Department of Mathematics Department
2502
Dr.Akkapeddi Chandra Sekhar
Professor

Qualification: M.Sc., M.Phil., Ph.D.
Specialization: Cryptography
Phone No: 0891 2840527 (O)
EmailID: chandrasekhar.akkapeddi@gitam.edu

More details

SlnoTitleJournal NameVolumesYear
1 ON NON METRIZABILITY OF CONE METRIC SPACES Int. J. of Mathematical Sciences and Applications ISSN 2230-9888:Vol. 1, No. 3, pp-1533-1535 SEP,2011
2 ”Cyclic groups of Elliptic Curves-An implementation to Cryptography International Journal of Advanced Research in Computer Science ISSN 0976-5697, Vol.2 No.4, SEP 2011
3 Cryptographic Scheme for Digital Signals using Finite State Machines International Journal of Computer Applications (0975–8887)Volume29–No.6,pp61-63 SEP 2011
4 A Cryptographic Scheme of Finite fields using logical operators International Journal of Computer Applications ISSN0975-8887Vol-31,No 4,pp 1-4 Oct 2011
5 A Block Cipher using Graph structures and logical XNOR Operators International Journal of Computer Applications 0975-8887,Vol-33,No-7,pp 6-10 Nov 2011
6 A Block Cipher using rotation and logical XOR Operators International Journal of Computer Science Issues ISSN-1694-0814,Vol-8,Issue-6,pp 142-147 Nov 2011
7 Self encrypting Data Streams using Graph Structures IETECH international journal of advanced computations Vol.1,ISSN -093-807X pp 7-9, NOV 2008
8 Cryptographic scheme for digital signals IETECH international journal of advanced computations ISSN 0973-807X,vol1,No-4,pp195-200 NOV 2008
9 Finite State Machines and Recurrence Matrices of Cryptology IJMA ISSN:2229-5046:PP 219-222 MAY 2013
10 A Novel Encryption Scheme for Secure Communication using Mealay Machine IJMA ISSN:2229-5046:PP 223-228 MAY 2013
11 Application of Mealay Machine and Recurrence Relations in Cryptology IJMA ISSN:2229-5046:PP 246-250 MAY 2013
12 "A Noval Encryption scheme based on double base canonical number systems" International journal of Engineering Sciences and Technology Vol.2(5) ISSN-0975-5462,PP.1085-1087 MAY 2010
13 Cryptographic protection of Digital Signal Using some recurrence relations IJCSNS ISSN 1738-7906 May 2007, PP203-207, May 2007
14 Some Algebraic Curves in public Key crypto systems International Journal of Ultra Scientist of Physical Sciences ISSN 0970-9150,December 2007, pp 533-540 MAY 2007
15 New Encryption Scheme using Finite State Machine and the Operation Concatenation International Journal of Computer Information Systems Vol.4,No.3 March 2012
16 A coincidence point theorem for a pair of self maps on a partially ordered cone metric space Journal of Advanced Research in Pure Mathematics Vol. 5, Issue. 3, 2013, pp. 98-106 Marcch,2013
17 Encryption of data streams using Puli spins 1/2 matrices. International journal of Engineering Sciences and Technology Vol.2(6), ISSN - 0975-5462, PP.2020-2028 JUN 2010
18 A Block Cipher using Logical XNOR and NOT operators International Journal of Science and Advanced Technology ISSN 2221-8386 Volume 1 No 4 pp59-62 JUN 2011
19 A Novel Encryption for Secret Sharing using Finite State Machine IJMA ISSN:2229-5046:PP 267-272 JULY 2013
20 Encryption of Data Streams using Pauli Spins 1/2 Matrices and Finite State Machine International Jouranal of computer Applications Vol37-No2,Jan2012,pp8-12 JAN 2012
21 A Fixed Point Theorem for Cone Convex Contractions of order m>2 International Journal of Mathematical Sciences and Engineering Applications ISSN 0973-9424,vol6,No.1,pp263-271 JAN 2012
22 A Key-Scheduled Block Cipher Using element-wise Linear Transformation and Logical XOR Operation International Jouranal of Engineering Reearch and Applications ISSN-2248-9642Vol. 2, Issue-1,pp 417-425 JAN 2012
23 A Cryptographic Scheme of Laplace Transforms International Journal of Mathematical Archieve ISSN 2229-5046,Vol1No12,page 2515-2519, JAN 2012
24 Fuzzy C-Means clustering for robust decentralized load frequency control 3 of interconnected power system with Generation Rate Constraint Elsevier,Electrical Power and Energy Systems vol37(2012),pp-58-66 Feb,2012
25 Authentic Transport in Symmetric Cryptographic Protocols Using Some Elliptic Curves over Finite Fields International Journal of Mathematical Archive Issue-3.No1,pp 137-142 FEB 2012
26 A fixed point theorem in cone metric spaces under weak contractions Gen.Math.Notes Vol.7,No2;pp-38-44 Dec-2011
27 Secure Key Transport in Symmetric Cryptographic Protocols using Some Elliptic Curves over Finite Fields International Journal of Computer Applications ISSN 0975-8887,vil.36,no.1 pp 27-30 Dec 2011
28 “A study on Group-theoretic Elliptic curves-An implementation to cryptography” International Journal of Science and Advanced Technology ISSN2221-8386,Vol1No6,pp6-9 AUG 2011
29 "Self Encrypting data streams of digital signal" International Journal of Computer and Network Security ISSN-2076-2739,Vol.2,No.4,pp111-113 Apr,2010
30 Multiple encryptions of various ciphers International journal of Engineering science invention research & development Vol –II(VIII), pages -582-588 2016
31 Multiple encryptions of independent ciphers International journal of Mathematical Archive Vol-7(2), pages-103-110 2016
32 Fixed point theorem for a pair of self maps in ordered cone metric spaces under lattice ordered c- distance International journal of mathematical education Vol -5(1), pages-52-64 2015
33 Linearly independent spanning sets and linear transformations for Multi-level Encryption International Journal of Information &Optimization Sciences Taylor & Francis-Vol-36 No/;4,pp.385-392 2015
34 Fixed point theorem for a self map in ordered cone metric space under lattice ordered c-distance International journal of micro circuits and electronic Vol -6(1), pages-1-14. 2015
35 A common fixed point theorem for two self maps in a cone metrix space with ?- distance International journal of Applied Engineering research Vol -9(20), pages 6543-6550 2014
36 A common fixed point theorem in Metric spaces for an asymptotically regular self map. hInternational journal of pure Algebra Vol -3(9),pages 1-5 2013
37 A common fixed point theorem for two self maps on a cone metric space with ?-distance International Journal Mathematics Research Vol-4(6), pages:689-697 2012
38 Fast Fourier Transforms and Quadratic forms for digital audio water marking IEEE PP 203-206 2009
39 Data Encryption Tecgniques using random number generator IEEE PP 576-579 2007
40 EXISTENCE OF COMMON FIXED POINTS FOR A PAIR OF SELF MAPS ON A CONE METRIC SPACE UNDER B.C. CONTROL-CONDITION Advances in Fixed Point Theory ISSN: 1927-6303,No.1,pp.49-59 March 2013