Motilal Nehru National Institute of Technology
Mathematics Department
Over the last few years, among various alternatives to the Einstein theory of gravity, especially theories of gravity have received more importance due to number of interesting results in cosmology and astrophysics. Pandey [10] gave an... more
Over the last few years, among various alternatives to the Einstein theory of gravity, especially theories of gravity have received more importance due to number of interesting results in cosmology and astrophysics. Pandey [10] gave an... more
Modified theories of Gravity have gained increased attention over the last few years due to combined motivation coming from various branches of physics. Among various alternatives to the Einstein theory of gravity, especially f (R)... more
Now-a-days computational fluid mechanics has become very vital area in which obtained governing equations are differential equations. Sometimes, these governing equations cannot be easily solved by existing analytical methods. Due to this... more
Convection-Diffusion Problems occur very frequently in applied sciences and engineering. In this paper, the cru x of research articles published by numerous researchers during 2007-2011 in referred journals has been presented and this... more
Convection-diffusion problems arise frequently in many areas of applied sciences and engineering. In this paper, we solve a convection-diffusion problem by central differencing scheme, upwinding differencing scheme (which are special... more
The single-phase pressure drop and heat transfer in a rotor-assembled strand inserted tube were measured using water as the working fluid. Experiment using a smooth tube was carried out to calibrate the experimental system and the data... more
An e# cient and semantically secure public key cryptosystem based on singular cubic curve is proposed in this paper. It is about two times faster than the cryptosystem of David at the same security label and more e# cient than the Koyama... more
Abstract: The standard RSA cryptosystem is not semantically secure. Pointcheviel proposed a variant of RSA cryptosystem with the property of semantic security by introducing a new problem known as DRSA problem. He called it DRSA scheme.... more
Digital signatures are efficient tools for source authenticationin cryptography. The concept of proxy signature enables a signer todelegate its signing capability to any other party, called proxy signer. Inthis paper, an efficient... more
In this paper we revisit Meng et. al [9] method to find new weakness in RSA. Let N= pq be an LSBS-RSA modulus where p and q have same bit length. Let p and ρq share the m least significant bits, where ρ (1≤ ρ≤ 2) is known to the attacker.... more
Abstract: Identity-based (ID-based) public key settings are very good alternatives for the certificate based public key settings. Proxy signatures are good tools to delegate the signing capability by original signer to any other parties.... more
Abstract. RSA type public key cryptosystems based on the Pell's equation are proposed in the honor of an Indian mathematician Brahmgupta who studied Pell's equation long before European mathematicians came to know about it.... more
An efficient and semantically secure public key cryptosystem based on singular cubic curve is proposed in this paper. It is about two times faster than the cryptosystem of David at the same security label and more efficient than the... more
An attack is possible upon all three RSA analogue PKCs based on singular cubic curves given by Koyama. While saying so, Seng et al observed that the scheme become insecure if a linear relation is known between two plaintexts. In this... more
Proxy signature is useful in situation when a user wants to authorize an agent called proxy signer to sign any document on his behalf. Multi-proxy multi-signature is one of the primitives of proxy signature. Bilinear pairing makes the... more
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public-key... more
The cryptosystem proposed by Koyama is not semantically secure. Also, it is not secure against partial known plaintext attack, linearly related plaintext attack and low exponent attack. In this paper we propose a cryptosystem over... more
Proxy signature is an active research area in cryptography. A proxy signature scheme allows an entity to delegate his or her signing capability to another entity in such a way that the latter can sign messages on behalf of the former.... more