1. Carry out Directed Basic Research and develop Tools and Techniques in the area of Cryptology and Secure Protocols.
2. Provide a Platform for translating basic research into Prototypes for data security and analysis.
3. Act as a bridge between Academia and Government organizations for collaborative R&D towards Product development.
4. Provide Consultancy Services and Training on Cyber Security matters for Business, Government and Critical Infrastructure Sectors.
Sanjit Chatterjee, M. Prem Laxman Das, Tapas Pandit."Revisiting the Security of Salted UOV Signature", INDOCRYPT 2022(14 December 2022)
Abhishek Kunal, E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography" In Cybernetics and Information Technologies, Volume 21, No 2, pp. 70-88., June 2021. DOI: 10.2478/cait-2021-0020
T.R.Reshmi, "Information Security breaches due to ransomware attacks - a systematic literature review", International Journal for Information Management data Insights, no. 2 (2021): 100013
T. R. Reshmi, M. Azath, “Improved self-healing technique for 5G networks using predictive analysis” Peer-to-Peer Networking and Applications volume14, pp.375–391(January, 2021)
Prachi Sarode, T. R. Reshmi & Venkatasubbu Pattabiraman, “ Combination of Fitness-Mated Lion Algorithm with Neural Network for Optimal Query Ordering Data Aggregation Model in WSN”, Wireless Personal Communications volume 116, pp.513-538(January,2021)
'Cryptography and Society', R Balasubramanian, M Prem Laxman Das, Proceedings of the Indian National Science Academy, 86 No. 4 (December, 2020) pp. 1447-1459
Varun Satheesh and Dillibabu Shanmugam, "Implementation Vulnerability Analysis: A Case Study on ChaCha of SPHINCS", IEEE-iSES 2020( December, 2020)
Lakshmi Devi Kuppusamy, Sivappriya Manivannan, Sarat Chandra Babu N, "TRAP-GATE: A Probabilistic Approach to Enhance Hardware Trojan Detection and its Game Theoretic Analysis" , Journal of Electronic Testing: Theory and Applications, Volume 36, Number 5, pp.607-616. (October, 2020)
Yehoshuva C, Adhithan RR, Anandakumar NN. A Survey of Security Attacks on Silicon Based Weak PUF Architectures. InSecurity in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers (p. 107). Springer Nature.
Anandakumar NN, Sanadhya SK, Hashmi MS. Design, Implementation and Analysis of Efficient Hardware-based Security Primitives,IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC) (October, 2020), (pp. 198-199).
Varun Satheesh, Dillibabu Shanmugam, “Implementation vulnerability analysis: A case of chacha sphincs”, Proceedings of IEEE International Symposium on Smart Electronic Systems 2020 (IEEE-iSES).
Nagulapati Giri and N. NallaAnandakumar, “Design and Analysis of Hardware Trojan Threats in Reconfigurable Hardware”, ic-ETITE 2020, IEEE, pp. 1-5 (February, 2020)