Dr. R. PADMAVATHY

Associate Professor

Department of Computer Science And Engineering

National Institute of Technology, Warangal - 506004, Telangana, INDIA

: rpadma@nitw.ac.in

: 08702468738, 9440173819

Interests: Cryptanalysis and Network Security

Course Taught Previously


Academic YearSemesterClassesCourse IDCourse Name

2008-09

8

B.Tech
 
Network Programming and Cryptography

2008-09

5

M.C.A
 
Network Programming and security

    

2009-10

3

B.Tech
 
Data Structures and Algorithms

2009-10

4

B.Tech
 
System Programming

2009-10

2

M.Tech
 
Advanced Computer Networks and Security

2009-10

2

M.Tech
 
Socket Programming and Network Security

2010-11

3

B.Tech
 
Data Structures and Algorithms

2010-11

1

M.Tech
 
Cryptanalysis

2010-11

2

M.C.A
 
System Software
2011-122M.C.A Computer Organization
2011-121B.Tech PSCP
2011-124B.Tech Systems Programming
2011-122M.C.A Systems software
2012-138B.Tech Network Programming
2012-135M.C.A Network Programming and Security
2012-13 2 B.Tech Systems Programming
2013-148
B.Tech
 Network Programming
2013-141M.Tech Cryptanalysis
2013-144B.Tech Systems Programming
2014-15 1M.Tech
 Foundations of Cryptography
2014-158B.Tech Cryptography and Network Security
2014-154B.Tech Systems Programming
2015-161M.Tech Foundations of Cryptography
2015-168B.Tech Cryptography and Network Security
2016-178B.Tech Cryptography and Network Security
2016-171M.Tech Foundations of Cryptography
2016-174B.Tech Systems Programming
2016-172M.Tech Algorithmic Coding Theory

 

 

Courses Currently Being Taught


ClassesDepartmentSemesterCourse IDCourse Name

B.Tech

C.S.E

8
 
Cryptography and Network Security

M.Tech
CSIS
1
 Foundations of Cryptography


Journal Publication Details


AuthorTitleJournal NameVol. Page. Year.

R.Padmavathy, Chakravarthy Bhagvati, H.P. Rani

Discrete Logarithm Problem in Elliptic Curve Group using Pollard Rho

International Journal on Computing and Mathematical Applications

v2(1-2), pp 81-92, 2008

R.Padmavathy, Chakravarthy Bhagvati

Improved Cryptanalysis on DLP ? = aa b

International Journal on Computer Science and Engineering Systems

v3(4), pp 22-27, 2009

R.Padmavathy, Chakravarthy Bhagvati

Performance Analysis on Index Calculus Method

Journal of Discrete Mathematical Sciences and Cryptography

v12(3), pp71-92, 2009

R.Padmavathy, Chakravarthy Bhagvati

Ephemeral Key Recovery using Index Calculus Method

Journal of Discrete Mathematical Sciences and Cryptography

v13(1), pp 29-43, 2010

R.Padmavathy

Improved Three Party EKE Protocol

Information Technology and Control

v39(3), 2010
Sirisha Tallapally, R.PadmavathyCryptanalysis on a Three Party Key Exchange Protocol-STPKE'.Journal of Information Processing and Systemsv6(1),43-52, 2010

R.Padmavathy, chakravarthy Bhagvati

Solving Discrete Logarithm Problem for Ephemeral Key Recovery on Chang and Chang Key Exchange Protocol

Journal of Information Processing and Systems

v6(3), pp 52-62, 2010

R.Padmavathy, Chakravarthy Bhagvati

A Small Sub group Attack for Recovering Ephemeral Keys in Chang and Chang Key Exchange Protocol

Journal of Computers

v6(4), pp 804-811, 2011

R.Padmavathy

Impersonating the Server Attack on Simple Three Party Key Exchange Protocol

International Journal on Computer Science and Engineering Systems

v5(2), 2011

R.Padmavathy, Chakravarthy Bhagvati

Index Calculus Method based on Smooth Numbers of 1 over Zp*

International Journal on Network Security
v15(1), pp210-218,2013


R.Padmavathy, Chakravarthy Bhagvati

A password Attack on S3-PAKE

International Journal of Security and its applications

Accepted

R.Padmavathy, Chakravarthy Bhagvati

Discrete Logarithm Problem using Index Calculus Method

Mathematical and Computer Modelling, Special issue :- Advanced Theory and Practice for Cryptography and Future Security

v55(1-2), pp161-169, 2012

R. Padmavathy

Cryptanalysis of C3-PEKE protocol

International Journal of Computer Applications

v20(4), pp22-31,2011

R.Padmavathy, Chakravarthy Bhagvati

Unknown Key Share Attack on STPKE

Book chapter, Information Processing and Management

v70, pp604-608, 2010

Harish Malla,

Vilas SantKaustubh

Rajasekharan Ganesh

Padmavathy R.

Block Lanczos to Solve Integer Factorization Problem Using GPU�??s
Book chapter, Advances in Computer Science and Information Technology: Networks and Communicationsv84, pp 520-529,2012

Sirisha Tallapally, R.Padmavathy

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'.
Journal of Information Processing Systemsv6(1), 43-52, 2010
Siddharth Agarwal, Abhinav Rungta, R.Padmavathy, Mayank Shankar, Nipun RajanAn Improved Fast and Secure Hash AlgorithmJournal of Information Processing Systemsv8(1), 119-132. 2012
R.Padmavathy, Chakravarthy Bhagvati

 A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery

International Journal of Network Securityv17(1), pp 94-105, 2015
Anil Pinapati and R.Padmavathy

A Reversible Data Hiding using Prior Pixel Pairs in Two-Dimensional Histogram with Tri-Directional Modification ofDifference-Histogram

IETE Technical Review accepted



Conference Proceeding


AuthorTitleConference NameVol. Page. Year.

R.Padmavathy, P.S.Avadhani

A Cryptosystem based on a cut set of a graph

International Conference on e-security

pp111-123, 2006

R.Padmavathy, Chakravarthy Bhagvati

Improved Random Method for Index Calculus Method

National Workshop on Cryptology

pp 77-90, 2008

R.Padmavathy

Enterprize Information Security

BIG-2004

pp55-67,2004

R.Padmavathy

New Dimention on DLP based Cryptosystems

Networks-2005

pp122-138,2005

R.Padmavathy, Chakravarthy Bhagvati

A key Recovery Attack on Chang and Chang Password Key Exchange Protocol

International Conference on Computer and network technology

World Scientific press

R.Padmavathy, Chakravarthy Bhagvati

Methods to solve Discrete Logarithm Problem for Ephemeral Key

International Conference on Advanced Research in Computation and Communication

IEEE press

R.Padmavathy, T.Sirisha

Improved Analysis on Chang and Chang Password Key Exchange Protocol

ACT- 2009

IEEE press

R.Padmavathy, Chakravarthy Bhagvati

Discrete Logarithm Problem using Index Calculus Method

International Symposium on Advances in Cryptography and Security Applications for Future Computing

Gwanju, Korea, Dec 9-11, 2010
Anil Pinapati and R.Padmavathy A Reversible Data Hiding using Difference-Histogram Modification on Multi-Directional in Two-Dimensional Histogram�??, NCCS 2016Springer link
Gireesh Joshi, R Padmavathy, Anil Pinapati, Mani Bhushan KumarBrowserGuard2: A Solution for Drive-by-Download AttacksNCCS 2016Springer link
Tanmay Sharma and R.Padmavathyspecial-q techniques for Number Field Sieve to solve Integer FactorizationICSICCS-2017Springer Book series  Advances in Intelligent Systems and Computing 
Gaurav Dhumal and R.PadmavathySparse Linear Algebra in Function Field Sieve8th ICCCNT at IIT Delhi 2017IEEE xplore 

 

Workshop/SSTPs/Conference attended


TitleDateWorkshopOrganized At

Soft Computing Techniques

27-30, December,2006

workshop

HCU

Short term course on information tools, concept and methodology

5-27, May, 2008

STTP

IISc, Bangalore

INDOCRYPT 2004

Dec, 2004

conference

IIMSCchennai

Information security

July 2008

STTP

NIT, Warangal


Student projects Supervised (in last 3 years)

2017 passed out students project list


Project NameStudent(s) NameAcd. Year
Efficient Software Implementation of Polynomial Arithmetic over Galois Field

Shubhi  Saxena, Sneha Basetti, U K Hindumathi

 

B.Tech 2013-2017
Secure Group Communaction using Koblitz curve based CryptographyKathivarapu Bhargav,Adapa Lokesh,Mohan Vamshi ParandhamaB.Tech 2013-2017
Design implementation of Filtering module in Function Field Sieve method to solve DLP over GF(2^n)Ketki Joshi,Abhishek Shah,Kapugamage SachithB.Tech 2013-2017
Secure Communication using Pairing based CryptographyJyothi MouryaMCA 2014-17
A Secure Group Communication using NTRU CryptosystemSunny SharmaMCA 2014-17
Proxy Re-Encryption and Proxy Decryption using ElGamal CryptosystemDontamsetty RevathiMCA 2014-17
Signcryption using DSA and ElGamalDheeraj KumarMCA 2014-17
Special-q techniques in Number Field Sieve to solve Integer FactorizationTanmay SharmaM.Tech 2015-17
Improved Filtering Step for the Integer Factorization and Discrete Logarithm ProblemDeep Prakash DeyM.Tech 2015-17
Solving linear Algebra in Function Field Sieve using Block Wiedemann AlgorithmDhumal Gaurav ManikM.Tech 2015-17


Course Taught Previously

Data Structures

Problem Solving and Computer Programming

DataBase Management Systems

Distributed Systems

Theory of Computation

Compiler Design

Advanced Data Bases

Computer Architechture

Advanced Computer Architechture 

Systems Programming     

Systems Software     

Network Programming 

Cryptography and Network Security

Programming Languages Concept

Computer Organization 

Cryptanalysis 

Advanced Computer Networks and Security 

Socket Programming and Network Security

Foundations of Cryptography 

Algorithmic Coding Theory 

Publications

 

AuthorTitleJournal NameVol. Page. Year.

R.Padmavathy, Chakravarthy Bhagvati, H.P. Rani

Discrete Logarithm Problem in Elliptic Curve Group using Pollard Rho

International Journal on Computing and Mathematical Applications

v2(1-2), pp 81-92, 2008

R.Padmavathy, Chakravarthy Bhagvati

Improved Cryptanalysis on DLP ? = aa b

International Journal on Computer Science and Engineering Systems

v3(4), pp 22-27, 2009

R.Padmavathy, Chakravarthy Bhagvati

Performance Analysis on Index Calculus Method

Journal of Discrete Mathematical Sciences and Cryptography

v12(3), pp71-92, 2009

R.Padmavathy, Chakravarthy Bhagvati

Ephemeral Key Recovery using Index Calculus Method

Journal of Discrete Mathematical Sciences and Cryptography

v13(1), pp 29-43, 2010

R.Padmavathy

Improved Three Party EKE Protocol

Information Technology and Control

v39(3), 2010

R.Padmavathy, chakravarthy Bhagvati

Solving Discrete Logarithm Problem for Ephemeral Key Recovery on Chang and Chang Key Exchange Protocol

Journal of Information Processing and Systems

v6(3), pp 52-62, 2010

R.Padmavathy, Chakravarthy Bhagvati

A Small Sub group Attack for Recovering Ephemeral Keys in Chang and Chang Key Exchange Protocol

Journal of Computers

v6(4), pp 804-811, 2011

R.Padmavathy

Impersonating the Server Attack on Simple Three Party Key Exchange Protocol

International Journal on Computer Science and Engineering Systems

v5(2), 2011

R.Padmavathy, Chakravarthy Bhagvati

Index Calculus Method based on Smooth Numbers of 1 over Zp*

International Journal on Network Security
v15(1), pp210-218,2013


R.Padmavathy, Chakravarthy Bhagvati

A password Attack on S3-PAKE

International Journal of Security and its applications

Accepted

R.Padmavathy, Chakravarthy Bhagvati

Discrete Logarithm Problem using Index Calculus Method

Mathematical and Computer Modelling, Special issue :- Advanced Theory and Practice for Cryptography and Future Security

v55(1-2), pp161-169, 2012

R. Padmavathy

Cryptanalysis of C3-PEKE protocol

International Journal of Computer Applications

v20(4), pp22-31,2011

R.Padmavathy, Chakravarthy Bhagvati

Unknown Key Share Attack on STPKE

Book chapter, Information Processing and Management

v70, pp604-608, 2010

Harish Malla,

Vilas SantKaustubh

Rajasekharan Ganesh

Padmavathy R.

Block Lanczos to Solve Integer Factorization Problem Using GPU�??sBook chapter, Advances in Computer Science and Information Technology: Networks and Communicationsv84, pp 520-529,2012

Sirisha Tallapally, R.Padmavathy

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'.Journal of Information Processing Systemsv6(1), 43-52, 2010

Siddharth Agarwal, Abhinav Rungta, R.Padmavathy, Mayank Shankar, Nipun Rajan

An Improved Fast and Secure Hash AlgorithmJournal of Information Processing Systemsv8(1), 119-132. 2012
R.Padmavathy, Chakravarthy Bhagvati

 A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery

International Journal of Network Securityv17(1), pp 94-105, 2015
Anil Pinapati and R.Padmavathy

A Reversible Data Hiding using Prior Pixel Pairs in Two-Dimensional Histogram with Tri-Directional Modification ofDifference-Histogram

IETE Technical Review accepted

 

Conference Proceeding


AuthorTitleConference NameVol. Page. Year.

R.Padmavathy, P.S.Avadhani

A Cryptosystem based on a cut set of a graph

International Conference on e-security

pp111-123, 2006

R.Padmavathy, Chakravarthy Bhagvati

Improved Random Method for Index Calculus Method

National Workshop on Cryptology

pp 77-90, 2008

R.Padmavathy

Enterprize Information Security

BIG-2004

pp55-67,2004

R.Padmavathy

New Dimention on DLP based Cryptosystems

Networks-2005

pp122-138,2005

R.Padmavathy, Chakravarthy Bhagvati

A key Recovery Attack on Chang and Chang Password Key Exchange Protocol

International Conference on Computer and network technology

World Scientific press

R.Padmavathy, Chakravarthy Bhagvati

Methods to solve Discrete Logarithm Problem for Ephemeral Key

International Conference on Advanced Research in Computation and Communication

IEEE press

R.Padmavathy, T.Sirisha

Improved Analysis on Chang and Chang Password Key Exchange Protocol

ACT- 2009

IEEE press

R.Padmavathy, Chakravarthy Bhagvati

Discrete Logarithm Problem using Index Calculus Method

International Symposium on Advances in Cryptography and Security Applications for Future Computing

Gwanju, Korea, Dec 9-11, 2010
Anil Pinapati and R.Padmavathy A Reversible Data Hiding using Difference-Histogram Modification on Multi-Directional in Two-Dimensional Histogram�??, NCCS 2016Springer link
Gireesh Joshi, R Padmavathy, Anil Pinapati, Mani Bhushan KumarBrowserGuard2: A Solution for Drive-by-Download AttacksNCCS 2016Springer link
Tanmay Sharma and R.Padmavathyspecial-q techniques for Number Field Sieve to solve Integer FactorizationICSICCS-2017Springer Book series  Advances in Intelligent Systems and Computing 
Gaurav Dhumal and R.PadmavathySparse Linear Algebra in Function Field Sieve8th ICCCNT at IIT Delhi 2017IEEE xplore 

 

PHDs Supervised

 1. Anil Pinapati                Algorithms to Improve efficiency of Scalar Multiplication on Koblitz curves and Its Applications                                 Full Time   

2. B. Satish Babu               Completed course Work                                                                                                                                                                         Full time

3. Vinod Kumar Mohar                                                                                                                                                                                                                           Part time

Workshops/Conferences

 

Projects

 1.        DST, Govt of India sponsored project titled Secure SMS using Koblitz curve based ECC on 
Android devices    2013-2015 ------------------------------------------------Completed
2.         DRDO SAG New Delhi sponsored project titled Solving Discrete Logarithm Problem over GF(2^n) using Function Field Sieve method. 
Started 2016 ------------------------------------------------------------------ Ongoing

Awards and Honors

 

Additional Responsibility

 1. Ladies Hostel Warden during 2011-14

2.  Department DAG-PG member

3.  Department DAG-UG member

4.  Laboratory In charge Wireless Security Laboratory

5. Laboratory In charge Open Source Laboratory