BibTeX records: Praveen Gauravaram

download as .bib file

@article{DBLP:journals/access/HasanSBI0AGM24,
  author       = {Khondokar Fida Hasan and
                  Leonie Simpson and
                  Mir Ali Rezazadeh Baee and
                  Chadni Islam and
                  Ziaur Rahman and
                  Warren Armstrong and
                  Praveen Gauravaram and
                  Matthew McKague},
  title        = {A Framework for Migrating to Post-Quantum Cryptography: Security Dependency
                  Analysis and Case Studies},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {23427--23450},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3360412},
  doi          = {10.1109/ACCESS.2024.3360412},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HasanSBI0AGM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BuiAMGSCPBIICGSBY24,
  author       = {Hang Thanh Bui and
                  Hamed Aboutorab and
                  Arash Mahboubi and
                  Yansong Gao and
                  Nazatul Haque Sultan and
                  Aufeef Chauhan and
                  Mohammad Zavid Parvez and
                  Michael Bewong and
                  Rafiqul Islam and
                  Zahidul Islam and
                  Seyit Ahmet {\c{C}}amtepe and
                  Praveen Gauravaram and
                  Dineshkumar Singh and
                  Muhammad Ali Babar and
                  Shihao Yan},
  title        = {Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources
                  and techniques in smart farming ecosystems},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103754},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103754},
  doi          = {10.1016/J.COSE.2024.103754},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BuiAMGSCPBIICGSBY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/JiangBSGPZZL24,
  author       = {Yinhao Jiang and
                  Mir Ali Rezazadeh Baee and
                  Leonie Ruth Simpson and
                  Praveen Gauravaram and
                  Josef Pieprzyk and
                  Tanveer A. Zia and
                  Zhen Zhao and
                  Zung Le},
  title        = {Pervasive User Data Collection from Cyberspace: Privacy Concerns and
                  Countermeasures},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {5},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010005},
  doi          = {10.3390/CRYPTOGRAPHY8010005},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/JiangBSGPZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NosouhiBDMPG0S24,
  author       = {Mohammad Reza Nosouhi and
                  Zubair A. Baig and
                  Robin Doss and
                  Divyans Mahansaria and
                  Debi Prasad Pati and
                  Praveen Gauravaram and
                  Lei Pan and
                  Keshav Sood},
  title        = {Towards Availability of Strong Authentication in Remote and Disruption-Prone
                  Operational Technology Environments},
  booktitle    = {Proceedings of the 19th International Conference on Availability,
                  Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024
                  - 2 August 2024},
  pages        = {145:1--145:11},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3664476.3671411},
  doi          = {10.1145/3664476.3671411},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NosouhiBDMPG0S24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/JeongYDGW0NV24,
  author       = {Jongkil Jay Jeong and
                  Lu{-}Xing Yang and
                  Robin Doss and
                  Praveen Gauravaram and
                  Zoe Wang and
                  Mohamed Abdelrazek and
                  Ashish Nanda and
                  Keerthivasan Viswanathan},
  editor       = {Jianying Zhou and
                  Tony Q. S. Quek and
                  Debin Gao and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {{POSTER:} Addressing the Privacy by Use Challenges in Verifiable Credential
                  based Digital Wallets},
  booktitle    = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3634737.3659427},
  doi          = {10.1145/3634737.3659427},
  timestamp    = {Fri, 16 Aug 2024 09:08:03 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/JeongYDGW0NV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GearXFGJS23,
  author       = {Joseph Gear and
                  Yue Xu and
                  Ernest Foo and
                  Praveen Gauravaram and
                  Zahra Jadidi and
                  Leonie Simpson},
  title        = {Software Vulnerability Detection Using Informed Code Graph Pruning},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {135626--135644},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3338162},
  doi          = {10.1109/ACCESS.2023.3338162},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GearXFGJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NosouhiSPZNGD23,
  author       = {Mohammad Reza Nosouhi and
                  Syed W. Shah and
                  Lei Pan and
                  Yevhen Zolotavkin and
                  Ashish Nanda and
                  Praveen Gauravaram and
                  Robin Doss},
  title        = {Weak-Key Analysis for {BIKE} Post-Quantum Key Encapsulation Mechanism},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {2160--2174},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3264153},
  doi          = {10.1109/TIFS.2023.3264153},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NosouhiSPZNGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/KoroniotisMSGJ23,
  author       = {Nickolaos Koroniotis and
                  Nour Moustafa and
                  Francesco Schiliro and
                  Praveen Gauravaram and
                  Helge Janicke},
  title        = {The SAir-IIoT Cyber Testbed as a Service: {A} Novel Cybertwins Architecture
                  in IIoT-Based Smart Airports},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {2368--2381},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2021.3106378},
  doi          = {10.1109/TITS.2021.3106378},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/KoroniotisMSGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-06520,
  author       = {Khondokar Fida Hasan and
                  Leonie Simpson and
                  Mir Ali Rezazadeh Baee and
                  Chadni Islam and
                  Ziaur Rahman and
                  Warren Armstrong and
                  Praveen Gauravaram and
                  Matthew McKague},
  title        = {Migrating to Post-Quantum Cryptography: a Framework Using Security
                  Dependency Analysis},
  journal      = {CoRR},
  volume       = {abs/2307.06520},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.06520},
  doi          = {10.48550/ARXIV.2307.06520},
  eprinttype    = {arXiv},
  eprint       = {2307.06520},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-06520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/YadavGJP22,
  author       = {Geeta Yadav and
                  Praveen Gauravaram and
                  Arun Kumar Jindal and
                  Kolin Paul},
  title        = {SmartPatch: {A} patch prioritization framework},
  journal      = {Comput. Ind.},
  volume       = {137},
  pages        = {103595},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compind.2021.103595},
  doi          = {10.1016/J.COMPIND.2021.103595},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cii/YadavGJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/ZamanXGH022,
  author       = {Zakia Zaman and
                  Wanli Xue and
                  Praveen Gauravaram and
                  Wen Hu and
                  Sanjay Jha},
  title        = {BloomXNOR-Net: privacy-preserving machine learning in IoT},
  booktitle    = {S3@MobiCom 2022: Proceedings of the 13th {ACM} Wireless of the Students,
                  by the Students, and for the Students Workshop, Sydney, NSW, Australia,
                  17 October 2022},
  pages        = {1--3},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3556563.3558534},
  doi          = {10.1145/3556563.3558534},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/ZamanXGH022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GearXFGJS22,
  author       = {Joseph Gear and
                  Yue Xu and
                  Ernest Foo and
                  Praveen Gauravaram and
                  Zahra Jadidi and
                  Leonie Simpson},
  title        = {{SCEVD:} Semantic-enhanced Code Embedding for Vulnerability Discovery},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {1522--1527},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00217},
  doi          = {10.1109/TRUSTCOM56396.2022.00217},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GearXFGJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-04313,
  author       = {Yinhao Jiang and
                  Ba Dung Le and
                  Tanveer A. Zia and
                  Praveen Gauravaram},
  title        = {Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace
                  and Their Countermeasures},
  journal      = {CoRR},
  volume       = {abs/2202.04313},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.04313},
  eprinttype    = {arXiv},
  eprint       = {2202.04313},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-04313.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-13885,
  author       = {Mohammad Reza Nosouhi and
                  Syed W. Shah and
                  Lei Pan and
                  Yevhen Zolotavkin and
                  Ashish Nanda and
                  Praveen Gauravaram and
                  Robin Doss},
  title        = {Weak-Key Analysis for {BIKE} Post-Quantum Key Encapsulation Mechanism},
  journal      = {CoRR},
  volume       = {abs/2204.13885},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.13885},
  doi          = {10.48550/ARXIV.2204.13885},
  eprinttype    = {arXiv},
  eprint       = {2204.13885},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-13885.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KoroniotisMTSGJ21,
  author       = {Nickolaos Koroniotis and
                  Nour Moustafa and
                  Benjamin P. Turnbull and
                  Francesco Schiliro and
                  Praveen Gauravaram and
                  Helge Janicke},
  title        = {A Deep Learning-based Penetration Testing Framework for Vulnerability
                  Identification in Internet of Things Environments},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {887--894},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00125},
  doi          = {10.1109/TRUSTCOM53373.2021.00125},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KoroniotisMTSGJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-09259,
  author       = {Nickolaos Koroniotis and
                  Nour Moustafa and
                  Benjamin P. Turnbull and
                  Francesco Schiliro and
                  Praveen Gauravaram and
                  Helge Janicke},
  title        = {A Deep Learning-based Penetration Testing Framework for Vulnerability
                  Identification in Internet of Things Environments},
  journal      = {CoRR},
  volume       = {abs/2109.09259},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.09259},
  eprinttype    = {arXiv},
  eprint       = {2109.09259},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-09259.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KoroniotisMSGJ20,
  author       = {Nickolaos Koroniotis and
                  Nour Moustafa and
                  Francesco Schiliro and
                  Praveen Gauravaram and
                  Helge Janicke},
  title        = {A Holistic Review of Cybersecurity and Reliability Perspectives in
                  Smart Airports},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {209802--209834},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3036728},
  doi          = {10.1109/ACCESS.2020.3036728},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KoroniotisMSGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/NerwichGPN20,
  author       = {Mark Nerwich and
                  Praveen Gauravaram and
                  Hye{-}young Paik and
                  Surya Nepal},
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {Vulnerability Database as a Service for IoT},
  booktitle    = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  pages        = {95--107},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9\_7},
  doi          = {10.1007/978-981-33-4706-9\_7},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atis/NerwichGPN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/YadavGJ20,
  author       = {Geeta Yadav and
                  Praveen Gauravaram and
                  Arun Kumar Jindal},
  title        = {SmartPatch: a patch prioritization framework for {SCADA} chain in
                  smart grid},
  booktitle    = {MobiCom '20: The 26th Annual International Conference on Mobile Computing
                  and Networking, London, United Kingdom, September 21-25, 2020},
  pages        = {83:1--83:3},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372224.3418162},
  doi          = {10.1145/3372224.3418162},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/YadavGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/DorriKJG19,
  author       = {Ali Dorri and
                  Salil S. Kanhere and
                  Raja Jurdak and
                  Praveen Gauravaram},
  title        = {{LSB:} {A} Lightweight Scalable Blockchain for IoT security and anonymity},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {134},
  pages        = {180--197},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jpdc.2019.08.005},
  doi          = {10.1016/J.JPDC.2019.08.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/DorriKJG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcloud/NarumanchiGEG18,
  author       = {Harika Narumanchi and
                  Dishant Goyal and
                  Nitesh Emmadi and
                  Praveen Gauravaram},
  title        = {Search over Compute: Solving Multiplication-Intensive Computational
                  Problems over {FHE} Data},
  booktitle    = {2018 {IEEE} International Conference on Smart Cloud, SmartCloud 2018,
                  New York City, NY, USA, September 21-23, 2018},
  pages        = {40--45},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartCloud.2018.00015},
  doi          = {10.1109/SMARTCLOUD.2018.00015},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcloud/NarumanchiGEG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sscc/DrakeG18,
  author       = {Chris Drake and
                  Praveen Gauravaram},
  editor       = {Sabu M. Thampi and
                  Sanjay Madria and
                  Guojun Wang and
                  Danda B. Rawat and
                  Jos{\'{e}} M. Alcaraz Calero},
  title        = {Designing a User-Experience-First, Privacy-Respectful, High-Security
                  Mutual-Multifactor Authentication Solution},
  booktitle    = {Security in Computing and Communications - 6th International Symposium,
                  {SSCC} 2018, Bangalore, India, September 19-22, 2018, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {969},
  pages        = {183--210},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-5826-5\_14},
  doi          = {10.1007/978-981-13-5826-5\_14},
  timestamp    = {Wed, 24 Apr 2024 14:55:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sscc/DrakeG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/NarumanchiGEG17,
  author       = {Harika Narumanchi and
                  Dishant Goyal and
                  Nitesh Emmadi and
                  Praveen Gauravaram},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Hui{-}Huang Hsu and
                  Chi{-}Yi Lin},
  title        = {Performance Analysis of Sorting of {FHE} Data: Integer-Wise Comparison
                  vs Bit-Wise Comparison},
  booktitle    = {31st {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2017, Taipei, Taiwan, March 27-29, 2017},
  pages        = {902--908},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AINA.2017.85},
  doi          = {10.1109/AINA.2017.85},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/NarumanchiGEG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/GauravaramHS17,
  author       = {Praveen Gauravaram and
                  Shoichi Hirose and
                  Douglas Stebila},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {Security Analysis of a Design Variant of Randomized Hashing},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {14--22},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_2},
  doi          = {10.1007/978-981-10-5421-1\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/GauravaramHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/DorriKJG17,
  author       = {Ali Dorri and
                  Salil S. Kanhere and
                  Raja Jurdak and
                  Praveen Gauravaram},
  title        = {Blockchain for IoT security and privacy: The case study of a smart
                  home},
  booktitle    = {2017 {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March
                  13-17, 2017},
  pages        = {618--623},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PERCOMW.2017.7917634},
  doi          = {10.1109/PERCOMW.2017.7917634},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/DorriKJG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-02969,
  author       = {Ali Dorri and
                  Salil S. Kanhere and
                  Raja Jurdak and
                  Praveen Gauravaram},
  title        = {{LSB:} {A} Lightweight Scalable BlockChain for IoT Security and Privacy},
  journal      = {CoRR},
  volume       = {abs/1712.02969},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.02969},
  eprinttype    = {arXiv},
  eprint       = {1712.02969},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-02969.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GauravaramBK16,
  author       = {Praveen Gauravaram and
                  Nasour Bagheri and
                  Lars R. Knudsen},
  title        = {Building indifferentiable compression functions from the {PGV} compression
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {547--581},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0020-z},
  doi          = {10.1007/S10623-014-0020-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GauravaramBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccri/EmmadiGNS15,
  author       = {Nitesh Emmadi and
                  Praveen Gauravaram and
                  Harika Narumanchi and
                  Habeeb Syed},
  title        = {Updates on Sorting of Fully Homomorphic Encrypted Data},
  booktitle    = {2015 International Conference on Cloud Computing Research and Innovation,
                  {ICCCRI} 2015, Singapore, Singapore, October 26-27, 2015},
  pages        = {19--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCCRI.2015.28},
  doi          = {10.1109/ICCCRI.2015.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccri/EmmadiGNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AbdelraheemAAAB15,
  author       = {Mohamed Ahmed Abdelraheem and
                  Javad Alizadeh and
                  Hoda A. Alkhzaimi and
                  Mohammad Reza Aref and
                  Nasour Bagheri and
                  Praveen Gauravaram},
  editor       = {Alex Biryukov and
                  Vipul Goyal},
  title        = {Improved Linear Cryptanalysis of Reduced-Round {SIMON-32} and {SIMON-48}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
                  on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9462},
  pages        = {153--179},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26617-6\_9},
  doi          = {10.1007/978-3-319-26617-6\_9},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AbdelraheemAAAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemAAAB15,
  author       = {Mohamed Ahmed Abdelraheem and
                  Javad Alizadeh and
                  Hoda Alkhzaimi and
                  Mohammad Reza Aref and
                  Nasour Bagheri and
                  Praveen Gauravaram},
  title        = {Improved Linear Cryptanalysis of reduced-round {SIMON-32} and {SIMON-48}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {988},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/988},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemAAAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EmmadiGNS15,
  author       = {Nitesh Emmadi and
                  Praveen Gauravaram and
                  Harika Narumanchi and
                  Habeeb Syed},
  title        = {Updates on Sorting of Fully Homomorphic Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {995},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/995},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EmmadiGNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KuppusamyRG14,
  author       = {Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Praveen Gauravaram},
  editor       = {Robert H. Deng and
                  Elaine Shi and
                  Kui Ren},
  title        = {On secure outsourcing of cryptographic computations to cloud},
  booktitle    = {Proceedings of the Second International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '14, Kyoto, Japan, June 3, 2014},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600075.2600085},
  doi          = {10.1145/2600075.2600085},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KuppusamyRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icacci/TataNE14,
  author       = {Praveen Gauravaram and
                  Harika Narumanchi and
                  Nitesh Emmadi},
  title        = {Analytical study of implementation issues of {NTRU}},
  booktitle    = {2014 International Conference on Advances in Computing, Communications
                  and Informatics, {ICACCI} 2014, Delhi, India, September 24-27, 2014},
  pages        = {700--707},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICACCI.2014.6968468},
  doi          = {10.1109/ICACCI.2014.6968468},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icacci/TataNE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AlizadehAABG0LS14,
  author       = {Javad Alizadeh and
                  Hoda Alkhzaimi and
                  Mohammad Reza Aref and
                  Nasour Bagheri and
                  Praveen Gauravaram and
                  Abhishek Kumar and
                  Martin M. Lauridsen and
                  Somitra Kumar Sanadhya},
  editor       = {Nitesh Saxena and
                  Ahmad{-}Reza Sadeghi},
  title        = {Cryptanalysis of {SIMON} Variants with Connections},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 10th
                  International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8651},
  pages        = {90--107},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13066-8\_6},
  doi          = {10.1007/978-3-319-13066-8\_6},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/AlizadehAABG0LS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlizadehAABGL14a,
  author       = {Javad Alizadeh and
                  Hoda Alkhzaimi and
                  Mohammad Reza Aref and
                  Nasour Bagheri and
                  Praveen Gauravaram and
                  Martin M. Lauridsen},
  title        = {Improved Linear Cryptanalysis of Round Reduced {SIMON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/681},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlizadehAABGL14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/BagheriGSS13,
  author       = {Nasour Bagheri and
                  Praveen Gauravaram and
                  Masoumeh Safkhani and
                  Somitra Kumar Sanadhya},
  editor       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Desynchronization and Traceability Attacks on {RIPTA-DA} Protocol},
  booktitle    = {Radio Frequency Identification - Security and Privacy Issues 9th International
                  Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8262},
  pages        = {57--68},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41332-2\_4},
  doi          = {10.1007/978-3-642-41332-2\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/BagheriGSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AghiliBGSS13,
  author       = {Seyed Farhad Aghili and
                  Nasour Bagheri and
                  Praveen Gauravaram and
                  Masoumeh Safkhani and
                  Somitra Kumar Sanadhya},
  editor       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {On the Security of Two {RFID} Mutual Authentication Protocols},
  booktitle    = {Radio Frequency Identification - Security and Privacy Issues 9th International
                  Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8262},
  pages        = {86--99},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41332-2\_6},
  doi          = {10.1007/978-3-642-41332-2\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/AghiliBGSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlizadehBGKS13,
  author       = {Javad Alizadeh and
                  Nasour Bagheri and
                  Praveen Gauravaram and
                  Abhishek Kumar and
                  Somitra Kumar Sanadhya},
  title        = {Linear Cryptanalysis of Round Reduced {SIMON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {663},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/663},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlizadehBGKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BagheriGKZ12,
  author       = {Nasour Bagheri and
                  Praveen Gauravaram and
                  Lars R. Knudsen and
                  Erik Zenner},
  title        = {The suffix-free-prefix-free hash function construction and its indifferentiability
                  security analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {6},
  pages        = {419--434},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0175-4},
  doi          = {10.1007/S10207-012-0175-4},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BagheriGKZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GauravaramK12,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen},
  title        = {Security Analysis of Randomize-Hash-then-Sign Digital Signatures},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {4},
  pages        = {748--779},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-011-9109-y},
  doi          = {10.1007/S00145-011-9109-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GauravaramK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GauravaramKBW11,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen and
                  Nasour Bagheri and
                  Lei Wei},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Improved Security Analysis of Fugue-256 (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {428--432},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_30},
  doi          = {10.1007/978-3-642-22497-3\_30},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GauravaramKBW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/GauravaramK11,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen},
  editor       = {Rebecca Herold},
  title        = {Cryptographic Hash Functions},
  booktitle    = {Encyclopedia of Information Assurance},
  publisher    = {Taylor {\&} Francis},
  year         = {2011},
  url          = {https://doi.org/10.1081/E-EIA-120047187},
  doi          = {10.1081/E-EIA-120047187},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/GauravaramK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/BagheriGNS10,
  author       = {Nasour Bagheri and
                  Praveen Gauravaram and
                  Majid Naderi and
                  Babak Sadeghiyan},
  title        = {{EPC:} {A} Provably Secure Permutation Based Compression Function},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {10},
  pages        = {1833--1836},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1833},
  doi          = {10.1587/TRANSFUN.E93.A.1833},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/BagheriGNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GauravaramKKT10,
  author       = {Praveen Gauravaram and
                  John Kelsey and
                  Lars R. Knudsen and
                  S{\o}ren S. Thomsen},
  title        = {On hash functions using checksums},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {2},
  pages        = {137--151},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0100-7},
  doi          = {10.1007/S10207-009-0100-7},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GauravaramKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GauravaramLMNPRS10,
  author       = {Praveen Gauravaram and
                  Ga{\"{e}}tan Leurent and
                  Florian Mendel and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Cryptanalysis of the 10-Round Hash and Full Compression Function of
                  SHAvite-3-512},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {419--436},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_25},
  doi          = {10.1007/978-3-642-12678-9\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GauravaramLMNPRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BagheriGNT10,
  author       = {Nasour Bagheri and
                  Praveen Gauravaram and
                  Majid Naderi and
                  S{\o}ren S. Thomsen},
  editor       = {Swee{-}Huay Heng and
                  Rebecca N. Wright and
                  Bok{-}Min Goi},
  title        = {On the Collision and Preimage Resistance of Certain Two-Call Hash
                  Functions},
  booktitle    = {Cryptology and Network Security - 9th International Conference, {CANS}
                  2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6467},
  pages        = {96--105},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17619-7\_8},
  doi          = {10.1007/978-3-642-17619-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BagheriGNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KumarSGSN10,
  author       = {Ashish Kumar and
                  Somitra Kumar Sanadhya and
                  Praveen Gauravaram and
                  Masoumeh Safkhani and
                  Majid Naderi},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {Cryptanalysis of Tav-128 Hash Function},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {118--130},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_10},
  doi          = {10.1007/978-3-642-17401-8\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KumarSGSN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/icsec/GauravaramK10,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen},
  editor       = {Peter P. Stavroulakis and
                  Mark Stamp},
  title        = {Cryptographic Hash Functions},
  booktitle    = {Handbook of Information and Communication Security},
  pages        = {59--79},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-04117-4\_4},
  doi          = {10.1007/978-3-642-04117-4\_4},
  timestamp    = {Mon, 13 Mar 2023 20:54:16 +0100},
  biburl       = {https://dblp.org/rec/reference/icsec/GauravaramK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GauravaramK09,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen},
  editor       = {Antoine Joux},
  title        = {On Randomizing Hash Functions to Strengthen the Security of Digital
                  Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {88--105},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_5},
  doi          = {10.1007/978-3-642-01001-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GauravaramK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovGGKLMNPW09,
  author       = {Alex Biryukov and
                  Praveen Gauravaram and
                  Jian Guo and
                  Dmitry Khovratovich and
                  San Ling and
                  Krystian Matusiewicz and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Orr Dunkelman},
  title        = {Cryptanalysis of the {LAKE} Hash Family},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {156--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_10},
  doi          = {10.1007/978-3-642-03317-9\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovGGKLMNPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/GauravaramKMMRS09,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen and
                  Krystian Matusiewicz and
                  Florian Mendel and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer and
                  S{\o}ren S. Thomsen},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Gr{\o}stl - a {SHA-3} candidate},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1955/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/GauravaramKMMRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GauravaramHA08,
  author       = {Praveen Gauravaram and
                  Shoichi Hirose and
                  Suganya Annadurai},
  title        = {An Update on the Analysis and Design of {NMAC} and {HMAC} Functions},
  journal      = {Int. J. Netw. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {49--60},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n1/ijns-2008-v7-n1-p49-60.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GauravaramHA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GauravaramK08,
  author       = {Praveen Gauravaram and
                  John Kelsey},
  editor       = {Tal Malkin},
  title        = {Linear-XOR and Additive Checksums Don't Protect Damg{\aa}rd-Merkle
                  Hashes from Generic Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {36--51},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_3},
  doi          = {10.1007/978-3-540-79263-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GauravaramK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GauravaramO08,
  author       = {Praveen Gauravaram and
                  Katsuyuki Okeya},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Side Channel Analysis of Some Hash Based MACs: {A} Response to {SHA-3}
                  Requirements},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {111--127},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_8},
  doi          = {10.1007/978-3-540-88625-9\_8},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/GauravaramO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GauravaramO07,
  author       = {Praveen Gauravaram and
                  Katsuyuki Okeya},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic
                  Hash Functions},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {393--403},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_31},
  doi          = {10.1007/978-3-540-77026-8\_31},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GauravaramO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GauravaramK07,
  author       = {Praveen Gauravaram and
                  John Kelsey},
  title        = {Cryptanalysis of a class of cryptographic hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GauravaramK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/firstmonday/GauravaramMD06,
  author       = {Praveen Gauravaram and
                  Adrian McCullagh and
                  Ed Dawson},
  title        = {The legal and practical implications of recent attacks on 128-bit
                  cryptographic hash functions},
  journal      = {First Monday},
  volume       = {11},
  number       = {1},
  year         = {2006},
  url          = {https://doi.org/10.5210/fm.v11i1.1306},
  doi          = {10.5210/FM.V11I1.1306},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/firstmonday/GauravaramMD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GauravaramMDV06,
  author       = {Praveen Gauravaram and
                  William Millan and
                  Ed Dawson and
                  Kapali Viswanathan},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Constructing Secure Hash Functions by Enhancing Merkle-Damg{\aa}rd
                  Construction},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {407--420},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_34},
  doi          = {10.1007/11780656\_34},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GauravaramMDV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GauravaramMND05,
  author       = {Praveen Gauravaram and
                  William Millan and
                  Juanma Gonz{\'{a}}lez Nieto and
                  Ed Dawson},
  title        = {3C- {A} Provably Secure Pseudorandom Function and Message Authentication
                  Code.A New mode of operation for Cryptographic Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GauravaramMND05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GauravaramMN05,
  author       = {Praveen Gauravaram and
                  William Millan and
                  Juanma Gonz{\'{a}}lez Nieto},
  title        = {Some thoughts on Collision Attacks in the Hash Functions MD5, {SHA-0}
                  and {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GauravaramMN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceee/MillanG04,
  author       = {William Millan and
                  Praveen Gauravaram},
  title        = {Cryptanalysis of the cellular authentication and voice encryption
                  algorithm},
  journal      = {{IEICE} Electron. Express},
  volume       = {1},
  number       = {15},
  pages        = {453--459},
  year         = {2004},
  url          = {https://doi.org/10.1587/elex.1.453},
  doi          = {10.1587/ELEX.1.453},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceee/MillanG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cau/GauravaramM04,
  author       = {Praveen Gauravaram and
                  William Millan},
  editor       = {Ed Dawson and
                  Wolfgang Klemm},
  title        = {Improved Attack on the Cellular Authentication and Voice Encryption
                  Algorithm {(CAVE)}},
  booktitle    = {Cryptographic Algorithms and their Uses - 2004, International Workshop,
                  Gold Coast, Australia, July 5-6, 2004, Proceedings},
  pages        = {1--13},
  publisher    = {Queensland University of Technology},
  year         = {2004},
  timestamp    = {Fri, 16 Jul 2004 13:22:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cau/GauravaramM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cau/GauravaramMM04,
  author       = {Praveen Gauravaram and
                  William Millan and
                  Lauren May},
  editor       = {Ed Dawson and
                  Wolfgang Klemm},
  title        = {{CRUSH:} {A} New Cryptographic Hash Function using Iterated Halving
                  Technique},
  booktitle    = {Cryptographic Algorithms and their Uses - 2004, International Workshop,
                  Gold Coast, Australia, July 5-6, 2004, Proceedings},
  pages        = {28--39},
  publisher    = {Queensland University of Technology},
  year         = {2004},
  timestamp    = {Fri, 16 Jul 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cau/GauravaramMM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}