|
Search the dblp DataBase
Charanjit S. Jutla:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- E. Allen Emerson, Charanjit S. Jutla
The Complexity of Tree Automata and Logics of Programs (Extended Abstract) [Citation Graph (2, 0)][DBLP] FOCS, 1988, pp:328-337 [Conf]
- Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic
IBM Comments. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:333-336 [Conf]
- E. Allen Emerson, Charanjit S. Jutla, A. Prasad Sistla
On Model-Checking for Fragments of µ-Calculus. [Citation Graph (0, 0)][DBLP] CAV, 1993, pp:385-396 [Conf]
- Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, Pankaj Rohatgi
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. [Citation Graph (0, 0)][DBLP] CHES, 2001, pp:171-184 [Conf]
- Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi
Towards Sound Approaches to Counteract Power-Analysis Attacks. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:398-412 [Conf]
- Don Coppersmith, Shai Halevi, Charanjit S. Jutla
Cryptanalysis of Stream Ciphers with Linear Masking. [Citation Graph (0, 0)][DBLP] CRYPTO, 2002, pp:515-532 [Conf]
- Charanjit S. Jutla
Generalized Birthday Arracks on Unbalanced Feistel Networks. [Citation Graph (0, 0)][DBLP] CRYPTO, 1998, pp:186-199 [Conf]
- Charanjit S. Jutla
Encryption Modes with Almost Free Message Integrity. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:529-544 [Conf]
- Charanjit S. Jutla
On Finding Small Solutions of Modular Multivariate Polynomial Equations. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:158-170 [Conf]
- E. Allen Emerson, Charanjit S. Jutla
Tree Automata, Mu-Calculus and Determinacy (Extended Abstract) [Citation Graph (0, 0)][DBLP] FOCS, 1991, pp:368-377 [Conf]
- Charanjit S. Jutla, Anindya C. Patthak, Atri Rudra, David Zuckerman
Testing Low-Degree Polynomials over Prime Fields. [Citation Graph (0, 0)][DBLP] FOCS, 2004, pp:423-432 [Conf]
- Shai Halevi, Don Coppersmith, Charanjit S. Jutla
Scream: A Software-Efficient Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:195-209 [Conf]
- E. Allen Emerson, Charanjit S. Jutla
On Simultaneously Determinizing and Complementing omega-Automata (Extended Abstract) [Citation Graph (0, 0)][DBLP] LICS, 1989, pp:333-342 [Conf]
- Charanjit S. Jutla, Edgar Knapp, Josyula R. Rao
A Predicate Transformer Approach to Semantics of Parallel Programs. [Citation Graph (0, 0)][DBLP] PODC, 1989, pp:249-263 [Conf]
- Charanjit S. Jutla
Lower Bound on Linear Authenticated Encryption. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2003, pp:348-360 [Conf]
- W. Eric Hall, Charanjit S. Jutla
Parallelizable Authentication Trees. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2005, pp:95-109 [Conf]
- Charanjit S. Jutla
PRF Domain Extension Using DAGs. [Citation Graph (0, 0)][DBLP] TCC, 2006, pp:561-580 [Conf]
- Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin
Secure Distributed Storage and Retrieval. [Citation Graph (0, 0)][DBLP] WDAG, 1997, pp:275-289 [Conf]
- Charanjit S. Jutla, Josyula R. Rao
A Methodology for Designing Proof Rules for Fair Parallel Programs. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 1997, v:9, n:4, pp:359-378 [Journal]
- Charanjit S. Jutla
Determinization and Memoryless Winning Strategies. [Citation Graph (0, 0)][DBLP] Inf. Comput., 1997, v:133, n:2, pp:117-134 [Journal]
- Daniel M. Yellin, Charanjit S. Jutla
Finding Extremal Sets in Less than Quadratic Time. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1993, v:48, n:1, pp:29-34 [Journal]
- E. Allen Emerson, Charanjit S. Jutla
The Complexity of Tree Automata and Logics of Programs. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1999, v:29, n:1, pp:132-158 [Journal]
- E. Allen Emerson, Charanjit S. Jutla, A. Prasad Sistla
On model checking for the µ-calculus and its fragments. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2001, v:258, n:1-2, pp:491-522 [Journal]
- Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin
Secure distributed storage and retrieval. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2000, v:243, n:1-2, pp:363-389 [Journal]
- Charanjit S. Jutla, Anindya C. Patthak
Provably Good Codes for Hash Function Design. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2006, pp:376-393 [Conf]
Almost Optimal Bounds for Direct Product Threshold Theorem. [Citation Graph (, )][DBLP]
A Simple Biased Distribution for Dinur's Construction. [Citation Graph (, )][DBLP]
Search in 0.045secs, Finished in 0.046secs
|