Sunav Mukherjee

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Both symmetric and asymmetric key algorithms are used to secure a network. Asymmetric key approach involves greater time complexity and hence prone to higher power consumption. Symmetric key cryptography, on the other hand, involves a key exchange phase. In this paper, we propose an authentication technique for new nodes to an ad-hoc network that would also(More)
— The " sum of power of two (SPT) " is an effective format to represent multipliers in a digital filter which reduces the complexity of multiplication to a few shift and add operations. The canonic SPT is a special sparse SPT representation that guarantees occurrence of at least one zero between every two nonzero SPT bits. This paper presents a novel(More)
  • 1