User profiles for Atul Chaturvedi
On authentication schemes using polynomials over non commutative rings
Authentication is a term very important for data communication security. We see many frauds
due to authentication failure. The problem manifolds when communication is over insecure …
due to authentication failure. The problem manifolds when communication is over insecure …
Journey of cryptocurrency in India in view of financial budget 2022-23
Recently, Indian Finance minister Nirmala Sitharaman announced in Union budget 2022-23
that Indian government will put 30% tax (the highest tax slab in India) on income generated …
that Indian government will put 30% tax (the highest tax slab in India) on income generated …
A unique key sharing protocol among three users using non-commutative group for electronic health record system
We know that the importance, need and utility of EHR (Electronic Health Record) system is
increasing rapidly in the modern world. The developed countries like USA, Canada has …
increasing rapidly in the modern world. The developed countries like USA, Canada has …
Catalytic cascade cyclization and regioselective hydroheteroarylation of unactivated alkenes
A Pd(II)-catalyzed directed, regio-controlled hydroheteroarylation of unactivated alkenes via
a cascade intramolecular amino/oxy/carbo-palladation of alkynes followed by cis-migratory …
a cascade intramolecular amino/oxy/carbo-palladation of alkynes followed by cis-migratory …
A random encoding method for secure data communication: an extension of sequential coding
The security of data communication is very important in all aspects. V. Shukla et al. had
proposed a secure sequential coding method. They have shown the results for text secret …
proposed a secure sequential coding method. They have shown the results for text secret …
A secure stop and wait communication protocol for disturbed networks
Secure data communication is the need of hour today specifically when the wireless
communication channel is insecure. We are proposing a protocol which can be customized in …
communication channel is insecure. We are proposing a protocol which can be customized in …
A new authentication procedure for client-server applications using HMAC
Hash functions are used for data integrity and authentication but unfortunately they suffer with
man in the middle attack problem. An intruder who has command over the communication …
man in the middle attack problem. An intruder who has command over the communication …
Three party key sharing protocol using polynomial rings
A Chaturvedi, V Shukla… - 2018 5th IEEE Uttar …, 2018 - ieeexplore.ieee.org
All of us know that authentication and key agreement are the two cryptographic services very
important for data communication. People use online methods for information exchange …
important for data communication. People use online methods for information exchange …
Rh (iii)-catalyzed sp 3/sp 2–C–H heteroarylations via cascade C–H activation and cyclization
The development of an efficient strategy for facile access to quinoline-based bis-heterocycles
holds paramount importance in medicinal chemistry. Herein, we describe a unified …
holds paramount importance in medicinal chemistry. Herein, we describe a unified …
Nanotechnology and cryptographic protocols: issues and possible solutions
V Shukla, A Chaturvedi… - Nanomaterials and …, 2019 - icevirtuallibrary.com
Nanotechnology has provided an immense increment in computational power. This high
computational strength is very dangerous for existing cryptographic protocols, and the Data …
computational strength is very dangerous for existing cryptographic protocols, and the Data …