Cryptographic Schemes Based on Elliptic Curves over the Ring Zp [i] M Kumar, P Gupta Applied Mathematics 7 (03), 304-312, 2016 | 14 | 2016 |
A Novel and Secure Multiparty Key Exchange Scheme Using Trilinear Pairing Map Based on Elliptic Curve Cryptography M Kumar, P Gupta Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 12 | 2018 |
Direct and inverse estimates for a new family of linear positive operators MK Gupta, V Gupta, M Kumar Journal of mathematical analysis and applications 330 (2), 799-816, 2007 | 12 | 2007 |
An Efficient and Authentication Signcryption Scheme Based on Elliptic Curves Manoj Kumar, Pratik Gupta MATEMATIKA 35 (1), 1-11, 2019 | 8 | 2019 |
A verifiable ring signature scheme of anonymous signcryption using ECC P Gupta, M Kumar International Journal of Mathematical Sciences and Computing 7 (2), 24-30, 2021 | 6 | 2021 |
A secure and efficient authentication protocol based on elliptic curve Deffie-Hellman algorithm and zero knowledge property M Kumar International Journal of Soft Computing and Engineering 3 (5), 137-142, 2013 | 4 | 2013 |
Lightweight and authenticated key exchange based on self Linear pairings M Kumar, S Farhat, A Kumar tECA 1, 29tMu, 2020 | 3 | 2020 |
Some Algorithms of Various Projective Coordinate Systems for ECC Using Ancient Indian Vedic Mathematics Sutras Manoj Kumar, Ankur Kumar INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 8 (8), 611-621, 2019 | 2 | 2019 |
A Novel and Secure Multiparty Key Exchange Scheme Using Trilinear Pairing Map Based on Elliptic Curve Cryptography M Kumar, P Gupta Soft Computing: Theories and Applications 1, 37, 2016 | 2 | 2016 |
Security Analysis of a Threshold Quantum State Sharing Scheme of an Arbitrary Single-Qutrit Based on Lagrange Interpolation Method M Kumar, MK Gupta, RK Mishra, SS Dubey, A Kumar, Hardeep Evolving Technologies for Computing, Communication and Smart World …, 2021 | 1 | 2021 |
An efficient authentication protocol using zero knowledge property and pairing on elliptic curves. M Kumar International Journal of Advanced Research in Computer Science 8 (5), 2017 | 1 | 2017 |
A verifiable threshold quantum secret sharing scheme using interpolation method M Kumar Int J Adv Res Comp Sci Softw Eng 7 (7), 42-47, 2017 | 1 | 2017 |
An efficient secret sharing scheme for quantum key distribution M Kumar International Journal of Advance Research in Science and Engineering 4 (3 …, 2015 | 1 | 2015 |
General Quantum Secret Sharing Based on Three-Qubit using Monotone Span Program ACYKR Hardeep, Manoj Kumar Scandinavian Journal of Information Systems 35 (3), 611-621, 2023 | | 2023 |
Enhanced Performance of Isogenies Over Huff Curve for Post Quantum Cryptography. A Rathor, M Kumar, RK Mishra, S Goswami, A Chaudhary International Journal of Intelligent Engineering & Systems 16 (6), 2023 | | 2023 |
Performance Analysis of Huff and Twisted Huff Elliptic Curves Using UrdhvaTiryagbhayam and Dvandva Yoga Techniques of Ancient Mathematics, MKA Kumar Advances in Mathematics: Scientific Journal 9 (9), 7191-7199, 2020 | | 2020 |
Improved Performance of Crypto System based on Edwards and Twisted Edwards Elliptic Curves using Some Techniques of AIVM, MKA Kumar Journal of Critical reviews 7 (19), 5787- 5799, 2020 | | 2020 |
Improved Cryptographic Schemes Based on Hessian and Twisted Hessian Elliptic Curves Using Some Techniques of AIVM, MKA Kumar International Journal of Advanced Science and Technology 29 (4), 10190-10202, 2020 | | 2020 |
The tri-linear pairing map scheme for elliptic curve cryptography using Vedic Mathematics AKPG Manoj Kumar International Journal of Information Technology and Electrical Engineering 8 …, 2019 | | 2019 |
(t, n)-threshold quantum state sharing scheme of an arbitrary one-qutrit based on linear equation SSDAK Manoj Kumar, M. K. Gupta International Journal of Scientific and Technology Research 8 (10), 334-340, 2019 | | 2019 |