Multi-stage multi-secret sharing scheme for hierarchical access structure A Basit, NC Kumar, VC Venkaiah, SA Moiz, AN Tentu, W Naik 2017 International Conference on Computing, Communication and Automation …, 2017 | 31 | 2017 |
Sequential secret sharing scheme based on Chinese remainder theorem N Singh, AN Tentu, A Basit, VC Venkaiah 2016 IEEE International Conference on Computational Intelligence and …, 2016 | 22 | 2016 |
Ideal and perfect hierarchical secret sharing schemes based on mds codes AN Tentu, P Paul, VC Venkaiah Cryptology ePrint Archive, 2013 | 15 | 2013 |
Conjunctive hierarchical secret sharing scheme based on MDS codes AN Tentu, P Paul, CV Vadlamudi Combinatorial Algorithms: 24th International Workshop, IWOCA 2013, Rouen …, 2013 | 15 | 2013 |
Reusable multi-stage multi-secret sharing schemes based on CRT A Endurthi, OB Chanu, AN Tentu, VC Venkaiah Journal of Communications Software and Systems 11 (1), 15-24, 2015 | 14 | 2015 |
Computationally perfect compartmented secret sharing schemes based on MDS codes AN Tentu, P Paul, VC Venkaiah International Journal of Trust Management in Computing and Communications 2 …, 2014 | 13 | 2014 |
CRT based multi-secret sharing schemes: revisited AN Tentu, VC Venkaiah, VK Prasad International Journal of Security and Networks 13 (1), 1-9, 2018 | 12 | 2018 |
Sequential Secret Sharing Scheme Based on Level Ordered Access Structure. DK Pattipati, AN Tentu, VC Venkaiah, AA Rao Int. J. Netw. Secur. 18 (5), 874-881, 2016 | 12 | 2016 |
Multi-secret sharing scheme for level-ordered access structures AN Tentu, A Basit, K Bhavani, VC Venkaiah Number-Theoretic Methods in Cryptology: First International Conference …, 2018 | 11 | 2018 |
Multi-level secret sharing scheme for mobile ad-hoc networks PVS Kumar, RR Kurra, AN Tentu, G Padmavathi International Journal of Advanced Networking and Applications 6 (2), 2253, 2014 | 10 | 2014 |
Authenticated key agreement scheme for IoT networks exploiting lightweight linear algebraic computations A Singh, V Tiwari, AN Tentu International Journal of Information Technology 15 (4), 1803-1811, 2023 | 9 | 2023 |
A machine vision attack model on image based captchas challenge: Large scale evaluation A Singh, V Tiwari, AN Tentu Security, Privacy, and Applied Cryptography Engineering: 8th International …, 2018 | 9 | 2018 |
A review on evolution of symmetric key block ciphers and their applications AN Tentu IETE Journal of Education 61 (1), 34-46, 2020 | 8 | 2020 |
Multi-stage multi-secret sharing schemes based on Chinese remainder theorem OB Chanu, AN Tentu, VC Venkaiah Proceedings of the 2015 International Conference on Advanced Research in …, 2015 | 8 | 2015 |
Sequential (t, n) multi secret sharing scheme for level-ordered access structure AN Tentu, K Bhavani, A Basit, VC Venkaiah International Journal of Information Technology 13, 2265-2275, 2021 | 7 | 2021 |
McEliece cryptosystem: simulation and security vulnerabilities R Kumar, AS Naidu, A Singh, AN Tentu International Journal of Computing Science and Mathematics 12 (1), 64-81, 2020 | 7 | 2020 |
A dynamic key management paradigm for secure wireless ad hoc network communications A Singh, AN Tentu, VC Venkaiah International Journal of Information and Computer Security 14 (3-4), 380-402, 2021 | 6 | 2021 |
New secret sharing scheme for multipartite access structures with threshold changeability AN Tentu, B Mahapatra, VC Venkaiah, VK Prasad 2015 International Conference on Advances in Computing, Communications and …, 2015 | 6 | 2015 |
Efficient verifiable multi-secret sharing based on YCH scheme AN Tentu, AA Rao Cryptography and Security Systems: Third International Conference, CSS 2014 …, 2014 | 5 | 2014 |
Computationally perfect secret sharing scheme based on error-correcting codes AN Tentu, P Paul, VC Venkaiah Recent Trends in Computer Networks and Distributed Systems Security: Second …, 2014 | 5 | 2014 |