default search action
BibTeX records: Praveen Gauravaram
@article{DBLP:journals/access/HasanSBI0AGM24, author = {Khondokar Fida Hasan and Leonie Simpson and Mir Ali Rezazadeh Baee and Chadni Islam and Ziaur Rahman and Warren Armstrong and Praveen Gauravaram and Matthew McKague}, title = {A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies}, journal = {{IEEE} Access}, volume = {12}, pages = {23427--23450}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3360412}, doi = {10.1109/ACCESS.2024.3360412}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HasanSBI0AGM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BuiAMGSCPBIICGSBY24, author = {Hang Thanh Bui and Hamed Aboutorab and Arash Mahboubi and Yansong Gao and Nazatul Haque Sultan and Aufeef Chauhan and Mohammad Zavid Parvez and Michael Bewong and Rafiqul Islam and Zahidul Islam and Seyit Ahmet {\c{C}}amtepe and Praveen Gauravaram and Dineshkumar Singh and Muhammad Ali Babar and Shihao Yan}, title = {Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems}, journal = {Comput. Secur.}, volume = {140}, pages = {103754}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103754}, doi = {10.1016/J.COSE.2024.103754}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BuiAMGSCPBIICGSBY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/JiangBSGPZZL24, author = {Yinhao Jiang and Mir Ali Rezazadeh Baee and Leonie Ruth Simpson and Praveen Gauravaram and Josef Pieprzyk and Tanveer A. Zia and Zhen Zhao and Zung Le}, title = {Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {5}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010005}, doi = {10.3390/CRYPTOGRAPHY8010005}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/JiangBSGPZZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NosouhiBDMPG0S24, author = {Mohammad Reza Nosouhi and Zubair A. Baig and Robin Doss and Divyans Mahansaria and Debi Prasad Pati and Praveen Gauravaram and Lei Pan and Keshav Sood}, title = {Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {145:1--145:11}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3671411}, doi = {10.1145/3664476.3671411}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NosouhiBDMPG0S24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/JeongYDGW0NV24, author = {Jongkil Jay Jeong and Lu{-}Xing Yang and Robin Doss and Praveen Gauravaram and Zoe Wang and Mohamed Abdelrazek and Ashish Nanda and Keerthivasan Viswanathan}, editor = {Jianying Zhou and Tony Q. S. Quek and Debin Gao and Alvaro A. C{\'{a}}rdenas}, title = {{POSTER:} Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets}, booktitle = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3634737.3659427}, doi = {10.1145/3634737.3659427}, timestamp = {Fri, 16 Aug 2024 09:08:03 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/JeongYDGW0NV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GearXFGJS23, author = {Joseph Gear and Yue Xu and Ernest Foo and Praveen Gauravaram and Zahra Jadidi and Leonie Simpson}, title = {Software Vulnerability Detection Using Informed Code Graph Pruning}, journal = {{IEEE} Access}, volume = {11}, pages = {135626--135644}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3338162}, doi = {10.1109/ACCESS.2023.3338162}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GearXFGJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NosouhiSPZNGD23, author = {Mohammad Reza Nosouhi and Syed W. Shah and Lei Pan and Yevhen Zolotavkin and Ashish Nanda and Praveen Gauravaram and Robin Doss}, title = {Weak-Key Analysis for {BIKE} Post-Quantum Key Encapsulation Mechanism}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {2160--2174}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3264153}, doi = {10.1109/TIFS.2023.3264153}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NosouhiSPZNGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/KoroniotisMSGJ23, author = {Nickolaos Koroniotis and Nour Moustafa and Francesco Schiliro and Praveen Gauravaram and Helge Janicke}, title = {The SAir-IIoT Cyber Testbed as a Service: {A} Novel Cybertwins Architecture in IIoT-Based Smart Airports}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {2}, pages = {2368--2381}, year = {2023}, url = {https://doi.org/10.1109/TITS.2021.3106378}, doi = {10.1109/TITS.2021.3106378}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/KoroniotisMSGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-06520, author = {Khondokar Fida Hasan and Leonie Simpson and Mir Ali Rezazadeh Baee and Chadni Islam and Ziaur Rahman and Warren Armstrong and Praveen Gauravaram and Matthew McKague}, title = {Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis}, journal = {CoRR}, volume = {abs/2307.06520}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.06520}, doi = {10.48550/ARXIV.2307.06520}, eprinttype = {arXiv}, eprint = {2307.06520}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-06520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/YadavGJP22, author = {Geeta Yadav and Praveen Gauravaram and Arun Kumar Jindal and Kolin Paul}, title = {SmartPatch: {A} patch prioritization framework}, journal = {Comput. Ind.}, volume = {137}, pages = {103595}, year = {2022}, url = {https://doi.org/10.1016/j.compind.2021.103595}, doi = {10.1016/J.COMPIND.2021.103595}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cii/YadavGJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/ZamanXGH022, author = {Zakia Zaman and Wanli Xue and Praveen Gauravaram and Wen Hu and Sanjay Jha}, title = {BloomXNOR-Net: privacy-preserving machine learning in IoT}, booktitle = {S3@MobiCom 2022: Proceedings of the 13th {ACM} Wireless of the Students, by the Students, and for the Students Workshop, Sydney, NSW, Australia, 17 October 2022}, pages = {1--3}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3556563.3558534}, doi = {10.1145/3556563.3558534}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/ZamanXGH022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GearXFGJS22, author = {Joseph Gear and Yue Xu and Ernest Foo and Praveen Gauravaram and Zahra Jadidi and Leonie Simpson}, title = {{SCEVD:} Semantic-enhanced Code Embedding for Vulnerability Discovery}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {1522--1527}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00217}, doi = {10.1109/TRUSTCOM56396.2022.00217}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GearXFGJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-04313, author = {Yinhao Jiang and Ba Dung Le and Tanveer A. Zia and Praveen Gauravaram}, title = {Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures}, journal = {CoRR}, volume = {abs/2202.04313}, year = {2022}, url = {https://arxiv.org/abs/2202.04313}, eprinttype = {arXiv}, eprint = {2202.04313}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-04313.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-13885, author = {Mohammad Reza Nosouhi and Syed W. Shah and Lei Pan and Yevhen Zolotavkin and Ashish Nanda and Praveen Gauravaram and Robin Doss}, title = {Weak-Key Analysis for {BIKE} Post-Quantum Key Encapsulation Mechanism}, journal = {CoRR}, volume = {abs/2204.13885}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.13885}, doi = {10.48550/ARXIV.2204.13885}, eprinttype = {arXiv}, eprint = {2204.13885}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-13885.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KoroniotisMTSGJ21, author = {Nickolaos Koroniotis and Nour Moustafa and Benjamin P. Turnbull and Francesco Schiliro and Praveen Gauravaram and Helge Janicke}, title = {A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {887--894}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00125}, doi = {10.1109/TRUSTCOM53373.2021.00125}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KoroniotisMTSGJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-09259, author = {Nickolaos Koroniotis and Nour Moustafa and Benjamin P. Turnbull and Francesco Schiliro and Praveen Gauravaram and Helge Janicke}, title = {A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments}, journal = {CoRR}, volume = {abs/2109.09259}, year = {2021}, url = {https://arxiv.org/abs/2109.09259}, eprinttype = {arXiv}, eprint = {2109.09259}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-09259.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KoroniotisMSGJ20, author = {Nickolaos Koroniotis and Nour Moustafa and Francesco Schiliro and Praveen Gauravaram and Helge Janicke}, title = {A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports}, journal = {{IEEE} Access}, volume = {8}, pages = {209802--209834}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3036728}, doi = {10.1109/ACCESS.2020.3036728}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KoroniotisMSGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/NerwichGPN20, author = {Mark Nerwich and Praveen Gauravaram and Hye{-}young Paik and Surya Nepal}, editor = {Lejla Batina and Gang Li}, title = {Vulnerability Database as a Service for IoT}, booktitle = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, pages = {95--107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9\_7}, doi = {10.1007/978-981-33-4706-9\_7}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atis/NerwichGPN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/YadavGJ20, author = {Geeta Yadav and Praveen Gauravaram and Arun Kumar Jindal}, title = {SmartPatch: a patch prioritization framework for {SCADA} chain in smart grid}, booktitle = {MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, London, United Kingdom, September 21-25, 2020}, pages = {83:1--83:3}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372224.3418162}, doi = {10.1145/3372224.3418162}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/YadavGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/DorriKJG19, author = {Ali Dorri and Salil S. Kanhere and Raja Jurdak and Praveen Gauravaram}, title = {{LSB:} {A} Lightweight Scalable Blockchain for IoT security and anonymity}, journal = {J. Parallel Distributed Comput.}, volume = {134}, pages = {180--197}, year = {2019}, url = {https://doi.org/10.1016/j.jpdc.2019.08.005}, doi = {10.1016/J.JPDC.2019.08.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/DorriKJG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcloud/NarumanchiGEG18, author = {Harika Narumanchi and Dishant Goyal and Nitesh Emmadi and Praveen Gauravaram}, title = {Search over Compute: Solving Multiplication-Intensive Computational Problems over {FHE} Data}, booktitle = {2018 {IEEE} International Conference on Smart Cloud, SmartCloud 2018, New York City, NY, USA, September 21-23, 2018}, pages = {40--45}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartCloud.2018.00015}, doi = {10.1109/SMARTCLOUD.2018.00015}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/smartcloud/NarumanchiGEG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sscc/DrakeG18, author = {Chris Drake and Praveen Gauravaram}, editor = {Sabu M. Thampi and Sanjay Madria and Guojun Wang and Danda B. Rawat and Jos{\'{e}} M. Alcaraz Calero}, title = {Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution}, booktitle = {Security in Computing and Communications - 6th International Symposium, {SSCC} 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {969}, pages = {183--210}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-5826-5\_14}, doi = {10.1007/978-981-13-5826-5\_14}, timestamp = {Wed, 24 Apr 2024 14:55:54 +0200}, biburl = {https://dblp.org/rec/conf/sscc/DrakeG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/NarumanchiGEG17, author = {Harika Narumanchi and Dishant Goyal and Nitesh Emmadi and Praveen Gauravaram}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Hui{-}Huang Hsu and Chi{-}Yi Lin}, title = {Performance Analysis of Sorting of {FHE} Data: Integer-Wise Comparison vs Bit-Wise Comparison}, booktitle = {31st {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2017, Taipei, Taiwan, March 27-29, 2017}, pages = {902--908}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AINA.2017.85}, doi = {10.1109/AINA.2017.85}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/NarumanchiGEG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/GauravaramHS17, author = {Praveen Gauravaram and Shoichi Hirose and Douglas Stebila}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {Security Analysis of a Design Variant of Randomized Hashing}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {14--22}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_2}, doi = {10.1007/978-981-10-5421-1\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atis/GauravaramHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/DorriKJG17, author = {Ali Dorri and Salil S. Kanhere and Raja Jurdak and Praveen Gauravaram}, title = {Blockchain for IoT security and privacy: The case study of a smart home}, booktitle = {2017 {IEEE} International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March 13-17, 2017}, pages = {618--623}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PERCOMW.2017.7917634}, doi = {10.1109/PERCOMW.2017.7917634}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/percom/DorriKJG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-02969, author = {Ali Dorri and Salil S. Kanhere and Raja Jurdak and Praveen Gauravaram}, title = {{LSB:} {A} Lightweight Scalable BlockChain for IoT Security and Privacy}, journal = {CoRR}, volume = {abs/1712.02969}, year = {2017}, url = {http://arxiv.org/abs/1712.02969}, eprinttype = {arXiv}, eprint = {1712.02969}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-02969.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GauravaramBK16, author = {Praveen Gauravaram and Nasour Bagheri and Lars R. Knudsen}, title = {Building indifferentiable compression functions from the {PGV} compression functions}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {547--581}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0020-z}, doi = {10.1007/S10623-014-0020-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GauravaramBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccri/EmmadiGNS15, author = {Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed}, title = {Updates on Sorting of Fully Homomorphic Encrypted Data}, booktitle = {2015 International Conference on Cloud Computing Research and Innovation, {ICCCRI} 2015, Singapore, Singapore, October 26-27, 2015}, pages = {19--24}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICCCRI.2015.28}, doi = {10.1109/ICCCRI.2015.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccri/EmmadiGNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AbdelraheemAAAB15, author = {Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram}, editor = {Alex Biryukov and Vipul Goyal}, title = {Improved Linear Cryptanalysis of Reduced-Round {SIMON-32} and {SIMON-48}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9462}, pages = {153--179}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26617-6\_9}, doi = {10.1007/978-3-319-26617-6\_9}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AbdelraheemAAAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemAAAB15, author = {Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram}, title = {Improved Linear Cryptanalysis of reduced-round {SIMON-32} and {SIMON-48}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {988}, year = {2015}, url = {http://eprint.iacr.org/2015/988}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemAAAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EmmadiGNS15, author = {Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed}, title = {Updates on Sorting of Fully Homomorphic Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {995}, year = {2015}, url = {http://eprint.iacr.org/2015/995}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EmmadiGNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KuppusamyRG14, author = {Lakshmi Kuppusamy and Jothi Rangasamy and Praveen Gauravaram}, editor = {Robert H. Deng and Elaine Shi and Kui Ren}, title = {On secure outsourcing of cryptographic computations to cloud}, booktitle = {Proceedings of the Second International Workshop on Security in Cloud Computing, SCC@ASIACCS '14, Kyoto, Japan, June 3, 2014}, pages = {63--68}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600075.2600085}, doi = {10.1145/2600075.2600085}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KuppusamyRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/TataNE14, author = {Praveen Gauravaram and Harika Narumanchi and Nitesh Emmadi}, title = {Analytical study of implementation issues of {NTRU}}, booktitle = {2014 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} 2014, Delhi, India, September 24-27, 2014}, pages = {700--707}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICACCI.2014.6968468}, doi = {10.1109/ICACCI.2014.6968468}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icacci/TataNE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/AlizadehAABG0LS14, author = {Javad Alizadeh and Hoda Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram and Abhishek Kumar and Martin M. Lauridsen and Somitra Kumar Sanadhya}, editor = {Nitesh Saxena and Ahmad{-}Reza Sadeghi}, title = {Cryptanalysis of {SIMON} Variants with Connections}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8651}, pages = {90--107}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13066-8\_6}, doi = {10.1007/978-3-319-13066-8\_6}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/AlizadehAABG0LS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlizadehAABGL14a, author = {Javad Alizadeh and Hoda Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram and Martin M. Lauridsen}, title = {Improved Linear Cryptanalysis of Round Reduced {SIMON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2014}, url = {http://eprint.iacr.org/2014/681}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlizadehAABGL14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/BagheriGSS13, author = {Nasour Bagheri and Praveen Gauravaram and Masoumeh Safkhani and Somitra Kumar Sanadhya}, editor = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt}, title = {Desynchronization and Traceability Attacks on {RIPTA-DA} Protocol}, booktitle = {Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8262}, pages = {57--68}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41332-2\_4}, doi = {10.1007/978-3-642-41332-2\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/BagheriGSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/AghiliBGSS13, author = {Seyed Farhad Aghili and Nasour Bagheri and Praveen Gauravaram and Masoumeh Safkhani and Somitra Kumar Sanadhya}, editor = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt}, title = {On the Security of Two {RFID} Mutual Authentication Protocols}, booktitle = {Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8262}, pages = {86--99}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41332-2\_6}, doi = {10.1007/978-3-642-41332-2\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/AghiliBGSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlizadehBGKS13, author = {Javad Alizadeh and Nasour Bagheri and Praveen Gauravaram and Abhishek Kumar and Somitra Kumar Sanadhya}, title = {Linear Cryptanalysis of Round Reduced {SIMON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {663}, year = {2013}, url = {http://eprint.iacr.org/2013/663}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlizadehBGKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BagheriGKZ12, author = {Nasour Bagheri and Praveen Gauravaram and Lars R. Knudsen and Erik Zenner}, title = {The suffix-free-prefix-free hash function construction and its indifferentiability security analysis}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {6}, pages = {419--434}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0175-4}, doi = {10.1007/S10207-012-0175-4}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BagheriGKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GauravaramK12, author = {Praveen Gauravaram and Lars R. Knudsen}, title = {Security Analysis of Randomize-Hash-then-Sign Digital Signatures}, journal = {J. Cryptol.}, volume = {25}, number = {4}, pages = {748--779}, year = {2012}, url = {https://doi.org/10.1007/s00145-011-9109-y}, doi = {10.1007/S00145-011-9109-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GauravaramK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GauravaramKBW11, author = {Praveen Gauravaram and Lars R. Knudsen and Nasour Bagheri and Lei Wei}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Improved Security Analysis of Fugue-256 (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {428--432}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_30}, doi = {10.1007/978-3-642-22497-3\_30}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GauravaramKBW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/GauravaramK11, author = {Praveen Gauravaram and Lars R. Knudsen}, editor = {Rebecca Herold}, title = {Cryptographic Hash Functions}, booktitle = {Encyclopedia of Information Assurance}, publisher = {Taylor {\&} Francis}, year = {2011}, url = {https://doi.org/10.1081/E-EIA-120047187}, doi = {10.1081/E-EIA-120047187}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/GauravaramK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/BagheriGNS10, author = {Nasour Bagheri and Praveen Gauravaram and Majid Naderi and Babak Sadeghiyan}, title = {{EPC:} {A} Provably Secure Permutation Based Compression Function}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {10}, pages = {1833--1836}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1833}, doi = {10.1587/TRANSFUN.E93.A.1833}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/BagheriGNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GauravaramKKT10, author = {Praveen Gauravaram and John Kelsey and Lars R. Knudsen and S{\o}ren S. Thomsen}, title = {On hash functions using checksums}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {2}, pages = {137--151}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0100-7}, doi = {10.1007/S10207-009-0100-7}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GauravaramKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GauravaramLMNPRS10, author = {Praveen Gauravaram and Ga{\"{e}}tan Leurent and Florian Mendel and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin and Christian Rechberger and Martin Schl{\"{a}}ffer}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {419--436}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_25}, doi = {10.1007/978-3-642-12678-9\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/GauravaramLMNPRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BagheriGNT10, author = {Nasour Bagheri and Praveen Gauravaram and Majid Naderi and S{\o}ren S. Thomsen}, editor = {Swee{-}Huay Heng and Rebecca N. Wright and Bok{-}Min Goi}, title = {On the Collision and Preimage Resistance of Certain Two-Call Hash Functions}, booktitle = {Cryptology and Network Security - 9th International Conference, {CANS} 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6467}, pages = {96--105}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17619-7\_8}, doi = {10.1007/978-3-642-17619-7\_8}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/BagheriGNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KumarSGSN10, author = {Ashish Kumar and Somitra Kumar Sanadhya and Praveen Gauravaram and Masoumeh Safkhani and Majid Naderi}, editor = {Guang Gong and Kishan Chand Gupta}, title = {Cryptanalysis of Tav-128 Hash Function}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {118--130}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_10}, doi = {10.1007/978-3-642-17401-8\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KumarSGSN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/icsec/GauravaramK10, author = {Praveen Gauravaram and Lars R. Knudsen}, editor = {Peter P. Stavroulakis and Mark Stamp}, title = {Cryptographic Hash Functions}, booktitle = {Handbook of Information and Communication Security}, pages = {59--79}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-04117-4\_4}, doi = {10.1007/978-3-642-04117-4\_4}, timestamp = {Mon, 13 Mar 2023 20:54:16 +0100}, biburl = {https://dblp.org/rec/reference/icsec/GauravaramK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GauravaramK09, author = {Praveen Gauravaram and Lars R. Knudsen}, editor = {Antoine Joux}, title = {On Randomizing Hash Functions to Strengthen the Security of Digital Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {88--105}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_5}, doi = {10.1007/978-3-642-01001-9\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GauravaramK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovGGKLMNPW09, author = {Alex Biryukov and Praveen Gauravaram and Jian Guo and Dmitry Khovratovich and San Ling and Krystian Matusiewicz and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, editor = {Orr Dunkelman}, title = {Cryptanalysis of the {LAKE} Hash Family}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {156--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_10}, doi = {10.1007/978-3-642-03317-9\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovGGKLMNPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/GauravaramKMMRS09, author = {Praveen Gauravaram and Lars R. Knudsen and Krystian Matusiewicz and Florian Mendel and Christian Rechberger and Martin Schl{\"{a}}ffer and S{\o}ren S. Thomsen}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Gr{\o}stl - a {SHA-3} candidate}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1955/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/GauravaramKMMRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GauravaramHA08, author = {Praveen Gauravaram and Shoichi Hirose and Suganya Annadurai}, title = {An Update on the Analysis and Design of {NMAC} and {HMAC} Functions}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {1}, pages = {49--60}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n1/ijns-2008-v7-n1-p49-60.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GauravaramHA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GauravaramK08, author = {Praveen Gauravaram and John Kelsey}, editor = {Tal Malkin}, title = {Linear-XOR and Additive Checksums Don't Protect Damg{\aa}rd-Merkle Hashes from Generic Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {36--51}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_3}, doi = {10.1007/978-3-540-79263-5\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GauravaramK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GauravaramO08, author = {Praveen Gauravaram and Katsuyuki Okeya}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Side Channel Analysis of Some Hash Based MACs: {A} Response to {SHA-3} Requirements}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {111--127}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_8}, doi = {10.1007/978-3-540-88625-9\_8}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/GauravaramO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GauravaramO07, author = {Praveen Gauravaram and Katsuyuki Okeya}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {393--403}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_31}, doi = {10.1007/978-3-540-77026-8\_31}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GauravaramO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GauravaramK07, author = {Praveen Gauravaram and John Kelsey}, title = {Cryptanalysis of a class of cryptographic hash functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2007}, url = {http://eprint.iacr.org/2007/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GauravaramK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/firstmonday/GauravaramMD06, author = {Praveen Gauravaram and Adrian McCullagh and Ed Dawson}, title = {The legal and practical implications of recent attacks on 128-bit cryptographic hash functions}, journal = {First Monday}, volume = {11}, number = {1}, year = {2006}, url = {https://doi.org/10.5210/fm.v11i1.1306}, doi = {10.5210/FM.V11I1.1306}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/firstmonday/GauravaramMD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GauravaramMDV06, author = {Praveen Gauravaram and William Millan and Ed Dawson and Kapali Viswanathan}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Constructing Secure Hash Functions by Enhancing Merkle-Damg{\aa}rd Construction}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {407--420}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_34}, doi = {10.1007/11780656\_34}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GauravaramMDV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GauravaramMND05, author = {Praveen Gauravaram and William Millan and Juanma Gonz{\'{a}}lez Nieto and Ed Dawson}, title = {3C- {A} Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2005}, url = {http://eprint.iacr.org/2005/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GauravaramMND05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GauravaramMN05, author = {Praveen Gauravaram and William Millan and Juanma Gonz{\'{a}}lez Nieto}, title = {Some thoughts on Collision Attacks in the Hash Functions MD5, {SHA-0} and {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2005}, url = {http://eprint.iacr.org/2005/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GauravaramMN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceee/MillanG04, author = {William Millan and Praveen Gauravaram}, title = {Cryptanalysis of the cellular authentication and voice encryption algorithm}, journal = {{IEICE} Electron. Express}, volume = {1}, number = {15}, pages = {453--459}, year = {2004}, url = {https://doi.org/10.1587/elex.1.453}, doi = {10.1587/ELEX.1.453}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceee/MillanG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cau/GauravaramM04, author = {Praveen Gauravaram and William Millan}, editor = {Ed Dawson and Wolfgang Klemm}, title = {Improved Attack on the Cellular Authentication and Voice Encryption Algorithm {(CAVE)}}, booktitle = {Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings}, pages = {1--13}, publisher = {Queensland University of Technology}, year = {2004}, timestamp = {Fri, 16 Jul 2004 13:22:45 +0200}, biburl = {https://dblp.org/rec/conf/cau/GauravaramM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cau/GauravaramMM04, author = {Praveen Gauravaram and William Millan and Lauren May}, editor = {Ed Dawson and Wolfgang Klemm}, title = {{CRUSH:} {A} New Cryptographic Hash Function using Iterated Halving Technique}, booktitle = {Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings}, pages = {28--39}, publisher = {Queensland University of Technology}, year = {2004}, timestamp = {Fri, 16 Jul 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cau/GauravaramMM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.