ASHOK KUMAR SADASIVUNI

@gvpcdpgc.edu.in

MATHEMATICS
GAYATRI VIDYA PARISHAD COLLGE FOR DEGREE AND P.G COURSES(A)



                    

https://researchid.co/saiashok

RESEARCH, TEACHING, or OTHER INTERESTS

Algebra and Number Theory, Computational Mathematics, Computational Mathematics, Discrete Mathematics and Combinatorics

2

Scopus Publications

20

Scholar Citations

2

Scholar h-index

1

Scholar i10-index

Scopus Publications

  • A type of public cryptosystem using polynomials and pell sequences
    Gudela Ashok, S. Ashok Kumar, D. Chaya Kumari, and Mathe Ramakrishna

    Taru Publications
    Abstract In this paper, a kind of Public key Cryptosystem is established using Polynomials and Pell sequences by exploiting the properties of both Polynomials and Pell sequences by converting Polynomial into Octal and Binary system. Securing the digital data and modifying it by using modern Cryptographic methods that plays a vital role in Network Security.

  • A secure Diffie-Hellman encryption scheme over elliptic curves using golden matrices
    R. Kumar Bora, S. Ashok Kumar, L. Kishore Kumar, and N. Surendra

    Union of Researchers of Macedonia
    A BSTRACT . In this paper, we proposed a secured Diffie-Hellman encryption scheme over the elliptic curves based on golden matrices. This algorithm works with a bijective function defined from the points on the elliptic curve to ASCII characters. The additional private key has been generated by the matrix, obtained from golden matrices.

RECENT SCHOLAR PUBLICATIONS

  • Super-Encryption with Pell-Lucas Matrices and Graphs via Laplace Transformations
    T Domada, SA Kumar, G Ashok, DC Kumari
    Journal of Harbin Engineering University 44 (8) 2023

  • An Approach of Cryptosystem using Polynomials and Lucas Numbers
    G Ashok, SA Kumar, DC Kumari
    2023

  • A type of public cryptosystem using polynomials and pell sequences
    G Ashok, S Ashok Kumar, D Chaya Kumari, M Ramakrishna
    Journal of Discrete Mathematical Sciences and Cryptography 25 (7), 1951-1963 2022

  • Symmetric Encryption Technique Using Spanning Tree of a Graph
    CH Suneetha, DS Kumar, MPR Murthy, SA Kumar
    Journal of Optoelectronics Laser 41 (9), 2022 2022

  • A Study of Elgamal Encryption Scheme of Elliptic Curves Using Golden Matrices
    SN Ravi Kumar Bora,Ashok Kumar S,Kishore Kumar L
    BULLETIN MONUMENTAL 21 (7), 76-81 2020

  • Redei rational functions as permutation functions and an algorithm to compute redei rational functions
    DC Kumari, SA Kumar
    International Journal of Engineering, Science and Mathematics 8 (2), 1-13 2019

  • MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERS
    CPAK A. ChandraSekhar, B.Ravi Kumar
    International Journal of Engineering Science Invention Research 2016

  • MULTIPLE ENCRYPTIONS OF INDEPENDENT CIPHERS
    A CHANDRASEKHAR, DC KUMARI, P CH, A KUMAR
    IJMA 7, 2 2016

  • IJMTT Call for Paper September-2022
    A ChandraSekhar, DC Kumari, SA Kumar
    2016

  • TRIPLE ENCRYPTION OF MULTIPLE KEYS FOR SYMMETRIC KEY CRYPTO SYSTEMS
    AK ChandraSekhar, A., Ch.Pragathi
    International Journal of DEVELOPMENT RESEARCH 6 (3), 7079-7089 2016

  • Multiple Encryptions of Fibonacci Lucas transformations
    DCKA A. ChandraSekhar, Ch.Pragathi
    IOSR Journal of Mathematics 12 (2), 66-72 2016

  • Symmetric Key Cryptosystem for Multiple Encryptions
    A ChandraSekhar, DC Kumari, SA Kumar
    International Journal of Mathematics Trends and Technology-IJMTT 29 2016

  • Linearly independent spanning sets and linear transformations for Multi-level Encryption
    AC Sekhar, V Anusha, BR Kumar, SA Kumar
    Journal of Information and Optimization Sciences 36 (4), 385-392 2015

  • MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERS
    A ChandraSekhar, BR Kumar, C Pragathi, A Kumar


  • Triple Encryption Scheme Using two Independent Keys
    AC SEKHAR, SA KUMAR


  • A SECURE DIFFIE-HELLMAN ENCRYPTION SCHEME OVER ELLIPTIC CURVES USING GOLDEN MATRICES
    RK BORA, SA KUMAR, LK KUMAR, N SURENDRA


MOST CITED SCHOLAR PUBLICATIONS

  • Symmetric Key Cryptosystem for Multiple Encryptions
    A ChandraSekhar, DC Kumari, SA Kumar
    International Journal of Mathematics Trends and Technology-IJMTT 29 2016
    Citations: 12

  • Multiple Encryptions of Fibonacci Lucas transformations
    DCKA A. ChandraSekhar, Ch.Pragathi
    IOSR Journal of Mathematics 12 (2), 66-72 2016
    Citations: 5

  • A type of public cryptosystem using polynomials and pell sequences
    G Ashok, S Ashok Kumar, D Chaya Kumari, M Ramakrishna
    Journal of Discrete Mathematical Sciences and Cryptography 25 (7), 1951-1963 2022
    Citations: 1

  • Symmetric Encryption Technique Using Spanning Tree of a Graph
    CH Suneetha, DS Kumar, MPR Murthy, SA Kumar
    Journal of Optoelectronics Laser 41 (9), 2022 2022
    Citations: 1

  • Linearly independent spanning sets and linear transformations for Multi-level Encryption
    AC Sekhar, V Anusha, BR Kumar, SA Kumar
    Journal of Information and Optimization Sciences 36 (4), 385-392 2015
    Citations: 1