
Elango SekarBannari Amman Institute of Technology | BIT · Department of Electronics and Communication Engineering
Elango Sekar
Ph.D (VLSI - Cryptosystems)
About
30
Publications
17,597
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
129
Citations
Introduction
S.Elango received his Bachelor’s Degree in ECE and Master’s Degree in VLSI Design from Anna University Chennai, Tamil Nadu, India, in 2010 and 2012. Currently, he is working as an Associate Professor in the Department of ECE, Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu, India. He completed his Ph.D Degree at Anna University Chennai in 2021. His research interest includes Digital IC Design, Residue Arithmetic, FPGA based System Design and Hardware Security.
Additional affiliations
July 2012 - March 2021
Publications
Publications (30)
This paper presents a novel hardware architecture for Frequency Response Masking (FRM) Filter Bank based on Residue Number System (RNS) arithmetic for Digital Hearing Aids (DHA). FRM is a computationally efficient approach for filter bank design that separates different frequencies based on the Audiograms of a patient. However, filter banks are cri...
Recently, a great deal of physical equipment has been linked to the Internet of Things (IoT) by use of the Radio Frequency Identification (RFID) technology. Moreover, security is the primary concern for RFID-enabled IoT devices. In order to prevent security risks, mutual authentication is a vital step. The majority of authentication protocols are r...
Health is the prime importance in our day-to-day life. Moreover, as the corona virus disease (COVID-19) becomes pandemic worldwide, it is essential to monitor our health regularly. Today, wearable technology is widespread and is rapidly becoming a trend and promising to offer key benefits in managing chronic diseases, especially at home. This artic...
Wireless sensor network-based intelligent home monitoring system helps older people to ease their daily activities and provide them with safe and secure living. Wireless sensor networks allow the devices to measure and aid in monitoring, tracking and sensing their household appliances often. An innovative home monitoring system and intelligent heal...
Residue Multiplication operations are extensively used in Residue Number System (RNS) based cryptosystem architecture. Pointing to increase the speed performance of RNS crypto processors, the new parallel unsigned 2n+1 residue multiplier is designed in this work. Mathematical model, Algorithm, Architecture and FPGA implementation is done in this wo...
In public-key cryptography, the RSA algorithm is an inevitable part of hardware security because of the ease of implementation and security. RSA Cryptographic algorithm uses many modular arithmetic operations that decide the overall performance of the architecture. This paper proposes VLSI architecture to implement an RSA public-key cryptosystem dr...
Random Access Memory (RAM) refers to the main memory of a computer. For the central processor unit (CPU) to operate quickly and effectively, it stores operating system software, applications, and other data. Unfortunately, single event upset and other high-soft error problems plague standard static RAM (SRAMs) in aircraft applications (SEU). Many R...
Security and safety are a necessity for automated teller machines (ATM). The ATM security system is implemented using the Internet of things (IoT) and GPS (global positioning system). The main idea of this project is to develop an ATM surveillance and security system. In this project, when any physical attack against the ATM takes place, then infor...
Residue Number System (RNS) is an alternative number representation of a Binary weighted system to process the data at a higher rate with lower hardware. Modular Multiplication operations are extensively utilized in RNS Processors. To increase the processor's performance, a new configurable signed dual modulo 2n±1 multiplication that uses array arc...
Health has the foremost importance in our daily life. For the past few decades, people are getting infected with an increased number of diseases due to improper health care. Health care is prominent for every being to lead a successful life. Health monitoring concepts are acquainted with developed and developing countries. Health monitoring using I...
IoT platform creates attractive opportunities for our daily lives which make us smarter and more comfortable. IoT offers an incredible guarantee in the e-healthcare field by enhancing the quality of service with limited time-bound. The connectivity provided for e-healthcare devices poses overwhelming security and privacy concerns in this area. In t...
Hardware security is an inevitable one in embedded portable devices. Hardware uniqueness is the key advantage of hardware-based security and a viable alternative to software security. In this paper, residue arithmetic circuits are used to design the point operations in Elliptic Curve Cryptography (ECC) over Galois Field GF (p). Point Multiplication...
Digital farming is a viable solution for the current challenges faced in the agricultural industry. Tomato is one of the most important crops in agriculture. The production of this crop is high as well as the infection of the plant is enormous. The monitoring of the pest infection and harvesting of the tomato plant in the farm is a challenging issu...
Modular Multiplication operations are widely used in Digital crypto processors. Modulo multipliers is an essential block for Residue Number System (RNS) computation. Pointing to increase the performance of the RNS computation, the parallel unsigned modulo multiplier for 2 ⁿ -1 moduli is designed. A mathematical modelling, VLSI architecture and real...
This paper reports, AlGaN/GaN HEMT device with Enhancement mode (Positive threshold voltage) operation achieved by Piezo neutralization layer (PNT) and T-Gate structure, along with gate recess engineering technique. The Proposed T-Gate structure HEMT device is analyzed with two different gate recess depths. Better results is obtained with 0.015 µm...
The Residue Number System (RNS) characterize large integer numbers into smaller residues using moduli sets to enhance
the performance of digital cryptosystems. A parallel Signed Residue Multiplication (SRM) algorithm, VLSI parallel array architecture
for balanced (2n-1, 2n, 2n+1) and unbalanced (2k-1, 2k, 2k+1) word-length moduli are proposed which...
Digital Cryptosystems play an inevitable part in modern-day communication. Due to the complexity involved in the execution of crypto algorithms, it is realized as modular arithmetic modules. Generally, multipliers are the most time-consuming data path elements which influence the performance of modular arithmetic implementations. In this paper, the...
Multiplication is the fundamental function in most of the lightweight systems. In most of the signal processing applications, the demand for low cost multiplier is the major concern. This research different multiplier algorithms like Urdhava Tiryagbhyam and Anurupye ; it investigates the implementation of low pass Finite Impulse Response (FIR) filt...
In this brief, we present the design and evaluation of a high speed and energy-efficient truncated multiplier for unsigned multiplication, such that the average absolute error due to truncation and rounding is kept minimal. The proposed algorithm eliminates a few least significant Partial Product (PP) bits and adds correction bias at appropriate PP...
In wireless communication, secure transmission and reception of data are the major concern today. In recent years, Radio Frequency Identification (RFID) has played a vital role in the security system for secured data communication. The main challenge in RFID-based security system is to design a more secure, better area and power efficient encoder a...
In this paper, VLSI architecture of new switching based median filter to remove high density salt and pepper noise in digital images is proposed. The absolute difference between center pixel and the median of trimmed array obtained from a 3 x 3 sliding window is compared with the predefined threshold value to identify the pixel is noisy or not. In...
In this paper, hardware efficient truncated multiplier using modified booth algorithm is proposed for signed bit multiplication, such that the average absolute error is kept minimum. The proposed methodology truncates the least significant bits (LSBs) of the final product and thus minimizes the number of full adders and half adders used in partial...
Radio-frequency identification (RFID) is a recent technology that utilizes radio frequencies to track the object by transmitting a signal with a unique serial identity. Generally, the drawbacks of RFID technology are high cost and authentication systems between a reader and a tag become weak. In this paper, we proposed a protocol for RFID tag–reade...
This paper presents a novel architecture for hardware efficient binary represented decimal addition. We extend the two operand ripple carry addition by one with the third input being constant. The addition technique is made fast by generating flag bits appropriate to the constant added. The third constant in case of our proposed design is 6(0110) f...