatnam 11-Dec-2009 13-Dec-2009 Participated
Seminar name Organized by Venue Start date End date Title of the paper presented Role Co presenter
International Notte Meenakshi Institute of Technology, Bangalore Notte Meenakshi Institute of Technology, Bangalore 28-Jul-2018 29-Jul-2018 New password embedding technique using Elliptic curve over finite fields Participated
International NMIT BANGALORE NMIT BANGALORE 27-Jul-2018 28-Jul-2018 New Password Embedding technique using elliptic curve over finite field Participated D. Sravana Kumar
International NIT Rourkela NIT Rourkela 11-Jan-2010 13-Jan-2010 Cryptographic schemes using Boolean matrices Participated D. Sravana Kumar
Title of the thesis Name of the student Name of the college / university Major subject area Year of admission Type of admission Thesis specification
PURSUING CH. NEELIMA GITAM University Cryptography Part time PhD
Title of the thesis Name of the student Name of the college / university Major subject area Year of admission Type of admission Thesis specification
Title of the thesis Name of the student Name of the college / university Major subject area Year of admission Type of admission Thesis specification
APPLICATION OF ELLIPTIC CURVES AND SOME OTHER MATHEMATICAL TECHNIQUES IN CRYPTOSYSTEMS B. SIRISHA GITAM UNIVERSITY CRYPTOGRAPHY 2019 Part time PhD
Name of the award Awarded by Awarded year
Prof. M. Satyanarayana prize SV University Tirupathi 1993
Title Type Organized by Venue Start date End date Role
National workshop on mathematical techniques in engineering poblems Training of tutors GMRIT RAJAM GMRIT RAJAM 06-Nov-2009 07-Nov-2009 Participated
Workshop on Algebra and Analysis Training of tutors GVP Degree college Vizag GVP Degree college Vizag 24-Mar-2008 24-Mar-2008 Participated
Title Type Organized by Venue Start date End date Role