Symmetric key cryptosystem based on randomized block cipher S Aruljothi, M Venkatesulu 2010 5th International Conference on Future Information Technology, 1-5, 2010 | 8 | 2010 |
Encryption quality and performance analysis of GKSBC algorithm J Arul, M Venkatesulu J. Inf. Eng. Appl 2 (10), 26-34, 2012 | 7 | 2012 |
Hybrid Approach for Securing Biometric Templates Using Visual Cryptography DSAJ K. Sankareswari International Journal of Advance Research in Computer Science and Management …, 2015 | 3 | 2015 |
Evaluation of Symmetric Key Cryptosystem Based On Randomized Key Block Cipher Algorithm to Cryptanalytic Attacks DSA Jothi IOSR Journal of Engineering (IOSRJEN 9 (2), 1-4, 2019 | 2 | 2019 |
A generalized key scheme in a block cipher algorithm and its cryptanalysis S Aruljothi, M Venkatesulu International Journal of Computer Applications 49 (9), 2012 | 2 | 2012 |
Multimodal Biometric endorsement for secure Internet banking using Skin Spectroscopy, Knuckles texture and Finger nail recognition LT Premakumari, AS Jothi International Research Journal of Engineering and Technology 3 (2), 1086-1090, 2016 | 1 | 2016 |
A New Permutation Based Randomized Neighborhood-Xor Modulo Algorithm DSP Dr. S. Arul jothi International Journal of Applied Engineering Research 14 (3), 604-608, 2019 | | 2019 |
A Survey of Signcryption its Types and Techniques SA R. Bahirathy International Journal Of Engineering And Computer Science 3 (5), 5796-5800, 2014 | | 2014 |
A Survey on Different Encryption Techniques in Network Security S Aruljothi, R Bahirathy International Journal of Computer Applications in Engineering Sciences 4 (1), 1, 2014 | | 2014 |
A NEW APPROACH TO RANDOMIZED KEY IN THE SYMMETRIC BLOCK CIPHER ENCRYPTION ALGORITHM DMV Dr. S. Arul Jothi JOKULL JOURNAL 63 (7), 1-10, 2013 | | 2013 |
A performance analysis of Generalized Key Scheme Block Cipher (GKSBC) algorithm to Cryptanalytic Attacks SA Jothi International Journal of Advanced Engineering, Management and Science 2 (7 …, 0 | | |
Defending Biometric Templates by Multilevel Authentication using BioCryptography and Steganography Techniques TL Premakumari, SA Jothi | | |