Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Hardware realization of fast elliptic curve point multiplication using balanced ternary representation and pre-computation over GF(p)
- N. Shylashree, V. Sridhar
- Mathematics
- 2 January 2016
Abstract We present a new hardware realization of fast elliptic curve Point Multiplication (PM) using the balanced ternary representation of the scalar multiplier. This hardware implementation uses… Expand
Efficient Implementation of Scalar Multiplication for Elliptic Curve Cryptography using Ancient Indian Vedic Mathematics over GF(p)
- N. Shylashree, D. N. Reddy, V. Sridhar
- Computer Science
- 28 July 2012
TLDR
Three level heterogeneous clustering protocol for wireless sensor network
- R. Priyadarshi, Piyush Rawat, V. Nath, Bibhudendra Acharya, N. Shylashree
- Computer Science
- 14 May 2020
TLDR
Effective resistance calculation and automated solution for fixing reliability verification violations
- M. M. Mohammed Imran, N. Shylashree
- Materials Science
- 7 April 2018
This paper covers the automation done to upgrade the reliability verification in the backend circuit design of microchips. Automation is done to upgrade the reduction of violations which occurs… Expand
UVM-based Logic Verification of Input Output Interface
- D. Yashas, P. S. Hari Babu, N. Shylashree
- Computer Science
- 4th International Conference on Recent Trends on…
- 1 May 2019
TLDR
Efficient Implementation of RSA Encryption and Decryption using Ancient Indian Vedic Mathematics
- N. Shylashree, D. N. Reddy, V. Sridhar
- Mathematics
- 2012
RSA is one of the safest standard algorithms, based on public-key, for providing the security in communication and networks. One of the most time consuming processes in RSA algorithm for… Expand
- 2
Two Stage Block Truncation Coding for Lower Mean Square Error
- N. Shylashree
- 2019
In basic Block Truncation Coding, the given data sequence is encoded into a two level quantized approximation. This results in two segments one of which is comprised of the high level value and the… Expand
Design of a Delta Threshold Voltage Difference based fully Embedded Read Only Memory along with a Skew Sense Amplifier
- V. Balaji, Ch.K.S.D. Ranga, N. Shylashree, N. Praveena
- Computer Science
- 4th International Conference on Recent Trends on…
- 1 May 2019
TLDR