Multi-authority Electronic Voting Scheme Based on Elliptic Curves. C Porkodi, R Arumuganathan, K Vidya Int. J. Netw. Secur. 12 (2), 84-91, 2011 | 24 | 2011 |
Public key cryptosystem based on number theoretic transforms C Porkodi, R Arumuganathan International Journal of Computational and Mathematical Sciences 2 (1), 28-32, 2008 | 5 | 2008 |
Group-oriented signature schemes based on Chinese remainder theorem C Porkodi, R Arumuganathan 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC …, 2009 | 3 | 2009 |
An integer factorization method equivalent to fermat factorization P Chinniah, A Ramalingam International Journal of Mathematics And its Applications 6 (2), 107-111, 2018 | 2 | 2018 |
A special purpose integer factorization algorithm P Chinniah, N Muthusamy, A Ramalingam Proceedings of the Second International Conference on Computational Science …, 2012 | 2 | 2012 |
Single authority electronic voting based on elliptic curves C Porkodi, R Arumuganathan, K Vidya Journal of Discrete Mathematical Sciences and Cryptography 13 (3), 209-217, 2010 | 2 | 2010 |
Matrix Based Single Authority Electronic Voting Schemes C Porkodi, K Sangavai Proceedings of the First International Conference on Combinatorial and …, 2021 | 1 | 2021 |
Group-oriented (kn) signature schemes on exponentiation of primitive root and Elliptic curve C Porkodi, R Arumuganathan Journal of Information Assurance Security 3 (2), 103-111, 2008 | 1 | 2008 |
Elliptic Curve based r out of n Key Distribution Scheme for Hierarchy Wireless Sensor Networks C Porkodi, K Sangavai International Journal of Engineering and Applied Sciences 5 (3), 257259, 0 | 1 | |
An Energy-Balance, Cluster Based Routing Algorithm Using Vertex Subset Degree Preserving Spanning Trees For Wireless Sensor Networks K Sangavai, C Porkodi | | 2015 |
Analysis of number theoretic Transforms based cryptosystem Group signatures E voting and A factorization algorithm C Porkodi Chennai, 2010 | | 2010 |
Public Key Cryptosystem based on Number Theoretic Transforms resisting brute force attack C Porkodi, R Arumuganathan International Journal of Computational and Applied Mathematics 4 (2), 127-135, 2009 | | 2009 |