Information
Key Notes
- Journal(s): 25
- Conference(s): 14
- Book Chapter(s): 4
- PhD: Current - 12 Awarded - 2
43
PUBLICATIONS14
DOCTORAL STUDENTS5
PROJECTSResearch Areas
Information Security
EDUCATION QUALIFICATION
| Degree | Institute | Year |
|---|---|---|
| Doctor of Philosophy | Hyderabad Central University | 2010 |
| Master of Technology | Andhra University | 2003 |
| Bachelor of Technology | Government college of engineering Erode | 1994 |
COURSES HANDLED
| Course | L-T-P | Credit | Degree Level |
|---|---|---|---|
| Cryptography and Network Security(CS6301) | 3-0-0 | 3 | PG |
| Structural Dynamics(CE5203) | 3-0-0 | 3 | UG, PG |
| Foundations of Cryptography(CS26003) | 3-0-0 | 3 | PG |
| Algorithmic Coding Theory(CS26022) | 3-0-0 | 3 | PG |
| Cryptography(CS352) | 3-0-0 | 3 | UG |
| Problem Solving and Computer Programming(MA144) | 3-0-2 | 4 | UG |
| Foundations of Cryptography(CS5202) | 3-0-0 | 3 | PG |
| Algorithmic Coding Theory(CS5270) | 3-0-0 | 3 | PG |
| Computational Mathematics Practice(CS5204) | 1-1-2 | 3 | PG |
| Computer Architecture(CS253) | 3-0-0 | 3 | UG |
PUBLICATIONS
Journal(s)
Hybrid blockchain enabled authenticated fine grained access control for IoMT enabled smart healthcare systems,
By Vinod mahor, R. Padmavathy Santanu Chatterjee,
ELSEVIER,
Computers and Electrical Engineering,
vol.127,
pp.,
2025
Quantum-Resistant Traceable, Revocable, and Key Escrow-Free CP-ABE for Cloud Storage,
By Sravya Gudipatia, ,Syamkumar P , Padmavathy R.,
Springer,
Peer-to-Peer Networking and Applications,
vol.,
pp.,
2025
PPTFA-SC: Privacy Preserving Three Factor Authentication scheme for Smart City IoT Network,
By Vinod Mahor, R.Padmavathy Santanu Chatterjee,
Inderscience,
International Journal of Ad Hoc and Ubiquitous Computing,
vol.,
pp.,
2025
QS-CPABE: Quantum-Safe CP-ABE with policy hiding and verifiable policy update for cloud storage,
By Sravya Gudipatia,
,Syamkumar P
, Padmavathy R.,
ELSEVIER,
Journal of Information Security and Applications,
vol.92,
pp.,
2025
Secure and lightweight Authentication protocol for anonymous data access in cloud assisted IoT Systems,
By Vinod Mahor, R.Padmavathy and Santanu Chatterjee,
Springer,
Peer to Peer Networking and Applications,
vol.17(1),
pp.321-336,
2024
Survey of Post-Quantum Lattice-based Cipher-text Policy Attribute-based Encryption Schemes: Open Issues and Future Directions,
By G Sravya, P.Syam Kumar, R.Padamavathy,
IEEE,
IEEE Transactions on Services Computing,
vol.17(6),
pp.4540 - 4557,
2024
A Framework for Filtering Step of Number Field Sieve and Function Field Sieve,
By Rahul Janga, R Padmavathy, S.K.Pal and S.Ravi Chandra,
Taylor and Francis,
IETE Journal of Research,
vol.69(6),
pp.3317-3333,
2023
• Quantum-secure N2N authentication protocol model for IoT sensor networks,
By Ch.Jayanth Babu and R. Padmavathy,
Springer,
Arabian Journal of Science and Engineering,
vol.,
pp.,
2023
Disttributed Denial of Service Attack Detection Using Machine Learning Classifiers,
By Gautam Rampalli and R Padmavathy,
Inderscience,
International Journal of Ad Hoc and Ubiquitous Computing,
vol.,
pp.,
2023
An Efficient Scalar Multiplication Algorithm on Koblitz curves using tau^3-NAF,
By Surya Ganesh Ponnuru, Padmavathy R, Anil Pinapati ,
-,
International journal of security and networks,
vol.,
pp.,
2022
Lattice-based lightweight cryptosystem,
By Shivani Jain and R Padmavathy,
Inderscience,
International Journal of Ad Hoc and Ubiquitous Computing ,
vol.41(3),
pp.135-146,
2022
Linear algebra on parallel structures using wiedemann algorithm to solve discrete logarithm problem,
By KS Spoorthi, R Padmavathy, SK Pal, and S Ravi Chandra,
Taylor and Francis,
IETE Journal of Research,
vol.68(4),
pp.2376-2389,
2022
Privacy in content-centric networking against side channel attacks,
By Anmol Agnihotri, Padmavathi R., Santanu Chatterjee, Vinod Mahor,
-,
International journal of security and networks,
vol.,
pp.,
2022
Secure Exchange and Incentivized Collaboration of Machine Learning Models and Datasets using Blockchain.,
By Jessica Judith D'souza, R. Padmavathy, Abhinav Dayal, Harika Gnanaveni and Sreenu Ponnada,
I,
International Journal of information and computer security,
vol.,
pp.,
2022
Relation collection using Pollard special-q sieving to solve integer factorization and discrete logarithm problem,
By S Varshney, P Charpe, R Padmavathy, SK Pal,
Springer,
The Journal of Supercomputing ,
vol.77,
pp.2734-2769,
2021
A secure three factor fully anonymous user authentication protocol for multi-server environment,,
By Vinod Mahor , R.Padmavathiy, Santanu Chatterjee , Sanshray Kumar Dewangan , Manish Kumar,
Inderscience,
International journal of Adhoc and Ubiquitous Computing,
vol.,
pp.,
2020
A Reversible Data Hiding using Prior Pixel Pairs in Two- Dimensional Histogram with Tri-Directional Modification of Difference-Histogram,
By Anil Pinapati R.Padmavathy,
Taylor and Francis,
IETE Technical Review,
vol.,
pp.,
2018
Improved Fast and Secure Hash Algorithm,
By Siddharth Agarwal, Abhinav Rungta, Mayank Shankar, Nipun Rajan and R.Padmavathy,
-,
JIPS,
vol.,
pp.,
2012
Discrete logarithm problem using index calculus method,
By R. Padmavathy , Chakravarthy Bhagvati ,
Elsevier,
Journal of Mathematical and Computer Modelling,
vol.,
pp.,
2012
A Small Sub group Attack for Recovering Ephemeral Keys in Chang and Chang Key Exchange Protocol,
By R.Padmavathy, Chakravarthy Bhagvati,
-,
Journal of Computers,
vol. v6(4) ,
pp.pp804-811,
2011
Ephemeral Key Recovery using Index Calculus Method,
By R.Padmavathy and Chakravarthy Bhagvati,
Taylor and Francis,
Journal of Discrete Mathematical Sciences and Cryptography,
vol.v13(1),
pp.pp29-43,
2010
IMPROVED THREE PARTY EKE PROTOCOL,
By R Padmavathy,
=,
Information Technology and Control,
vol.,
pp.,
2010
Solving Discrete Logarithm Problem for Ephemeral Key Recovery Chang and Chang Key Exchange Protocol,,
By Padmavathy, Chakravarthy Bhagvati
,
-,
JIPS,
vol. v6(3),
pp. pp52-62,
2010
Cryptanalysis on a Three Party Key Exchange Protocol-STPKE',
By R.Padmavathy, T.Sirisha,
-,
Journal of Information Processing and Systems,
vol.v 6(1),
pp.pp 43-52,
2010
Performance analysis of index calculus method,
By R. Padmavathy & Chakravarthy Bhagvati,
Taylor and Francis,
Journal of Discrete Mathematical Sciences and Cryptography,
vol.,
pp.,
2009
Conference(s)
High Performance RLWE-based Somewhat Homomorphic Encryption via Mersenne Prime Optimization
By Shazia Tazeen and R Padmavathy,
International Symposium on Quantum Computing and Applications ,
2026
Cryptanalytic Vulnerabilities in PRNS-Based Symmetric Encryption
By Ratnakaram Venkata Sai Sidhartha, Rahul Patel, Shazia Tazeen and Padmavathy R,
SCEECS,
2026
An Efficient Blind Signature using τ4 NAF multiplication on Koblitz Curve
By Akshaykrishnan V,
Anil Pinapati, Padmavathy R,
16th International IEEE Conference on Computing, Communication and Networking Technologies (ICCCNT 2025),
2025
Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption from Module-LWE for Cloud Storage
By G Sravya, PS Kumar, R Padmavathy,
IEEE CLOUD 2023,
2023
Three factor chaotic map based efficient authentication scheme for smart healthcare systems
By Vinod Kumar Mahor; R. Padmavathy; Santanu Chatterjee,
7th International Conference on Electronics, Materials Engineering & Nano-Technology ,
2023
Issuing and Verifying of Blockchain based Certificates
By Yousuf Nizam, Prathna, ch. Jayanth Babu, Tanvi Tadimeti, R.Padmavathy,
MCCS 2020,
2020
Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
By Sumit Sharma, Ashutosh Swarnakar, Ch. Jayanth Babu, R.Padmavathy, Rakeksh Kumar,
(ICCCS 2020,
2020
Sparse Linear Algebra in Function Field Sieve
By Gaurav Dhumal
R Padmavathy
,
ICCCNT 2017,
2017
A Solution for Drive-by-Download Attacks
By Gireesh Joshi, R Padmavathy, Anil Pinapati, Mani Bhushan Kumar,
MCCS 2017,
2017
A Reversible Data Hiding using Difference Histogram modification on Multi-Directional in Two-Dimensional Histogram
By Anil Pinapati, R.Padmavathy,
MCCS 2017,
2017
Unknown Key Share Attack on STPKE
By R.Padmavathy, Chakravarthy Bhagvati,
BAIP 2010,
2010
Discrete Logarithm Problem using Index Calculus Method
By R Padmavathy
Chakravarthy Bhagvati
,
FTRA WCC 2010 ,
2010
Methods to solve Discrete Logarithm Problem for Ephemeral Keys
By R Padmavathy
Chakravarthy Bhagvati
,
International Conference on Advances in Recent Technologies in Communication and Computing Chennai,
2009
A Key Recovery attack on Chang and Chang Password Key Exchange Protocol
By R Padmavathy
Chakravarthy Bhagvati
,
ICCNT 2009,
2009
Book Chapter(s)
Concrete Cryptanalysis of LWE: Advances, Benchmarks, and Experimental Realities
By Shazia Tazeen and R. Padmavathy in
Quantum-Inspired Neural Networks: Perspectives and Challenges,
CRC Press, Taylor and Francis,
-,
2025
A Deep Learning Framework to Preserve Privacy in Federated (Collaborative) Learning
By Sai Ganesh, Chinni Dheeraj, R Padmavathy in
Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities,
Springer,
Studies in Computational Intelligence (SCI, volume 972),
2021
Special-q Techniques for Number Field Sieve to Solve Integer Factorization
By Tanmay Sharma, R Padmavathy in
Smart Innovations in Communication and Computational Sciences:,
Springer,
AISC,volume 669,
2019
Block Lanczos to Solve Integer Factorization Problem Using GPU’s
By Harish Malla, Vilas SantKaustubh, Rajasekharan Ganesh & Padmavathy R. in
Advances in Computer Science and Information Technology. Networks and Communications ,
Springer,
LNICST,volume 84,
2012
PROJECT / CONSULTANCY
Information Security Education Awareness (ISEA) Phase-III
Role:
Co-Principal Investigator
Type: Research
Sponsor: MIETY
Project Cost (INR): 20160000
Date of Commencement: 01-08-2024
Duration: 55 Months
Status: Ongoing
Type: Research
Sponsor: MIETY
Project Cost (INR): 20160000
Date of Commencement: 01-08-2024
Duration: 55 Months
Status: Ongoing
Design and Development of Non Binary LDPC codes for Navigation Systems
Role:
Principal Investigator
Type: Research
Sponsor: ISRO
Project Cost (INR): 2850000
Date of Commencement: 09-03-2025
Duration: 36 Months
Status: Ongoing
Type: Research
Sponsor: ISRO
Project Cost (INR): 2850000
Date of Commencement: 09-03-2025
Duration: 36 Months
Status: Ongoing
Design and Implementation of Discrete Logarithm Problem over GF(2^n) using Quasi Polynomial time algorithm
Role:
Principal Investigator
Type: Research
Sponsor: DRDO
Project Cost (INR): 2500000
Date of Commencement: 16-03-2022 Date of Completion: 04-12-2024
Duration: 33 Months
Status: Completed
Type: Research
Sponsor: DRDO
Project Cost (INR): 2500000
Date of Commencement: 16-03-2022 Date of Completion: 04-12-2024
Duration: 33 Months
Status: Completed
Solving Discrete Logarithm Problem over GF(2^n) using Function Field Sieve method
Role:
Principal Investigator
Type: Research
Sponsor: DRDO
Project Cost (INR): 2500000
Date of Commencement: 03-03-2016 Date of Completion: 03-03-2018
Duration: 24 Months
Status: Completed
Type: Research
Sponsor: DRDO
Project Cost (INR): 2500000
Date of Commencement: 03-03-2016 Date of Completion: 03-03-2018
Duration: 24 Months
Status: Completed
Secure SMS Using Koblitz Curve Based ECC on Android Devices
Role:
Principal Investigator
Type: Research
Sponsor: SERB, DST
Project Cost (INR): 0
Date of Commencement: 26-06-2013 Date of Completion: 16-06-2015
Duration: 24 Months
Status: Completed
Type: Research
Sponsor: SERB, DST
Project Cost (INR): 0
Date of Commencement: 26-06-2013 Date of Completion: 16-06-2015
Duration: 24 Months
Status: Completed
RESEARCH FELLOWS / PhD STUDENTS
Current PhD Students
Archana Pallikonda
Area of Research:
Comprehensive Biometric Solutions:
Fingerprint Optimization and Recognition
Systems
B Rajkumar
Area of Research:
Cyber security
B.Ramji
Area of Research:
IoT - Security and Privacy
Buddaraju Sunayana
Area of Research:
Quantum Cryptanalysis
Ganesh Gugloth
Area of Research:
Design and Development of Security Protocols in VANETs
Gautam Rampalli
Area of Research:
Detection and Mitigation of Distributed Denial of Service Attacks
Jayasree A
Area of Research:
DDoS detection to enhance IoT Security
Makam Pravellika
Area of Research:
Computational studies on solving discrete logarithm problem
Pondugula Sirisha
Area of Research:
Coding Theory
Shazia Tazeen
Area of Research:
Lattice-based cryptography for resource-constrained devices.
Sravya Gudipati
Area of Research:
Post Quantum based CP ABE for Cloud Storage
Vinod Mahor
Area of Research:
Authentication and Access Control Protocols for Resource constrained environment
Previous PhD Students
Jayanth Babu
(2024)
Area of Research:
Ring-LWE based Post-Quantum Authentication Protocols
for Internet of Things and Blockchain Applications
Anil Pnapati
(2018)
Area of Research:
Algorithms to improve the efficiency of scalar multiplication on Koblitz curve based Elliptic Curve Cryptography and it’s applications
CONFERENCE / WORKSHOP / SYMPOSIUM / SHORT TERM COURSE / FACULTY DEVELOPMENT PROGRAMME
ADDITIONAL RESPONSIBILITIES
- Head, Department of Computer Science and Engineering (July, 2023 - June, 2025)
- Coordinator, Induction Program (November, 2022 - November, 2022)
- Coordinator, Induction Program (December, 2021 - December, 2021)
- Associate dean (student welfare) (September, 2021 - June, 2023)
- Faculty-In-Charge, CSEA (August, 2021 - June, 2023)
- Coordinator, Curriculum revision M.Tech CSIS (May, 2021 - September, 2021)
- Member, IIAC(Institute Information Advisory Committee) (January, 2020 - June, 2022)
- Technical program committee member E&ICT (Continuing from August, 2017)
- Ladies hostel warden (August, 2011 - July, 2014)
Last updated on February 20, 2026