Deepak Sakkari - Academia.edu (original) (raw)

Papers by Deepak Sakkari

Research paper thumbnail of Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL

Journal of ICT Standardization

Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys wit... more Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys with side-channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. This paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p, and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially, we begin with an ECDSA signature to sign a message using the private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created, and a way in which the intruder can discover the private key if the signer leaks any one of the nonce values. Then we use Lenstra–Lenstra–Lovasz (LLL) method as a black box, we will try to attack s...

Research paper thumbnail of Research on Elliptic Curve Crypto System with Bitcoin Curves – SECP256k1, NIST256p, NIST521p and LLL

Journal of cyber security and mobility, Mar 7, 2023

Very recent attacks like ladder leak demonstrated feasibility to recover private key with side ch... more Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially we begin with ECDSA signature to sign a message using private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created and way in which the intruder can discover the private key if the signer leaks any one of the nonce value. Then we use Lenstra-Lenstra-Lovasz (LLL) method as a black

Research paper thumbnail of Demerits of Elliptic Curve Cryptosystem with Bitcoin Curves Using Lenstra–Lenstra–Lovasz (LLL) Lattice Basis Reduction

Arabian Journal for Science and Engineering

Research paper thumbnail of Research on elliptic curve crypto system with curves Bitcoin- SECP256k1,NIST256p,NIST521p and LLL

Research Square (Research Square), Mar 6, 2023

Very recent attacks like ladder leak demonstrated feasibility to recover private key with side ch... more Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways.Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p,SECP256k1,NIST521p and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially we begin with a ECDSA signature to sign a message using private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature.Every time we sign, a new verifiable random nonce value is created and way in which the intruder can discover the private key if the signer leaks any one of the nonce value. Then we use Lenstra-Lenstra-Lovasz (LLL) method as a black box, we will try to attack signatures generated from bad nonce or bad random number generator(RAG) on NIST256p,SECP256k1 curves. The analysis is performed by considering all the three curves for implementation of Elliptic Curve Digital Signature Algorithm (ECDSA).The comparative analysis for each of the selected curves in terms of computational time is done with leak of nonce and with Lenstra-Lenstra-Lovasz method to crack ECDSA.The average computational costs to break ECDSA with curves NIST256p,NIST521p and SECP256k1 are 0.016,0.34,0.46 respectively which is almost to zero depicts the strength of algorithm. The average computational costs to break ECDSA with curves SECP256K1 and NIST256p using LLL are 2.9 and 3.4 respectively.

Research paper thumbnail of Application of Elliptic Curve Crypto System to Secure Multi-Signature Bitcoin Block Chain

Journal of Computer Science, 2023

Blockchain is a technology that enables decentralized digital currencies like bitcoin, ethereum, ... more Blockchain is a technology that enables decentralized digital currencies like bitcoin, ethereum, and ripple. It is widely used in many areas such as healthcare, defense, and industrial domains like internet of things for tracking sensor data and detecting duplicate sensor data. Bitcoin is one of the most popular cryptocurrencies due to its market value and use as a medium of exchange. The trustless secure money exchanges have made bitcoins appealing to people. However, the loose possession of bitcoin keys can lead to monetary loss and a decrease in bitcoin users. In this article, we provide an extensive analysis of major privacy and security issues in the Bitcoin blockchain. First, we discuss the security issues in bitcoin, and second, we discuss countermeasures for these bitcoin threats. Third, we provide an added level of security using elliptic curve cryptography on bitcoin multi-signature accounts. Our research helps bitcoin users understand the risks involved in using non-multi-signature accounts compared to multi-signature accounts. The use of elliptic curve cryptography on bitcoin multi-signature accounts also helps to avoid unnecessary expenses such as bitcoin currency rewards to miners.

Research paper thumbnail of Research on Elliptic Curve Crypto System with Bitcoin Curves – SECP256k1, NIST256p, NIST521p and LLL

Journal of Cyber Security and Mobility

Very recent attacks like ladder leak demonstrated feasibility to recover private key with side ch... more Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially we begin with ECDSA signature to sign a message using private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created and way in which the intruder can discover the private key if the signer leaks any one of the nonce value. Then we use Lenstra–Lenstra–Lovasz (LLL) method as a black box, we will try to attack signatures generated...

Research paper thumbnail of Research on elliptic curve crypto system with curves Bitcoin- SECP256k1,NIST256p,NIST521p and LLL

Very recent attacks like ladder leak demonstrated feasibility to recover private key with side ch... more Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways.Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p,SECP256k1,NIST521p and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially we begin with a ECDSA signature to sign a message using private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature.Every time we sign, a new verifiable random nonce value is created and way in which the intruder can discover the private key if the signer leaks any one of the nonce value. Then we use Lenstra–Lenstra–Lovasz (LLL) method as a black box, we will try to attack signatures generated f...

Research paper thumbnail of Application of Elliptic Curve Crypto System to Secure Multi-Signature Bitcoin Block Chain

Journal of Computer Science

Blockchain is a technology that enables decentralized digital currencies like bitcoin, ethereum, ... more Blockchain is a technology that enables decentralized digital currencies like bitcoin, ethereum, and ripple. It is widely used in many areas such as healthcare, defense, and industrial domains like internet of things for tracking sensor data and detecting duplicate sensor data. Bitcoin is one of the most popular cryptocurrencies due to its market value and use as a medium of exchange. The trustless secure money exchanges have made bitcoins appealing to people. However, the loose possession of bitcoin keys can lead to monetary loss and a decrease in bitcoin users. In this article, we provide an extensive analysis of major privacy and security issues in the Bitcoin blockchain. First, we discuss the security issues in bitcoin, and second, we discuss countermeasures for these bitcoin threats. Third, we provide an added level of security using elliptic curve cryptography on bitcoin multi-signature accounts. Our research helps bitcoin users understand the risks involved in using non-multi-signature accounts compared to multi-signature accounts. The use of elliptic curve cryptography on bitcoin multi-signature accounts also helps to avoid unnecessary expenses such as bitcoin currency rewards to miners.

Research paper thumbnail of Ensure the dynamic identity and PUF based authenticated key settlement approach for the IoT infrastructure

Proceedings of the Indian National Science Academy

Research paper thumbnail of Privacy conserving authenticated key settlement approach for remote users in IoT based Telecare Medicine information system

Research paper thumbnail of Data Management for IoT and Digital Twin

New Approaches to Data Analytics and Internet of Things Through Digital Twin

The internet of things (IoT) is a dynamic and global network infrastructure in which “things”—sub... more The internet of things (IoT) is a dynamic and global network infrastructure in which “things”—subsystems and individual physical and virtual entities—can be identified, autonomous, and self-configurable. “Things” are expected to communicate with one another and with the environment by exchanging data generated by sensing, as well as react to events and trigger actions to control the physical world. A digital twin is a synchronised virtual representation of real-world entities and processes. Understanding the data management challenges for DT is critical to understanding the data issues. Data management is a common issue in existing systems, ranging from product design to asset management and maintenance.

Research paper thumbnail of Effective diagnosis mechanism for skin disorders using image mining techniques

International journal of health sciences

Owing to its costly diagnosis, which requires elevated human interpretation, skin conditions are ... more Owing to its costly diagnosis, which requires elevated human interpretation, skin conditions are one of the major medical problems. In assessing the chance of getting treated, early-stage diagnosis of skin disorders plays a crucial role. We assume that the use of an accurate classifier helps to diagnose early-stage skin disorders. Therefore, we present a fully automated classification system in this article for diagnosing skin disorders by using image mining techniques. Our model is designed to compromise pixel, object and pattern levels in three steps, respectively. We have used multiple image mining techniques like augmentation, feature extraction, classification in order to classify skin disorder images effectively.

Research paper thumbnail of Diagnosis of skin diseases based on deep learning and machine learning approach

International journal of health sciences

Skin Diseases have become one of the most frequent diseases in the world; apart from their physic... more Skin Diseases have become one of the most frequent diseases in the world; apart from their physical effects, they are rapidly expanding to cover a bigger region and have a psychological impact on patients. Diagnosing skin diseases takes a high degree of knowledge and is objective to the dermatologist. Presented an overview of Deep-Learning algorithms and their usage in skin disease diagnostics. Begin with a short overview of skin diseases and image collecting techniques in dermatology, followed by a list of publicly accessible Skin-Datasets for algorithm training and testing are discussed. Next examine the research including deep learning algorithms for skin disease detection from many perspectives according to the particular objectives as an essential element of this paper. The main objective of this paper is to present a comprehensive and simplify analysis of contemporary deep learning-based skin disease diagnostic research. By considering the growing popularity of deep learning,...

Research paper thumbnail of Remediation Measures to Make the Insecure Internet of Things Deployment Secure

International Journal of Engineering Trends and Technology

Research paper thumbnail of Review on Insight into Elliptic Curve Cryptography

Studies in Computational Intelligence

Research paper thumbnail of Design and Implementation of Identifying Points on Elliptic Curve Efficiently Using Java

Studies in Computational Intelligence

Research paper thumbnail of Twitter Data Collection Using Tools for Classification of fake Data: A Survey

YMER Digital, 2022

Data could be a piece of information that’s needed to create helpful information. Getting data is... more Data could be a piece of information that’s needed to create helpful information. Getting data is required by people to analyzers. From this angle, data assortment is a vital step once doing any research or experiment. Knowledge collection may be outlined because the method of gathering and process the data to gauge the outcomes and use them for the researches. On-line Social Networking sites (OSN) are one in all the most effective sources of data. We have a tendency to be attending to introduce the advantages of exploitation the social network sites for data collection and also the totally different techniques which will be used. Based mostly on those data, a network of trust created exploitation the relationships among users. The methods the information being collected is totally different in term of potency and being useful. Be that as it may, the information mining applications in the web-based media are as yet crude and require more exertion by the scholarly world and industry ...

Research paper thumbnail of Design and Implementation of Elliptic Curve Digital Signature Using Bit Coin Curves Secp256K1 and Secp384R1 for Base10 and Base16 Using Java

Lecture Notes in Electrical Engineering, 2021

Research paper thumbnail of Implementation of modified blowfish algorithm

International Journal of Advance Research, Ideas and Innovations in Technology, 2020

This project focuses on implementing a modified blowfish algorithm using a hardware description l... more This project focuses on implementing a modified blowfish algorithm using a hardware description language such as VHDL. Encryption algorithm plays a major role in network application and data security systems. But securing data consumes a major amount of CPU time and battery power. We also focus on improvising the performance and security provided by the blowfish encryption algorithm. With the advancement in technology, DES is found to be no longer secure. As a drop-in replacement for DES, the blowfish encryption algorithm can be used. The original blowfish algorithm function has been modified using a modified S-box and adding Key Bits Shifting (KBS) to the Function Block.

Research paper thumbnail of Optimized Coverage and Connectivity for Randomly Deployed Wireless Sensor Network for Lifetime Conservatory

The success of any routing protocol in wireless sensor network (WSN) depends upon how best the co... more The success of any routing protocol in wireless sensor network (WSN) depends upon how best the connectivity is, and the optimization with constraint resources depends upon the issue of coverage. Various techniques have been adopted and suggested for the pattern based deployment, whereas the proposed study has considered the analysis of network lifetime from coverage and connectivity using a random deployment of with higher dimension WSN. The proposed study introduces a protocol termed as MP-ECCNL that address the best possible provisioning and routing the precise information using multi-hop transmission pattern. The protocol extracts the higher dimensionality of route sustainment for the network lifetime, furnishes better routing and higher exploitation of network resources, and also optimizes the utilization of power facilitated on the sensor nodes. The results are accomplished after performing the experiments; by comparing MPECCNL with LEACH algorithm, MP-ECCNL found to be highly ...

Research paper thumbnail of Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL

Journal of ICT Standardization

Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys wit... more Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys with side-channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. This paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p, and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially, we begin with an ECDSA signature to sign a message using the private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created, and a way in which the intruder can discover the private key if the signer leaks any one of the nonce values. Then we use Lenstra–Lenstra–Lovasz (LLL) method as a black box, we will try to attack s...

Research paper thumbnail of Research on Elliptic Curve Crypto System with Bitcoin Curves – SECP256k1, NIST256p, NIST521p and LLL

Journal of cyber security and mobility, Mar 7, 2023

Very recent attacks like ladder leak demonstrated feasibility to recover private key with side ch... more Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially we begin with ECDSA signature to sign a message using private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created and way in which the intruder can discover the private key if the signer leaks any one of the nonce value. Then we use Lenstra-Lenstra-Lovasz (LLL) method as a black

Research paper thumbnail of Demerits of Elliptic Curve Cryptosystem with Bitcoin Curves Using Lenstra–Lenstra–Lovasz (LLL) Lattice Basis Reduction

Arabian Journal for Science and Engineering

Research paper thumbnail of Research on elliptic curve crypto system with curves Bitcoin- SECP256k1,NIST256p,NIST521p and LLL

Research Square (Research Square), Mar 6, 2023

Very recent attacks like ladder leak demonstrated feasibility to recover private key with side ch... more Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways.Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p,SECP256k1,NIST521p and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially we begin with a ECDSA signature to sign a message using private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature.Every time we sign, a new verifiable random nonce value is created and way in which the intruder can discover the private key if the signer leaks any one of the nonce value. Then we use Lenstra-Lenstra-Lovasz (LLL) method as a black box, we will try to attack signatures generated from bad nonce or bad random number generator(RAG) on NIST256p,SECP256k1 curves. The analysis is performed by considering all the three curves for implementation of Elliptic Curve Digital Signature Algorithm (ECDSA).The comparative analysis for each of the selected curves in terms of computational time is done with leak of nonce and with Lenstra-Lenstra-Lovasz method to crack ECDSA.The average computational costs to break ECDSA with curves NIST256p,NIST521p and SECP256k1 are 0.016,0.34,0.46 respectively which is almost to zero depicts the strength of algorithm. The average computational costs to break ECDSA with curves SECP256K1 and NIST256p using LLL are 2.9 and 3.4 respectively.

Research paper thumbnail of Application of Elliptic Curve Crypto System to Secure Multi-Signature Bitcoin Block Chain

Journal of Computer Science, 2023

Blockchain is a technology that enables decentralized digital currencies like bitcoin, ethereum, ... more Blockchain is a technology that enables decentralized digital currencies like bitcoin, ethereum, and ripple. It is widely used in many areas such as healthcare, defense, and industrial domains like internet of things for tracking sensor data and detecting duplicate sensor data. Bitcoin is one of the most popular cryptocurrencies due to its market value and use as a medium of exchange. The trustless secure money exchanges have made bitcoins appealing to people. However, the loose possession of bitcoin keys can lead to monetary loss and a decrease in bitcoin users. In this article, we provide an extensive analysis of major privacy and security issues in the Bitcoin blockchain. First, we discuss the security issues in bitcoin, and second, we discuss countermeasures for these bitcoin threats. Third, we provide an added level of security using elliptic curve cryptography on bitcoin multi-signature accounts. Our research helps bitcoin users understand the risks involved in using non-multi-signature accounts compared to multi-signature accounts. The use of elliptic curve cryptography on bitcoin multi-signature accounts also helps to avoid unnecessary expenses such as bitcoin currency rewards to miners.

Research paper thumbnail of Research on Elliptic Curve Crypto System with Bitcoin Curves – SECP256k1, NIST256p, NIST521p and LLL

Journal of Cyber Security and Mobility

Very recent attacks like ladder leak demonstrated feasibility to recover private key with side ch... more Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially we begin with ECDSA signature to sign a message using private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created and way in which the intruder can discover the private key if the signer leaks any one of the nonce value. Then we use Lenstra–Lenstra–Lovasz (LLL) method as a black box, we will try to attack signatures generated...

Research paper thumbnail of Research on elliptic curve crypto system with curves Bitcoin- SECP256k1,NIST256p,NIST521p and LLL

Very recent attacks like ladder leak demonstrated feasibility to recover private key with side ch... more Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways.Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p,SECP256k1,NIST521p and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially we begin with a ECDSA signature to sign a message using private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature.Every time we sign, a new verifiable random nonce value is created and way in which the intruder can discover the private key if the signer leaks any one of the nonce value. Then we use Lenstra–Lenstra–Lovasz (LLL) method as a black box, we will try to attack signatures generated f...

Research paper thumbnail of Application of Elliptic Curve Crypto System to Secure Multi-Signature Bitcoin Block Chain

Journal of Computer Science

Blockchain is a technology that enables decentralized digital currencies like bitcoin, ethereum, ... more Blockchain is a technology that enables decentralized digital currencies like bitcoin, ethereum, and ripple. It is widely used in many areas such as healthcare, defense, and industrial domains like internet of things for tracking sensor data and detecting duplicate sensor data. Bitcoin is one of the most popular cryptocurrencies due to its market value and use as a medium of exchange. The trustless secure money exchanges have made bitcoins appealing to people. However, the loose possession of bitcoin keys can lead to monetary loss and a decrease in bitcoin users. In this article, we provide an extensive analysis of major privacy and security issues in the Bitcoin blockchain. First, we discuss the security issues in bitcoin, and second, we discuss countermeasures for these bitcoin threats. Third, we provide an added level of security using elliptic curve cryptography on bitcoin multi-signature accounts. Our research helps bitcoin users understand the risks involved in using non-multi-signature accounts compared to multi-signature accounts. The use of elliptic curve cryptography on bitcoin multi-signature accounts also helps to avoid unnecessary expenses such as bitcoin currency rewards to miners.

Research paper thumbnail of Ensure the dynamic identity and PUF based authenticated key settlement approach for the IoT infrastructure

Proceedings of the Indian National Science Academy

Research paper thumbnail of Privacy conserving authenticated key settlement approach for remote users in IoT based Telecare Medicine information system

Research paper thumbnail of Data Management for IoT and Digital Twin

New Approaches to Data Analytics and Internet of Things Through Digital Twin

The internet of things (IoT) is a dynamic and global network infrastructure in which “things”—sub... more The internet of things (IoT) is a dynamic and global network infrastructure in which “things”—subsystems and individual physical and virtual entities—can be identified, autonomous, and self-configurable. “Things” are expected to communicate with one another and with the environment by exchanging data generated by sensing, as well as react to events and trigger actions to control the physical world. A digital twin is a synchronised virtual representation of real-world entities and processes. Understanding the data management challenges for DT is critical to understanding the data issues. Data management is a common issue in existing systems, ranging from product design to asset management and maintenance.

Research paper thumbnail of Effective diagnosis mechanism for skin disorders using image mining techniques

International journal of health sciences

Owing to its costly diagnosis, which requires elevated human interpretation, skin conditions are ... more Owing to its costly diagnosis, which requires elevated human interpretation, skin conditions are one of the major medical problems. In assessing the chance of getting treated, early-stage diagnosis of skin disorders plays a crucial role. We assume that the use of an accurate classifier helps to diagnose early-stage skin disorders. Therefore, we present a fully automated classification system in this article for diagnosing skin disorders by using image mining techniques. Our model is designed to compromise pixel, object and pattern levels in three steps, respectively. We have used multiple image mining techniques like augmentation, feature extraction, classification in order to classify skin disorder images effectively.

Research paper thumbnail of Diagnosis of skin diseases based on deep learning and machine learning approach

International journal of health sciences

Skin Diseases have become one of the most frequent diseases in the world; apart from their physic... more Skin Diseases have become one of the most frequent diseases in the world; apart from their physical effects, they are rapidly expanding to cover a bigger region and have a psychological impact on patients. Diagnosing skin diseases takes a high degree of knowledge and is objective to the dermatologist. Presented an overview of Deep-Learning algorithms and their usage in skin disease diagnostics. Begin with a short overview of skin diseases and image collecting techniques in dermatology, followed by a list of publicly accessible Skin-Datasets for algorithm training and testing are discussed. Next examine the research including deep learning algorithms for skin disease detection from many perspectives according to the particular objectives as an essential element of this paper. The main objective of this paper is to present a comprehensive and simplify analysis of contemporary deep learning-based skin disease diagnostic research. By considering the growing popularity of deep learning,...

Research paper thumbnail of Remediation Measures to Make the Insecure Internet of Things Deployment Secure

International Journal of Engineering Trends and Technology

Research paper thumbnail of Review on Insight into Elliptic Curve Cryptography

Studies in Computational Intelligence

Research paper thumbnail of Design and Implementation of Identifying Points on Elliptic Curve Efficiently Using Java

Studies in Computational Intelligence

Research paper thumbnail of Twitter Data Collection Using Tools for Classification of fake Data: A Survey

YMER Digital, 2022

Data could be a piece of information that’s needed to create helpful information. Getting data is... more Data could be a piece of information that’s needed to create helpful information. Getting data is required by people to analyzers. From this angle, data assortment is a vital step once doing any research or experiment. Knowledge collection may be outlined because the method of gathering and process the data to gauge the outcomes and use them for the researches. On-line Social Networking sites (OSN) are one in all the most effective sources of data. We have a tendency to be attending to introduce the advantages of exploitation the social network sites for data collection and also the totally different techniques which will be used. Based mostly on those data, a network of trust created exploitation the relationships among users. The methods the information being collected is totally different in term of potency and being useful. Be that as it may, the information mining applications in the web-based media are as yet crude and require more exertion by the scholarly world and industry ...

Research paper thumbnail of Design and Implementation of Elliptic Curve Digital Signature Using Bit Coin Curves Secp256K1 and Secp384R1 for Base10 and Base16 Using Java

Lecture Notes in Electrical Engineering, 2021

Research paper thumbnail of Implementation of modified blowfish algorithm

International Journal of Advance Research, Ideas and Innovations in Technology, 2020

This project focuses on implementing a modified blowfish algorithm using a hardware description l... more This project focuses on implementing a modified blowfish algorithm using a hardware description language such as VHDL. Encryption algorithm plays a major role in network application and data security systems. But securing data consumes a major amount of CPU time and battery power. We also focus on improvising the performance and security provided by the blowfish encryption algorithm. With the advancement in technology, DES is found to be no longer secure. As a drop-in replacement for DES, the blowfish encryption algorithm can be used. The original blowfish algorithm function has been modified using a modified S-box and adding Key Bits Shifting (KBS) to the Function Block.

Research paper thumbnail of Optimized Coverage and Connectivity for Randomly Deployed Wireless Sensor Network for Lifetime Conservatory

The success of any routing protocol in wireless sensor network (WSN) depends upon how best the co... more The success of any routing protocol in wireless sensor network (WSN) depends upon how best the connectivity is, and the optimization with constraint resources depends upon the issue of coverage. Various techniques have been adopted and suggested for the pattern based deployment, whereas the proposed study has considered the analysis of network lifetime from coverage and connectivity using a random deployment of with higher dimension WSN. The proposed study introduces a protocol termed as MP-ECCNL that address the best possible provisioning and routing the precise information using multi-hop transmission pattern. The protocol extracts the higher dimensionality of route sustainment for the network lifetime, furnishes better routing and higher exploitation of network resources, and also optimizes the utilization of power facilitated on the sensor nodes. The results are accomplished after performing the experiments; by comparing MPECCNL with LEACH algorithm, MP-ECCNL found to be highly ...