|
Search the dblp DataBase
Nachiketh R. Potlapally:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Srivaths Ravi, Anand Raghunathan, Nachiketh R. Potlapally, Murugan Sankaradass
System design methodologies for a wireless security processing platform. [Citation Graph (0, 0)][DBLP] DAC, 2002, pp:777-782 [Conf]
- Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi, Niraj K. Jha, Ruby B. Lee
Satisfiability-based framework for enabling side-channel attacks on cryptographic software. [Citation Graph (0, 0)][DBLP] DATE Designers' Forum, 2006, pp:18-23 [Conf]
- Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha
Analyzing the energy consumption of security protocols. [Citation Graph (0, 0)][DBLP] ISLPED, 2003, pp:30-35 [Conf]
- Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi
Securing Wireless Data: System Architecture Challenges. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:195-200 [Conf]
- Nachiketh R. Potlapally, Michael S. Hsiao, Anand Raghunathan, Ganesh Lakshminarayana, Srimat T. Chakradhar
Accurate Power Macro-modeling Techniques for Complex RTL Circuits. [Citation Graph (0, 0)][DBLP] VLSI Design, 2001, pp:235-241 [Conf]
- Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Ruby B. Lee, Niraj K. Jha
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors. [Citation Graph (0, 0)][DBLP] VLSI Design, 2006, pp:299-304 [Conf]
- Nachiketh R. Potlapally
Optical Fingerprinting to Protect Data: A Proposal. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2002, v:35, n:4, pp:23-28 [Journal]
- Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2006, v:5, n:2, pp:128-143 [Journal]
- Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Ruby B. Lee, Niraj K. Jha
Configuration and Extension of Embedded Processors to Optimize IPSec Protocol Execution. [Citation Graph (0, 0)][DBLP] IEEE Trans. VLSI Syst., 2007, v:15, n:5, pp:605-609 [Journal]
- Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi, Niraj K. Jha, Ruby B. Lee
Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. [Citation Graph (0, 0)][DBLP] IEEE Trans. VLSI Syst., 2007, v:15, n:4, pp:465-470 [Journal]
Search in 0.001secs, Finished in 0.002secs
|