: rpadma@nitw.ac.in : 08702468738, 9440173819
Research Interests: Cryptanalysis and Network Security
Course Taught Previously
Academic Year | Semester | Classes | Course ID | Course Name |
2008-09 |
8 |
B.Tech |
Network Programming and Cryptography |
|
2008-09 |
5 |
M.C.A |
Network Programming and security |
|
2009-10 |
3 |
B.Tech |
Data Structures and Algorithms |
|
2009-10 |
4 |
B.Tech |
System Programming |
|
2009-10 |
2 |
M.Tech |
Advanced Computer Networks and Security |
|
2009-10 |
2 |
M.Tech |
Socket Programming and Network Security |
|
2010-11 |
3 |
B.Tech |
Data Structures and Algorithms |
|
2010-11 |
1 |
M.Tech |
Cryptanalysis |
|
2010-11 |
2 |
M.C.A |
System Software |
|
2011-12 | 2 | M.C.A | Computer Organization | |
2011-12 | 1 | B.Tech | PSCP | |
2011-12 | 4 | B.Tech | Systems Programming | |
2011-12 | 2 | M.C.A | Systems software | |
2012-13 | 8 | B.Tech | Network Programming | |
2012-13 | 5 | M.C.A | Network Programming and Security | |
2012-13 | 2 | B.Tech | Systems Programming | |
2013-14 | 8 | B.Tech | Network Programming | |
2013-14 | 1 | M.Tech | Cryptanalysis | |
2013-14 | 4 | B.Tech | Systems Programming | |
2014-15 | 1 | M.Tech | Foundations of Cryptography | |
2014-15 | 8 | B.Tech | Cryptography and Network Security | |
2014-15 | 4 | B.Tech | Systems Programming | |
2015-16 | 1 | M.Tech | Foundations of Cryptography | |
2015-16 | 8 | B.Tech | Cryptography and Network Security | |
2016-17 | 8 | B.Tech | Cryptography and Network Security | |
2016-17 | 1 | M.Tech | Foundations of Cryptography | |
2016-17 | 4 | B.Tech | Systems Programming | |
2016-17 | 2 | M.Tech | Algorithmic Coding Theory |
Courses Currently Being Taught
Classes | Department | Semester | Course ID | Course Name |
B.Tech |
C.S.E |
8 |
Cryptography and Network Security |
|
M.Tech |
CSIS | 1 | Foundations of Cryptography |
Journal Publication Details
Author | Title | Journal Name | Vol. Page. Year. |
R.Padmavathy, Chakravarthy Bhagvati, H.P. Rani |
Discrete Logarithm Problem in Elliptic Curve Group using Pollard Rho |
International Journal on Computing and Mathematical Applications |
v2(1-2), pp 81-92, 2008 |
R.Padmavathy, Chakravarthy Bhagvati |
Improved Cryptanalysis on DLP ? = aa b |
International Journal on Computer Science and Engineering Systems |
v3(4), pp 22-27, 2009 |
R.Padmavathy, Chakravarthy Bhagvati |
Performance Analysis on Index Calculus Method |
Journal of Discrete Mathematical Sciences and Cryptography |
v12(3), pp71-92, 2009 |
R.Padmavathy, Chakravarthy Bhagvati |
Ephemeral Key Recovery using Index Calculus Method |
Journal of Discrete Mathematical Sciences and Cryptography |
v13(1), pp 29-43, 2010 |
R.Padmavathy |
Improved Three Party EKE Protocol |
Information Technology and Control |
v39(3), 2010 |
Sirisha Tallapally, R.Padmavathy | Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'. | Journal of Information Processing and Systems | v6(1),43-52, 2010 |
R.Padmavathy, chakravarthy Bhagvati |
Solving Discrete Logarithm Problem for Ephemeral Key Recovery on Chang and Chang Key Exchange Protocol |
Journal of Information Processing and Systems |
v6(3), pp 52-62, 2010 |
R.Padmavathy, Chakravarthy Bhagvati |
A Small Sub group Attack for Recovering Ephemeral Keys in Chang and Chang Key Exchange Protocol |
Journal of Computers |
v6(4), pp 804-811, 2011 |
R.Padmavathy |
Impersonating the Server Attack on Simple Three Party Key Exchange Protocol |
International Journal on Computer Science and Engineering Systems |
v5(2), 2011 |
R.Padmavathy, Chakravarthy Bhagvati |
Index Calculus Method based on Smooth Numbers of 1 over Zp* |
International Journal on Network Security |
v15(1), pp210-218,2013 |
R.Padmavathy, Chakravarthy Bhagvati |
A password Attack on S3-PAKE |
International Journal of Security and its applications |
Accepted |
R.Padmavathy, Chakravarthy Bhagvati |
Discrete Logarithm Problem using Index Calculus Method |
Mathematical and Computer Modelling, Special issue :- Advanced Theory and Practice for Cryptography and Future Security |
v55(1-2), pp161-169, 2012 |
R. Padmavathy |
Cryptanalysis of C3-PEKE protocol |
International Journal of Computer Applications |
v20(4), pp22-31,2011 |
R.Padmavathy, Chakravarthy Bhagvati |
Unknown Key Share Attack on STPKE |
Book chapter, Information Processing and Management |
v70, pp604-608, 2010 |
Harish Malla, Vilas SantKaustubh Rajasekharan Ganesh Padmavathy R. |
Block Lanczos to Solve Integer Factorization Problem Using GPU�??s |
Book chapter, Advances in Computer Science and Information Technology: Networks and Communications | v84, pp 520-529,2012 |
Sirisha Tallapally, R.Padmavathy |
Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'. |
Journal of Information Processing Systems | v6(1), 43-52, 2010 |
Siddharth Agarwal, Abhinav Rungta, R.Padmavathy, Mayank Shankar, Nipun Rajan | An Improved Fast and Secure Hash Algorithm | Journal of Information Processing Systems | v8(1), 119-132. 2012 |
R.Padmavathy, Chakravarthy Bhagvati |
A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery |
International Journal of Network Security | v17(1), pp 94-105, 2015 |
Anil Pinapati and R.Padmavathy |
A Reversible Data Hiding using Prior Pixel Pairs in Two-Dimensional Histogram with Tri-Directional Modification ofDifference-Histogram |
IETE Technical Review | accepted |
Conference Proceeding
Author | Title | Conference Name | Vol. Page. Year. |
R.Padmavathy, P.S.Avadhani |
A Cryptosystem based on a cut set of a graph |
International Conference on e-security |
pp111-123, 2006 |
R.Padmavathy, Chakravarthy Bhagvati |
Improved Random Method for Index Calculus Method |
National Workshop on Cryptology |
pp 77-90, 2008 |
R.Padmavathy |
Enterprize Information Security |
BIG-2004 |
pp55-67,2004 |
R.Padmavathy |
New Dimention on DLP based Cryptosystems |
Networks-2005 |
pp122-138,2005 |
R.Padmavathy, Chakravarthy Bhagvati |
A key Recovery Attack on Chang and Chang Password Key Exchange Protocol |
International Conference on Computer and network technology |
World Scientific press |
R.Padmavathy, Chakravarthy Bhagvati |
Methods to solve Discrete Logarithm Problem for Ephemeral Key |
International Conference on Advanced Research in Computation and Communication |
IEEE press |
R.Padmavathy, T.Sirisha |
Improved Analysis on Chang and Chang Password Key Exchange Protocol |
ACT- 2009 |
IEEE press |
R.Padmavathy, Chakravarthy Bhagvati |
Discrete Logarithm Problem using Index Calculus Method |
International Symposium on Advances in Cryptography and Security Applications for Future Computing |
Gwanju, Korea, Dec 9-11, 2010 |
Anil Pinapati and R.Padmavathy | A Reversible Data Hiding using Difference-Histogram Modification on Multi-Directional in Two-Dimensional Histogram�??, | NCCS 2016 | Springer link |
Gireesh Joshi, R Padmavathy, Anil Pinapati, Mani Bhushan Kumar | BrowserGuard2: A Solution for Drive-by-Download Attacks | NCCS 2016 | Springer link |
Tanmay Sharma and R.Padmavathy | special-q techniques for Number Field Sieve to solve Integer Factorization | ICSICCS-2017 | Springer Book series Advances in Intelligent Systems and Computing |
Gaurav Dhumal and R.Padmavathy | Sparse Linear Algebra in Function Field Sieve | 8th ICCCNT at IIT Delhi 2017 | IEEE xplore |
Workshop/SSTPs/Conference attended
Title | Date | Workshop | Organized At |
Soft Computing Techniques |
27-30, December,2006 |
workshop |
HCU |
Short term course on information tools, concept and methodology |
5-27, May, 2008 |
STTP |
IISc, Bangalore |
INDOCRYPT 2004 |
Dec, 2004 |
conference |
IIMSCchennai |
Information security |
July 2008 |
STTP |
NIT, Warangal |
Student projects Supervised (in last 3 years)
2017 passed out students project list
Project Name | Student(s) Name | Acd. Year |
Efficient Software Implementation of Polynomial Arithmetic over Galois Field |
Shubhi Saxena, Sneha Basetti, U K Hindumathi
|
B.Tech 2013-2017 |
Secure Group Communaction using Koblitz curve based Cryptography | Kathivarapu Bhargav,Adapa Lokesh,Mohan Vamshi Parandhama | B.Tech 2013-2017 |
Design implementation of Filtering module in Function Field Sieve method to solve DLP over GF(2^n) | Ketki Joshi,Abhishek Shah,Kapugamage Sachith | B.Tech 2013-2017 |
Secure Communication using Pairing based Cryptography | Jyothi Mourya | MCA 2014-17 |
A Secure Group Communication using NTRU Cryptosystem | Sunny Sharma | MCA 2014-17 |
Proxy Re-Encryption and Proxy Decryption using ElGamal Cryptosystem | Dontamsetty Revathi | MCA 2014-17 |
Signcryption using DSA and ElGamal | Dheeraj Kumar | MCA 2014-17 |
Special-q techniques in Number Field Sieve to solve Integer Factorization | Tanmay Sharma | M.Tech 2015-17 |
Improved Filtering Step for the Integer Factorization and Discrete Logarithm Problem | Deep Prakash Dey | M.Tech 2015-17 |
Solving linear Algebra in Function Field Sieve using Block Wiedemann Algorithm | Dhumal Gaurav Manik | M.Tech 2015-17 |
Course Taught Previously |
Data Structures
Problem Solving and Computer Programming
DataBase Management Systems
Distributed Systems
Theory of Computation
Compiler Design
Advanced Data Bases
Computer Architechture
Advanced Computer Architechture
Systems Programming
Systems Software
Network Programming
Cryptography and Network Security
Programming Languages Concept
Computer Organization
Cryptanalysis
Advanced Computer Networks and Security
Socket Programming and Network Security
Foundations of Cryptography
Algorithmic Coding Theory
Publications |
Author | Title | Journal Name | Vol. Page. Year. |
R.Padmavathy, Chakravarthy Bhagvati |
Performance Analysis on Index Calculus Method |
Journal of Discrete Mathematical Sciences and Cryptography |
v12(3), pp71-92, 2009 |
R.Padmavathy, Chakravarthy Bhagvati |
Ephemeral Key Recovery using Index Calculus Method |
Journal of Discrete Mathematical Sciences and Cryptography |
v13(1), pp 29-43, 2010 |
R.Padmavathy |
Improved Three Party EKE Protocol |
Information Technology and Control |
v39(3), 2010 |
R.Padmavathy, chakravarthy Bhagvati |
Solving Discrete Logarithm Problem for Ephemeral Key Recovery on Chang and Chang Key Exchange Protocol |
Journal of Information Processing and Systems |
v6(3), pp 52-62, 2010 |
R.Padmavathy, Chakravarthy Bhagvati |
A Small Sub group Attack for Recovering Ephemeral Keys in Chang and Chang Key Exchange Protocol |
Journal of Computers |
v6(4), pp 804-811, 2011 |
R.Padmavathy |
Impersonating the Server Attack on Simple Three Party Key Exchange Protocol |
International Journal on Computer Science and Engineering Systems |
v5(2), 2011 |
R.Padmavathy, Chakravarthy Bhagvati |
Index Calculus Method based on Smooth Numbers of 1 over Zp* |
International Journal on Network Security |
v15(1), pp210-218,2013 |
R.Padmavathy, Chakravarthy Bhagvati |
A password Attack on S3-PAKE |
International Journal of Security and its applications |
Vol 5(4) october 2011 |
|
Discrete Logarithm Problem using Index Calculus Method |
Mathematical and Computer Modelling, Special issue :- Advanced Theory and Practice for Cryptography and Future Security |
v55(1-2), pp161-169, 2012 |
R. Padmavathy |
Cryptanalysis of C3-PEKE protocol |
International Journal of Computer Applications |
v20(4), pp22-31,2011 |
R.Padmavathy, Chakravarthy Bhagvati |
Unknown Key Share Attack on STPKE |
Book chapter, Information Processing and Management |
v70, pp604-608, 2010 |
Harish Malla, Vilas SantKaustubh Rajasekharan Ganesh Padmavathy R. |
Block Lanczos to Solve Integer Factorization Problem Using GPU�??s | Book chapter, Advances in Computer Science and Information Technology: Networks and Communications | v84, pp 520-529,2012 |
Sirisha Tallapally, R.Padmavathy |
Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'. | Journal of Information Processing Systems | v6(1), 43-52, 2010 |
Siddharth Agarwal, Abhinav Rungta, R.Padmavathy, Mayank Shankar, Nipun Rajan |
An Improved Fast and Secure Hash Algorithm | Journal of Information Processing Systems | v8(1), 119-132. 2012 |
R.Padmavathy, Chakravarthy Bhagvati |
A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery |
International Journal of Network Security | v17(1), pp 94-105, 2015 |
Anil Pinapati and R.Padmavathy |
A Reversible Data Hiding using Prior Pixel Pairs in Two-Dimensional Histogram with Tri-Directional Modification ofDifference-Histogram |
IETE Technical Review | v36(6), pp 23-32, 2019 |
Tanmay Sharma and R.Padmavathy |
special-q techniques for Number Field Sieve to solve Integer Factorization |
Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, Springer | Vol669,pp 471-485,2018 |
Vinod Mahor, Padmavathi R, Santanu Chatterjee, Sanshray Kumar Dewangan, Manish Kumar |
A secure three factor based fully anonymous user authentication protocol for multi-server environmentv |
International Journal of Ad hoc and Ubiquitous Computing, Inderscience |
V34(1)pp 45-60,2020 |
Anmol Agnihotri and R.Padmavathy, | Privacy in Content Centric Networks, International Journal of Security and Network | International Journal of Security and Networks | Published online |
Rahul Janga,R. Padmavathy,S. K. Pal &S. Ravichandra | A Framework for Filtering Step of Number Field Sieve and Function Field Sieve | IETE Journal of Research | Published online |
Shubham Varshney, Pankaj Charpe, R. Padmavathy & S. K. Pal |
Relation collection using Pollard special-q sieving to solve integer factorization and discrete logarithm problem |
The Journal of supercomputing |
77, pages 2734–2769 (2021) |
Shivani Jain and R Padmavathy | Lattice Based Lightweight Cryptosystem | International journal of Adhoc and Ubiquitous Computing | Published online |
Vinod Mahor, R. Padmavathi, Santanu Chatterjee | Chebyshev chaotic map based efficient Mutual Authentication Scheme for Session Initiation Protocol |
International journal of security and networks |
Published online |
An Efficient Scalar Multiplication Algorithm on Koblitz curves using tau^3-NAF | Surya Ganesh Ponnuru, Padmavathy R, Anil Pinapati |
International journal of security and networks |
Published online |
Sai Ganesh, Chinni Dheeraj, R. Padmavathy | A Deep Learning Framework to Preserve Privacy in Federated (Collaborative) Learning | Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities | V972 pp1-28,2021 |
Y Nizam, T Tadimeti, Prathna, Ch Jayanth Babu, R Padmavathy | Issuing and Verifying of Blockchain Based Certificates |
Proceeding of Fifth International Conference on Microelectronics, Computing and Communication Systems |
V748,pp 433–449, 2021 |
Anil Pinapati R. Padmavathy |
Multimedia Encryption on Bitplanes of Image Using ECC on Koblitz Curves with Lopez–Dahab Projective | Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems | V556 pp9-22,2019 |
K.S.Spoorthi, R.Padmavathy, S.KPal and S.Ravi Chandra | Linear Algebra on Parallel Structures using Wiedmann Algorithm to solve Discrete Logarithm Problem | IETE Journal of Research | VOL. 68, NO. 4, 2376–2389,2022 |
Jessica Desouza, R.Padmavathy, Abhinav Dayal |
Secure exchange and incentivised collaboration of machine learning models and datasets using blockchain |
International Journal of Information and Computer Security |
V19,pp 443-462, 2022 |
Conference Proceeding
Author | Title | Conference Name | Vol. Page. Year. |
R.Padmavathy, P.S.Avadhani |
A Cryptosystem based on a cut set of a graph |
International Conference on e-security |
pp111-123, 2006 |
R.Padmavathy, Chakravarthy Bhagvati |
Improved Random Method for Index Calculus Method |
National Workshop on Cryptology |
pp 77-90, 2008 |
R.Padmavathy |
Enterprize Information Security |
BIG-2004 |
pp55-67,2004 |
R.Padmavathy |
New Dimention on DLP based Cryptosystems |
Networks-2005 |
pp122-138,2005 |
R.Padmavathy, Chakravarthy Bhagvati |
A key Recovery Attack on Chang and Chang Password Key Exchange Protocol |
International Conference on Computer and network technology |
World Scientific press |
R.Padmavathy, Chakravarthy Bhagvati |
Methods to solve Discrete Logarithm Problem for Ephemeral Key |
International Conference on Advanced Research in Computation and Communication |
IEEE press |
R.Padmavathy, T.Sirisha |
Improved Analysis on Chang and Chang Password Key Exchange Protocol |
ACT- 2009 |
IEEE press |
R.Padmavathy, Chakravarthy Bhagvati |
Discrete Logarithm Problem using Index Calculus Method |
International Symposium on Advances in Cryptography and Security Applications for Future Computing |
Gwanju, Korea, Dec 9-11, 2010 |
Anil Pinapati and R.Padmavathy | A Reversible Data Hiding using Difference-Histogram Modification on Multi-Directional in Two-Dimensional Histogram�??, | NCCS 2016 | Springer link |
Gireesh Joshi, R Padmavathy, Anil Pinapati, Mani Bhushan Kumar | BrowserGuard2: A Solution for Drive-by-Download Attacks | NCCS 2016 | Springer link |
Tanmay Sharma and R.Padmavathy | special-q techniques for Number Field Sieve to solve Integer Factorization | Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 669. Springer, Singapore | Springer Book series Advances in Intelligent Systems and Computing |
Gaurav Dhumal and R.Padmavathy | Sparse Linear Algebra in Function Field Sieve | 8th ICCCNT at IIT Delhi 2017 | IEEE Xplore |
Sumit Sharma, Ashutosh Swarnakar, Ch. Jayanth Babu, R.Padmavathy, Rakeksh Kumar | An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services |
IEEE International Conference on Computing Communication and Security 2020 (ICCCS 2020), IIT Patna |
IEEE Xplore |
PHDs Supervised |
1. Anil Pinapati Algorithms to Improve efficiency of Scalar Multiplication on Koblitz curves and Its Applications Full Time
2. Ch. Jayanth Lattice based cryptosystems for IOT and Blockchian platforms about to submit the synopsis
Full Time
3. Gautam Rampalli Detection of DDOS attack using machine learning models Part time
4. Vinod Mahor Design and cryptanalysis of remote authentication and access control protocols for resource constrained environment
Part time
5. Gudupati Sravya Fine grained access control for cloud storage
Projects |
S.no |
Project Title |
Investigators |
Sponsoring agencies |
1 |
Secure SMS using koblitz curve based ECC on android devices
|
PI Dr.R.Padmavathy
|
DST SERB |
2 |
Solving Discrete Logarithm Problem over GF (2^n) using Function Field Sieve (FFS) Method |
PI Dr.R.Padmavathy & Co-PI Dr.S.Ravi Chandra |
DRDO |
3 |
Solving Discrete Logarithm Problem over GF(2^n) using Quasi Polynomial time algorithm |
PI Dr.R.Padmavathy & Co-PI Dr.S.Ravi Chandra, Dr.Y.Sreenivasa Rao |
DRDO |
Additional Responsibility |
Associate Dean (Student Welfare)
E&ICT- Technical Program Committee member
IIAC(Institute Information Advisory Committee) member
Coordinator NEP Curriculum Revision MTech CSIS
Faculty Advisor CSEA
Convenor- Student activity and welfare fund distribution committee
Standing Committee member for student welfar