1. Carry out Directed Basic Research and develop Tools and Techniques in the area of Cryptology and Secure Protocols.
2. Provide a Platform for translating basic research into Prototypes for data security and analysis.
3. Act as a bridge between Academia and Government organizations for collaborative R&D towards Product development.
4. Provide Consultancy Services and Training on Cyber Security matters for Business, Government and Critical Infrastructure Sectors.
Abhishek Kunal, E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography" In Cybernetics and Information Technologies, Volume 21, No 2, pp. 70-88., June 2021. DOI: 10.2478/cait-2021-0020
Prachi Sarode, T. R. Reshmi & Venkatasubbu Pattabiraman, “ Combination of Fitness-Mated Lion Algorithm with Neural Network for Optimal Query Ordering Data Aggregation Model in WSN”, Wireless Personal Communications volume 116, pp.513-538(January,2021)
Lakshmi Devi Kuppusamy, Sivappriya Manivannan, Sarat Chandra Babu N, "TRAP-GATE: A Probabilistic Approach to Enhance Hardware Trojan Detection and its Game Theoretic Analysis" , Journal of Electronic Testing: Theory and Applications, Volume 36, Number 5, pp.607-616. (October, 2020)
Yehoshuva C, Adhithan RR, Anandakumar NN. A Survey of Security Attacks on Silicon Based Weak PUF Architectures. InSecurity in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers (p. 107). Springer Nature.
Anandakumar NN, Sanadhya SK, Hashmi MS. Design, Implementation and Analysis of Efficient Hardware-based Security Primitives,IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC) (October, 2020), (pp. 198-199).