Volgen
Pankaj Rohatgi
Pankaj Rohatgi
Geverifieerd e-mailadres voor google.com
Titel
Geciteerd door
Geciteerd door
Jaar
Template attacks
S Chari, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
17742003
Towards sound approaches to counteract power-analysis attacks
S Chari, CS Jutla, JR Rao, P Rohatgi
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
13381999
The EM side—channel (s)
D Agrawal, B Archambeault, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
12092003
Trojan detection using IC fingerprinting
D Agrawal, S Baktir, D Karakoyunlu, P Rohatgi, B Sunar
2007 IEEE Symposium on Security and Privacy (SP'07), 296-310, 2007
10382007
Introduction to differential power analysis
P Kocher, J Jaffe, B Jun, P Rohatgi
Journal of Cryptographic Engineering 1, 5-27, 2011
7342011
How to sign digital streams
R Gennaro, P Rohatgi
Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 2006
5642006
A testing methodology for side-channel resistance validation
BJ Gilbert Goodwill, J Jaffe, P Rohatgi
NIST non-invasive attack testing workshop 7, 115-136, 2011
5182011
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
PC Cheng, P Rohatgi, C Keser, PA Karger, GM Wagner, AS Reninger
2007 IEEE Symposium on Security and Privacy (SP'07), 222-230, 2007
4312007
Efficient Rijndael encryption implementation with composite field arithmetic
A Rudra, PK Dubey, CS Jutla, V Kumar, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
3262001
A survey of security issues in multicast communications
MJ Moyer, JR Rao, P Rohatgi
IEEE network 13 (6), 12-23, 1999
3151999
A compact and fast hybrid signature scheme for multicast packet authentication
P Rohatgi
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
2661999
Test vector leakage assessment (TVLA) methodology in practice
J Cooper, E DeMulder, G Goodwill, J Jaffe, G Kenworthy, P Rohatgi
International Cryptographic Module Conference 20, 2013
2572013
Test vector leakage assessment (TVLA) methodology in practice
J Cooper, E DeMulder, G Goodwill, J Jaffe, G Kenworthy, P Rohatgi
International Cryptographic Module Conference 20, 2013
2572013
A cautionary note regarding evaluation of AES candidates on smart-cards
S Chari, C Jutla, JR Rao, P Rohatgi
Second Advanced Encryption Standard Candidate Conference, 133-147, 1999
2521999
XenSocket: A high-throughput interdomain transport for virtual machines
X Zhang, S McIntosh, P Rohatgi, JL Griffin
Middleware 2007: ACM/IFIP/USENIX 8th International Middleware Conference …, 2007
2262007
Verifiable, leak-resistant encryption and decryption
PC Kocher, P Rohatgi, JM Jaffe
US Patent 8,386,800, 2013
2252013
Context-based virtual assistant conversations
F Brown, TM Miller, M Zartler, S Buzan
US Patent 10,109,297, 2018
2072018
Can pseudonymity really guarantee privacy?
JR Rao, P Rohatgi
USENIX Security Symposium, 85-96, 2000
1972000
Multi-channel attacks
D Agrawal, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
1952003
Partitioning attacks: or how to rapidly clone some GSM cards
JR Rao, P Rohatgi, H Scherzer, S Tinguely
Proceedings 2002 IEEE Symposium on Security and Privacy, 31-41, 2002
1542002
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20