Society for Electronic Transactions and Security(SETS)

(Under O/o The Principal Scientific Adviser to the Govt. of India )

MGR Knowledge City, CIT Campus, Taramani, Chennai - 600113

Patents/Publications

Sivanantham, Geetha, Gowshalya Shri AM, and T. R. Reshmi. “Demonstration of Secure Key Management Solution with Use Case in Permissioned Blockchain.” 2024 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA). IEEE, 2024

Sivanantham, Geetha, Akila Krishnan, and T. R. Reshmi. “Experimenting Integration of Custom ECDSA Algorithm in OpenSSL.” In 2024 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA), pp. 1-6. IEEE, 2024

T.R. Reshmi, and Kunal Abhishek. “5G and 6G Security Issues and Countermeasures.” Secure Communication in Internet of Things. CRC Press, 2024. 300-310

Raja Adhithan RadhaKrishnan:Secure Implementation of SRAM PUF for Private Key Generation. IACR Cryptol. ePrint Arch. 2024: 670 (2024)

Kumar, S., Janet, B., & Neelakantan, S. (2024). IMCNN: Intelligent Malware Classification using Deep Convolution Neural Networks as Transfer learning and ensemble learning in honeypot enabled organizational network. Computer Communications, 216, 16-33

Natarajan Venkatachalam, Foram P. Shingala, C. Selvagangai, S. Dillibabu, Pooja Chandravanshi, and Ravindra P. Singh. “Scalable QKD Post Processing System With Reconfigurable Hardware Accelerator.” IEEE Transactions on Quantum Engineering (2023)

Raja Adhithan RadhaKrishnan: A Black Box Attack Using Side Channel Analysis and Hardware Trojans. IACR Cryptol. ePrint Arch. 2023: 1596 (2023)

Raja Adhithan RadhaKrishnan:Secure Encryption and Key Exchange using Arbiter PUF. IACR Cryptol. ePrint Arch. 2023: 1752 (2023)

R. A. Radhakrishnan and S. Annadurai, “Enhancing Security in Resource-Constrained
Cryptographic Devices: A Lightweight Countermeasure Approach,” iQ-CCHESS2023 KOTTAYAM, India, 2023, pp. 1-6, doi: 10.1109/iQ-CCHESS56596.2023.10391529

Raja Adhithan RadhaKrishnan: Side-Channel Resistant Implementation Using Arbiter PUF. IACR Cryptol. ePrint Arch. 2023: 47 (2023)

Santhosh, Gayathri, and T. R. Reshmi. “A novel revocation management for distributed environment: a detailed study.” Cluster Computing (2023): 1-12

Santhosh, M. Gayathri, and T. R. Reshmi. “Enhancing PKI Security in Hyperledger Fabric with an Indigenous Certificate Authority.” 2023 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA). IEEE, 2023

Monisha, A. Anu, T. R. Reshmi, and Krishnan Murugan. “Secure relay selection scheme for Traffic Congested Zone in VANET using grasshopper optimization and modified authentication key agreement algorithms.” Applied Intelligence 53.5 (2023): 5497-5518

Monisha, A. Anu, T. R. Reshmi, and K. Murugan. “ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET.” Peer-to-Peer Networking and Applications 16.4 (2023): 1761-1784

India Patent No: 202 Patent filed by Dr. Natarajan on “Quantum Random Number Generation Using Photon Shot Noise Sources” for the term of 20 years from the 18th day of May 2022

US Conventional Patent Application no. 18/120,932 titled “Method And System For Generating Decoy Files Using A Deep Learning Engine For Protection Against Ransomware Attacks”

Indian & US Patent filed by Dr Reshmi TR and M Swathi Mithran on METHOD AND SYSTEM FOR GENERATING DECOY FILES USING A DEEP LEARNING ENGINE FOR PROTECTION AGAINST RANSOMWARE ATTACKS filed on 1st October 2022

Natarajan Venkatachalam, M. Prem Laxman Das, “Aggregation of Tokenized Signature Scheme and Its Applications” QCRYPT 2022

Sanjit Chatterjee, M. Prem Laxman Das, Tapas Pandit.”Revisiting the Security of Salted UOV Signature”, INDOCRYPT 2022(14 December 2022)

Abhishek Kunal, E. George Dharma Prakash Raj. “Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography” In Cybernetics and Information Technologies, Volume 21, No 2, pp. 70-88., June 2021. DOI: 10.2478/cait-2021-0020

T.R.Reshmi, “Information Security breaches due to ransomware attacks – a systematic literature review”, International Journal for Information Management data Insights, no. 2 (2021): 100013

T. R. Reshmi, M. Azath, “Improved self-healing technique for 5G networks using predictive analysis” Peer-to-Peer Networking and Applications volume14, pp.375–391(January, 2021)

Prachi Sarode, T. R. Reshmi & Venkatasubbu Pattabiraman, “ Combination of Fitness-Mated Lion Algorithm with Neural Network for Optimal Query Ordering Data Aggregation Model in WSN”, Wireless Personal Communications volume 116, pp.513-538(January,2021)

“Cryptography and Society”, R Balasubramanian, M Prem Laxman Das, Proceedings of the Indian National Science Academy, 86 No. 4 (December, 2020) pp. 1447-1459

Varun Satheesh and Dillibabu Shanmugam, “Implementation Vulnerability Analysis: A Case Study on ChaCha of SPHINCS”, IEEE-iSES 2020( December, 2020)

Lakshmi Devi Kuppusamy, Sivappriya Manivannan, Sarat Chandra Babu N, “TRAP-GATE: A Probabilistic Approach to Enhance Hardware Trojan Detection and its Game Theoretic Analysis” , Journal of Electronic Testing: Theory and Applications, Volume 36, Number 5, pp.607-616. (October, 2020)

Yehoshuva C, Adhithan RR, Anandakumar NN. A Survey of Security Attacks on Silicon Based Weak PUF Architectures. InSecurity in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers (p. 107). Springer Nature

Anandakumar NN, Sanadhya SK, Hashmi MS. Design, Implementation and Analysis of Efficient Hardware-based Security Primitives,IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC) (October, 2020), (pp. 198-199)

Varun Satheesh, Dillibabu Shanmugam, “Implementation vulnerability analysis: A case of chacha SPHINCS”, Proceedings of IEEE International Symposium on Smart Electronic Systems 2020 (IEEE-iSES)

Nagulapati Giri and N. NallaAnandakumar, “Design and Analysis of Hardware Trojan Threats in Reconfigurable Hardware”, ic-ETITE 2020, IEEE, pp. 1-5 (February, 2020)

R. Raja Adhithan, N. Nalla Anandakumar:Modeling Attacks and Efficient Countermeasures on Interpose PUF. FPS 2020: 149-162