Skip to main content
Over the last few years, among various alternatives to the Einstein theory of gravity, especially theories of gravity have received more importance due to number of interesting results in cosmology and astrophysics. Pandey [10] gave an... more
    • by 
Over the last few years, among various alternatives to the Einstein theory of gravity, especially theories of gravity have received more importance due to number of interesting results in cosmology and astrophysics. Pandey [10] gave an... more
    • by 
Modified theories of Gravity have gained increased attention over the last few years due to combined motivation coming from various branches of physics. Among various alternatives to the Einstein theory of gravity, especially f (R)... more
    • by 
    • Physics
    • by 
Now-a-days computational fluid mechanics has become very vital area in which obtained governing equations are differential equations. Sometimes, these governing equations cannot be easily solved by existing analytical methods. Due to this... more
    • by 
    •   4  
      Applied MathematicsNumerical AnalysisFinite Difference MethodFinite Volume Method
Convection-Diffusion Problems occur very frequently in applied sciences and engineering. In this paper, the cru x of research articles published by numerous researchers during 2007-2011 in referred journals has been presented and this... more
    • by 
    •   2  
      MathematicsApplied Mathematics
Convection-diffusion problems arise frequently in many areas of applied sciences and engineering. In this paper, we solve a convection-diffusion problem by central differencing scheme, upwinding differencing scheme (which are special... more
    • by 
    •   3  
      MathematicsFinite Volume MethodConvection Diffusion Equation
The single-phase pressure drop and heat transfer in a rotor-assembled strand inserted tube were measured using water as the working fluid. Experiment using a smooth tube was carried out to calibrate the experimental system and the data... more
    • by 
    •   8  
      Chemical EngineeringMaterials ScienceMechanicsThermodynamics
An e# cient and semantically secure public key cryptosystem based on singular cubic curve is proposed in this paper. It is about two times faster than the cryptosystem of David at the same security label and more e# cient than the Koyama... more
    • by 
    •   2  
      SEMANTIC SECURITYPublic Key Cryptosystem
Abstract: The standard RSA cryptosystem is not semantically secure. Pointcheviel proposed a variant of RSA cryptosystem with the property of semantic security by introducing a new problem known as DRSA problem. He called it DRSA scheme.... more
    • by 
Digital signatures are efficient tools for source authenticationin cryptography. The concept of proxy signature enables a signer todelegate its signing capability to any other party, called proxy signer. Inthis paper, an efficient... more
    • by 
In this paper we revisit Meng et. al [9] method to find new weakness in RSA. Let N= pq be an LSBS-RSA modulus where p and q have same bit length. Let p and ρq share the m least significant bits, where ρ (1≤ ρ≤ 2) is known to the attacker.... more
    • by 
Abstract: Identity-based (ID-based) public key settings are very good alternatives for the certificate based public key settings. Proxy signatures are good tools to delegate the signing capability by original signer to any other parties.... more
    • by 
    • Security Analysis
Abstract. RSA type public key cryptosystems based on the Pell's equation are proposed in the honor of an Indian mathematician Brahmgupta who studied Pell's equation long before European mathematicians came to know about it.... more
    • by 
    •   3  
      SEMANTIC SECURITYSignature SchemePublic Key Cryptosystem
An efficient and semantically secure public key cryptosystem based on singular cubic curve is proposed in this paper. It is about two times faster than the cryptosystem of David at the same security label and more efficient than the... more
    • by 
An attack is possible upon all three RSA analogue PKCs based on singular cubic curves given by Koyama. While saying so, Seng et al observed that the scheme become insecure if a linear relation is known between two plaintexts. In this... more
    • by 
Proxy signature is useful in situation when a user wants to authorize an agent called proxy signer to sign any document on his behalf. Multi-proxy multi-signature is one of the primitives of proxy signature. Bilinear pairing makes the... more
    • by 
    •   7  
      Computer ScienceDigital SignatureCryptographyElliptic curves
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public-key... more
    • by 
    •   2  
      Provable SecurityElliptic Curve Cryptography
The cryptosystem proposed by Koyama is not semantically secure. Also, it is not secure against partial known plaintext attack, linearly related plaintext attack and low exponent attack. In this paper we propose a cryptosystem over... more
    • by 
    •   2  
      SEMANTIC SECURITYPublic Key Cryptosystem
Proxy signature is an active research area in cryptography. A proxy signature scheme allows an entity to delegate his or her signing capability to another entity in such a way that the latter can sign messages on behalf of the former.... more
    • by 
    •   3  
      Distributed ComputingDigital SignatureElectrical and Electronic Engineering