Department of Mathematics Department
2540
Sri Bora Ravi Kumar
Assistant Professor

Qualification: M.Sc., M.Phil
Specialization: Applied Mathematics
Phone No: 0891 2840268 (O)
EmailID: ravikumar.bora@gitam.edu

More details

SlnoTitleJournal NameVolumesYear
1 A Diffie-Hellman key exchange for self-Encryption over points on the Elliptic Curve Cryptography Journal of Information and computing Science Vol. 12(2), pp. 083-087, 2017
2 An Encryption Scheme Of Points On The Elliptic Curve and Golden Matrices Asian Journal of Mathematics and Computer Research Vol.15(2),pp.113-122 2017
3 An Encryption Scheme Of Points On The Elliptic Curve and Golden Matrices Asian Journal of Mathematics and Computer Research Vol.15(2),pp.113-122 2017
4 An Encryption Scheme Of Points On The Elliptic Curve and Golden Matrices Asian Journal of Mathematics and Computer Research Vol.15(2),pp.113-122 2017
5 Multiple Encryption Of Various Ciphers International Journal of Engineering Science Invention Research & Development Vol.2(8), p.p.582-588 2016
6 An ElGamal Encryption Scheme of Pauli Spin ½ Matrices and Finite Machines International journal of Mechatronics, Electrical and Computer technology Vol. 5(18) ,PP. 2577-2584. 2015
7 An Elgamal Encryption Scheme of Fibonacci Q-Matrix and Finite State Machine Journal of Applied Computer Science & Mathematics Volume 20(9), pages 13-17. 2015
8 An ElGamal Encryption of Finite State Machines and points on the Elliptic Curve Journal of theoretical physics & Cryptography Vol. 9, p,p 1-5. 2015
9 Linearly independent spanning sets and linear transformations for Multi-level Encryption Journal of Information & Optimization Sciences(Taylor & Francis) Volume 36, Number 4, pages 385-392. 2015
10 An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines COMPUSOFT, An international journal of advanced computer technology Volume 4(3), pages 1548-1554. 2015
11 A Novel ElGamal Encryption Scheme of Elliptic Curve Cryptography International Journal of Computer Trends and Technology Volume 20(2), pages 70-73. 2015
12 A One to One Correspondence in Elliptic curve Cryptography International Journal of Mathematical Archive Volume 4(3), pages 300-304. 2013
13 A Cryptographic Scheme of Finite Fields Using Logical Operators International Journal of Computer Applications Volume 31(4), pages 1-4. 2011
14 Cyclic Groups of Elliptic Curves – An Implementation to Cryptography International Journal of Advanced Research in Computer Science Volume 2(5),pages 544-546. 2011
15 A Study on Group Theoretic Elliptic Curves – An Implementation to Cryptography International Journal of Science and Advanced Technology Volume 1(6), pages 6-9. 2011
16 A Cryptographic Scheme Of Laplace Transforms ” International Journal of Mathematical Archive Volume 2(12), pages 2515-2519. 2011
17 Fourier Transforms and quadratic forms for Digital audio watermarking International Conference on Advances in recent Technologies in Communications and Computing ARTCom-2009 Pages 449-452 2009