My published work is grouped into three major areas: Quantum Information Science, Innovative Education Technologies, and Classical Information Science & Cryptography.
Jha, N., Parakh, A., and Subramaniam, M. "Multi-photon QKD for Practical Quantum Networks", Infocommunications Journal, Vol. XVII, No 2, June 2025, pp. 72-82.
Jha N., Parakh A. and Subramaniam M., Towards a quantum-classical augmented network", Proc. SPIE 13391, Quantum Computing, Communication, and Simulation V, 133910A (19 March 2025); https://doi.org/10.1117/12.3042150.
Jha N., Parakh A. and Subramaniam M., "A ML Based Approach to Quantum Augmented HTTP Protocol," 2024 IEEE International Conference on Quantum Computing and Engineering (QCE), Montreal, QC, Canada, 2024, pp. 591-592, doi: 10.1109/QCE60285.2024.10420.
Jha, N., Parakh, A., and Subramaniam, M., Effect of noise and topologies on multi-photon quantum protocols, Proc. SPIE 12911, Quantum Computing, Communication, and Simulation IV, 129110G (13 March 2024); https://doi.org/10.1117/12.3000586
Burr, J., Parakh, A. and Subramaniam, M., Quantum Internet, Volume 2022, August (2022), Pages 1-14, ACM Ubiquity, https://dl.acm.org/doi/10.1145/3547493.
Mishra, S., Thapliyal, K., Parakh, A. et al. Quantum anonymous veto: a set of new protocols. EPJ Quantum Technol. 9, 14 (2022). https://doi.org/10.1140/epjqt/s40507-022-00133-2 (ARXIV: https://arxiv.org/abs/2109.06260).
Burr, J., Parakh, A. and Subramaniam, M. Evaluating different topologies for multi-photon quantum key distribution (2022). SPIE Defense + Commercial Sensing, April 6, 2022, Orlando, FL.
Parakh, A. Quantum Teleportation with One Classical Bit. Nature Sci Rep 12, 3392 (2022). https://www.nature.com/articles/s41598-022-06853-w.
Parakh, A., Subramaniam, M. Network routing protocols for multi-photon quantum cryptography, Proceedings Volume 11835, Quantum Communications and Quantum Imaging XIX; 118350L, August 2021.
Parakh, A., and Subramaniam, M., Bootstrapped QKD: improving key rate and multiphoton resistance, SPIE Security + Defence: Quantum Technologies and Quantum Information Science, Berlin, September 10-13, 2018.
Parakh, A., Using fewer qubits to correct errors in three-state QKD protocol, SPIE Security + Defence: Quantum Technologies and Quantum Information Science, Berlin, September 10-13, 2018.
Parakh, A., Providing variable levels of security in quantum cryptography, SPIE Conference 10771: Quantum Communications and Quantum Imaging XVI, San Diego, August 20-22, 2018.
Noles, S. and Parakh, A., Position-Based Quantum Cryptography for Multi-located Prover and Single Verifier (poster), 7th International Conference on Quantum Cryptography (QCrypt 2017), Cambridge, UK September 18-22, 2017.
Joel vanBrandwijk, J. and Parakh, A. (2016) Simulating security of quantum protocols under channel error conditions, Proceedings of 6th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems, Hawaii, Aug 4, 2016.
Parakh, A. and Joel vanBrandwijk, J. (2016) Correcting rotational errors in three stage QKD, 23rd IEEE International Conference on Telecommunication (ICT 2016), Thessaloniki, Greece, May 16-18, 2016.
Parakh, A. and Joel vanBrandwijk, J. (2016) Rotational error correction in three stage QKD, Poster at IEEE Communication Theory Workshop (CTW 2016), Nafplio, Greece, May 15-18, 2016.
Parakh, A. (2015) A new protocol for quantum public-key cryptography, IEEE International Conference on Advanced Networks and Telecommunications Systems, Dec 15-18, 2015.
Parakh, A. (2015) Quantifying the security of a QKD protocol, IEEE International Conference on Advanced Networks and Telecommunications Systems, Kolkata, Dec 15-18, 2015.
Parakh, A. (2015) Quantum teleportation for key-less cryptography. Quantum information and computation XIII, 950005, SPIE 9500, DSS 2015.
Sayonnha, M. and Parakh, A. (2015) Implementing Diffie-Hellman key exchange using quantum EPR pairs. Quantum information and computation XIII, 950006, SPIE 9500, DSS 2015.
Subramaniam, P. and Parakh, A. (2014) Limits on detecting eavesdropper in QKD protocols. IEEE ANTS 2014, New Delhi, India.
Subramaniam, P. and Parakh, A. (2014) A quantum Diffie-Hellman protocol using commuting transformations. IEEE ANTS 2014, New Delhi, India.
Nelson, D. and Parakh, A. (2014) Quantum Cryptography: Opportunities and Challenges. 6th Central Area Networking and Security Workshop, Oct 25-26, 2014, Lawrence, KS.
Subramaniam, P. and Parakh, A. (2014). A quantum Diffie-Hellman protocol, In proceedings of the 11th IEEE Conference on Mobile Ad and Sensor Systems, (IEEE MASS 2014).
Parakh, A. and Verma, P. (2014) Improving the efficiency of entanglement based quantum key exchange, Proceedings of 23rd IEEE International Conference on Computer Communication and Networks (IEEE ICCCN 2014), pages 1-6, August 4-7, 2014, Shanghai, China.
Parakh, A. (2013). A quantum oblivious transfer protocol, Proceedings SPIE 8832, The Nature of Light: What are Photons? V, 883204 (October 1, 2013), San Diego, CA.
Mangotra, S., Parakh, A. and Subramaniam, M. "QUINTET: A Platform for Quantum Internet Education and Training", To appear in 2025 IEEE Frontiers in Education Conference (FIE), Nov. 2-5, 2025, Nashville, TN.
Parakh, A. and Subramaniam, M. "QUINTET: An Experiential Learning Platform for Quantum Education," 2024 IEEE International Conference on Quantum Computing and Engineering (QCE), Montreal, QC, Canada, 2024, pp. 128-137, doi: 10.1109/QCE60285.2024.20468.
Bommanapally, V., Subramaniam, M. and Parakh, A., Embedding a Problem Graph into Serious Games for Efficient Traversal Through Game Space, in 2023 IEEE Frontiers in Education Conference (FIE), College Station, TX, USA, pp. 1-5, October 2023.
Mallipeddi, R., Schaaf, C., Subramaniam, M., Parakh, A. and Weitl-Harms, S., A Framework for an Intelligent Adaptive Education Platform for Quantum Cybersecurity, 2023 IEEE Frontiers in Education Conference (FIE), College Station, TX, USA, pp. 1-5, Oct 2023.
Parakh, A., Subramaniam, M., Chundi, P., A Framework for Incorporating Serious Games into Learning Object Repositories through Experiential Learning, HICSS-55, January 2022 [Best Paper Award Nominee].
Parakh, A. and Subramaniam, M., Galore: A Platform for Experiential Learning. The Colloquium for Information Systems Security Education, CISSE 2021 [Innovation Award].
Parakh, A., Bommanapally, V., Chundi, P., and Subramaniam, M. Quantum Cryptography Exercise Schedules with Concept Dependencies. The Colloquium for Information Systems Security Education, 2020 [Best Paper Award].
Parakh, A., Subramaniam, M., Chundi, P., and Ostler, E. A Novel Approach for Embedding and Traversing Problems in Serious Games, 21st Annual ACM SIGITE Conference on Information Technology Education, October 2020.
Bommanapally, A., Subramaniam, M., Parakh, A., Chundi, P. and Puppala, V. M. Learning Objects Based Adaptive Textbooks with Dynamic Traversal for Quantum Cryptography. Second Workshop on Intelligent Textbooks, In conjunction with 21st International Conference on Artificial Intelligence in Education, July 6th, 2020.
Vadla, S., Parakh, A., Chundi, P. and Subramaniam, M. QUASIM: A Multi-dimensional Quantum Cryptography Game for Cyber Security, Journal of The Colloquium for Information Systems Security Education, Volume 6, Spring 2019.
Parakh, A., Chundi, P. and Subramaniam, M. An Approach Towards Designing Problem Networks in Serious Games. Proceedings of IEEE Conference on Games (IEEE CoG). 20-23 August, London, UK, 2019.
Dilanga, A., Bommanapally, V., Vadlla, S., Subramaniam, M., Chundi, P. and Parakh, A., Analyzing and Predicting Player Performance in a Quantum Cryptography Serious Game, To appear in proceedings of Games and Learning Alliance conference (GALA 2018), December 2018.
Bommanapally, V., Subramaniam, M., Chundi, P. and Parakh, A. (2018), Navigation Hints in Serious Games, Immersive Learning Research Network (iLRN 2018), June 25-29, Missoula, Montana.
Vadla, S., Parakh, A., Chundi, P. and Subramaniam, M. (2018) Colloquium for Information Systems Security Education (CISSE 2018), June 11-13, New Orleans, Louisiana.
Ostler, E., Parakh, A. and Subramaniam, M. (2018). QuaSim: The development of a virtual simulator for teaching topics in quantum cryptography, Society for Information Technology & Teacher Education International Conference, March 2018, Washington, D.C.
Poster and presentation on QuaSim: 3D virtual educator at CISSE 2017, Las Vegas.
McDermott, S., Vadla, S., Bommanapally, V., Parakh, A., Subramaniam, M. and Ostler, E. (2017) Teaching quantum cryptography using a virtual 3D educator: QuaSim, Proceedings of National Cyber Summit (NCS'17), Huntsville, AL, June 6-8, 2017.
Parakh, A., Subramaniam, M. and Ostler, E. (2017) QuaSim: A virtual quantum cryptography educator, Proceedings of 2017 IEEE International Conference on Electro Information Technology (EIT), Lincoln, NE 2017, pages 600-605.
Hefley, M. and Parakh, A. (2016) Cryptography website for education, Poster in The Colloquium of Information Systems Security Education (CISSE), Best Poster Award, Philadelphia.
Parakh, A. (2016) A new metric for understanding social networks, International Conference on CyberCrime and Computer Forensics, ICCCF 2016, Vancouver, 12-14 June, 2016.
Leonora, G. and Parakh, A. (2016) Linear cryptanalysis of quasigroup block cipher. 11th Cyber and Information Security Research Conference, Oak Ridge, Tennessee, April 5-4, 2016.
Leonora, G. and Parakh, A. (2016) On linear cryptanalytic attack on quasigroup block cipher. Undergraduate Research Expo, University of Texas, Dallas, Feb, 2016.
Parakh, A. (2015) Cheating resistant implicit security, In proceedings of 14th IEEE International Symposium on Network Computing and Applications (NCA 2015), Sept 28-30, 2015.
Mahoney, W. and Parakh, A. (2015) Towards a new quasigroup block cipher for a single-chip FPGA implementation. In Proceedings of 24th IEEE International Conference on Computer Communication and Networks (IEEE ICCCN 2015), pages 1-6, August 3-6, 2015, Las Vegas, NV.
Mahoney, W., Parakh, A. and Battey, M. (2014) Hardware implementation of quasigroup encryption for SCADA networks, In Proceedings of the 13th International Symposium on Network Computing and Applications (IEEE NCA 14), pages 301-305, Aug 21-23, Cambridge, MA.
Battey, M. and Parakh, A. (2014) Cryptanalysis of the quasigroup block cipher, Proceedings of the 52nd Annual ACM Southeast Conference, Kennesaw, GA.
Parakh, A. and Mahoney, W. (2013). Privacy preserving computations using implicit security, Proceedings of 22nd International Conference on Computer Communication Networks (ICCCN’13), pages 1-6, Nassau, Bahamas.
Bonham-Carter, O., Parakh, A. and Bastola, D. (2013). sEncrypt: An encryption algorithm inspired from biological processes, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), Melbourne, VIC, Australia.
Battey, M., Parakh, A. and Mahoney, W. (2013). A new quasigroup based random number generator, Proceedings of the 2013 International Conference on Security and Management (SAM’13), Las Vegas, NV.
Parakh, A. (2012). Communication efficient oblivious transfer using elliptic curves, IEEE 14th International Symposium on High-Assurance Systems Engineering (IEEE HASE), pages 173-174, Oct 25-27, 2012.
Battey, M. and Parakh, A. (2012). Efficient quasigroup block cipher for sensor networks, 21st IEEE International Conference on Computer Communication Networks (IEEE ICCCN), pages 1-5, July 30-Aug 2, 2012.
Parakh, A. and Kak, S. (2011). Matrix based key agreement algorithms for sensor networks, 5th IEEE International Conference on Advanced Networks and Telecommunication Systems (IEEE ANTS), pages 1-3, Dec 18-21, 2011.
Godavarty, V. and Parakh, A. (2011). Using quasi-groups for encryption, Poster presentation at 2011 Nebraska Research and Innovation Conference, Nebraska EPSCoR, Omaha, NE.
Parakh, A. and Kak, S. (2010). Efficient key management in sensor networks, Globecom Workshop, pages 1539-1544.
Parakh, A. and Kak, S. (2010). A tree based recursive information hiding scheme, IEEE International Conference on Communications (IEEE ICC), pages 1-5.
Parakh, A. and Kak, S. (2009). A secure data storage scheme for sensor networks, Security and Privacy in Mobile Information and Communication Systems, Lecture Notes of the Institute of Computer Science, Social Informatics and Telecommunications Engineering, volume 17, pages 14-22.
Parakh, A. and Kak, S. (2009). Recursive secret sharing for distributed storage and information hiding, 3rd International Conference on Advanced Networks and Telecommunication Systems (IEEE ANTS), pages 1-3.
Parakh, A. and Kak, S. (2009). (Invited paper) A key distribution scheme for sensor networks using structured graphs, International Conference on Emerging Trends in Electronic and Photonic Devices & Systems, pages 10-13.
Parakh, A. and Kak, S. (2009). Space efficient secret sharing, 4th Annual Computer Science Research Conference at the University of Oklahoma, April.
Parakh, A. and Kak, S. (2008). Internet voting protocol based on implicit data security, 17th IEEE International Conference on Computer, Communications and Networks (IEEE ICCCN), pages 1-4.
Parakh, A. (2006). A d-sequence based recursive random number generator, 8th International Symposium on System and Information Security, pages 1-5.
Jha, N., Parakh, A. & Subramaniam, M. Joint encryption and error correction for secure quantum communication. Sci Rep 14, 24542 (2024). https://doi.org/10.1038/s41598-024-75212-8
Parakh, A. Quantum teleportation with one classical bit. Sci Rep 12, 3392 (2022). https://doi.org/10.1038/s41598-022-06853-w
Parakh, A. and Subramaniam, M., Galore: A Platform for Experiential Learning. The Journal of the 25th Colloquium for Information Systems Security Education, Winter 2022, pages 62-69.
Parakh, A., Bommanapally, V., Chundi, P., and Subramaniam, M. Quantum Cryptography Exercise Schedules with Concept Dependencies. Journal of The Colloquium for Information Systems Security Education, 2020.
Vadla, S., Parakh, A., Chundi, P. and Subramaniam, M. QUASIM: A Multi-dimensional Quantum Cryptography Game for Cyber Security, Journal of The Colloquium for Information Systems Security Education, Volume 6, Spring 2019.
Ghersi, D., Parakh, A., and Mezei, M. (2017) Comparison of a quantum random number generator with pseudorandom number generators for their use in molecular Monte Carlo simulations. Journal of Computational Chemistry, volume 38, issue 31, pages 2713-2720.
Parakh, A., Verma, P. and Subramaniam, M. (2016) Improving efficiency of quantum key distribution with probabilistic measurement, International Journal of Security and Networks, volume 11, no. 1/2, pages 37-47.
Subramaniam, P. and Parakh, A. (2016) A quantum Diffie-Hellman protocol, International Journal of Security and Networks, volume 11, no. 4, pages 213-223.
Parakh, A. and Kak, S. (2015) A new key agreement technique for sensor networks, Infocommunications Journal, volume VII, number 1, pages 15-21 March 2015.
Battey, M., Parakh, A. and Mahoney, W. (2015) Cryptanalysis and improvements of the quasigroup block cipher, Journal of Information Assurance and Security, volume 10, issue 1, pages 36-44.
Parakh, A. (2013) A probabilistic quantum key transfer protocol, Security and Communication Networks, volume 6, issue 11, pages 1389-1395, Wiley.
Battey, M. and Parakh, A. (2013) An efficient quasigroup block cipher, Wireless Personal Communications, volume 73, issue 1, pages 63-76, Springer.
Parakh, A. and Kak, S. (2012) A new small world lattice, Advanced Computing, Networking and Security, Lecture Notes in Computer Science (LNCS), volume 7135, pages 1-8, Springer.
Parakh, A. and Kak, S. (2011) Space efficient secret sharing for implicit data security, Information Sciences, volume 181, issue 2, pages 334-341.
Parakh, A. and Kak, S. (2010) Internet voting protocol based on improved implicit security, Cryptologia, volume 34, issue 3, pages 258-268.
Parakh, A. and Kak, S. (2010) Challenges facing electronic voting, Seminar: the Monthly Symposium, No. 609, May.
Parakh, A. and Kak, S. (2009) Online data storage using implicit security, Information Science, volume 179, issue 19, pages 3323-3331.
Parakh, A. (2008) Oblivious transfer based on key exchange, Cryptologia, volume 32, issue 1, pages 37-44.
Parakh, A. and Kak, S. (2007) How to improve security in electronic voting? ACM Ubiquity, volume 8, issue 6, February.
Parakh, A. (2007) Oblivious transfer using elliptic curves, Cryptologia, volume 31, issue 2, pages 125-132.
Parakh, A. (2007) Aryabhata’s root extraction methods, Indian Journal of History of Science, volume 42, issue 2, pages 149-161.
Parakh, A. and Kewei, S. (2016) Editorial for the Special Issue on Privacy, Security and Trust for Mobile and Wireless Systems, Inderscience, January 2016.
Parakh, A. and Zhiwei Wang. (2017) Editorial for Special Issue on Challenges and Solutions in Mobile Systems Security, Computer and Electrical Engineering, volume 59, pages 201-203, Elsevier.