The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Charanjit S. Jutla: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. E. Allen Emerson, Charanjit S. Jutla
    The Complexity of Tree Automata and Logics of Programs (Extended Abstract) [Citation Graph (2, 0)][DBLP]
    FOCS, 1988, pp:328-337 [Conf]
  2. Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic
    IBM Comments. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:333-336 [Conf]
  3. E. Allen Emerson, Charanjit S. Jutla, A. Prasad Sistla
    On Model-Checking for Fragments of µ-Calculus. [Citation Graph (0, 0)][DBLP]
    CAV, 1993, pp:385-396 [Conf]
  4. Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, Pankaj Rohatgi
    Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:171-184 [Conf]
  5. Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi
    Towards Sound Approaches to Counteract Power-Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:398-412 [Conf]
  6. Don Coppersmith, Shai Halevi, Charanjit S. Jutla
    Cryptanalysis of Stream Ciphers with Linear Masking. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:515-532 [Conf]
  7. Charanjit S. Jutla
    Generalized Birthday Arracks on Unbalanced Feistel Networks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:186-199 [Conf]
  8. Charanjit S. Jutla
    Encryption Modes with Almost Free Message Integrity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:529-544 [Conf]
  9. Charanjit S. Jutla
    On Finding Small Solutions of Modular Multivariate Polynomial Equations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:158-170 [Conf]
  10. E. Allen Emerson, Charanjit S. Jutla
    Tree Automata, Mu-Calculus and Determinacy (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1991, pp:368-377 [Conf]
  11. Charanjit S. Jutla, Anindya C. Patthak, Atri Rudra, David Zuckerman
    Testing Low-Degree Polynomials over Prime Fields. [Citation Graph (0, 0)][DBLP]
    FOCS, 2004, pp:423-432 [Conf]
  12. Shai Halevi, Don Coppersmith, Charanjit S. Jutla
    Scream: A Software-Efficient Stream Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:195-209 [Conf]
  13. E. Allen Emerson, Charanjit S. Jutla
    On Simultaneously Determinizing and Complementing omega-Automata (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    LICS, 1989, pp:333-342 [Conf]
  14. Charanjit S. Jutla, Edgar Knapp, Josyula R. Rao
    A Predicate Transformer Approach to Semantics of Parallel Programs. [Citation Graph (0, 0)][DBLP]
    PODC, 1989, pp:249-263 [Conf]
  15. Charanjit S. Jutla
    Lower Bound on Linear Authenticated Encryption. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:348-360 [Conf]
  16. W. Eric Hall, Charanjit S. Jutla
    Parallelizable Authentication Trees. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:95-109 [Conf]
  17. Charanjit S. Jutla
    PRF Domain Extension Using DAGs. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:561-580 [Conf]
  18. Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin
    Secure Distributed Storage and Retrieval. [Citation Graph (0, 0)][DBLP]
    WDAG, 1997, pp:275-289 [Conf]
  19. Charanjit S. Jutla, Josyula R. Rao
    A Methodology for Designing Proof Rules for Fair Parallel Programs. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1997, v:9, n:4, pp:359-378 [Journal]
  20. Charanjit S. Jutla
    Determinization and Memoryless Winning Strategies. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1997, v:133, n:2, pp:117-134 [Journal]
  21. Daniel M. Yellin, Charanjit S. Jutla
    Finding Extremal Sets in Less than Quadratic Time. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1993, v:48, n:1, pp:29-34 [Journal]
  22. E. Allen Emerson, Charanjit S. Jutla
    The Complexity of Tree Automata and Logics of Programs. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1999, v:29, n:1, pp:132-158 [Journal]
  23. E. Allen Emerson, Charanjit S. Jutla, A. Prasad Sistla
    On model checking for the µ-calculus and its fragments. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:258, n:1-2, pp:491-522 [Journal]
  24. Juan A. Garay, Rosario Gennaro, Charanjit S. Jutla, Tal Rabin
    Secure distributed storage and retrieval. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:243, n:1-2, pp:363-389 [Journal]
  25. Charanjit S. Jutla, Anindya C. Patthak
    Provably Good Codes for Hash Function Design. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:376-393 [Conf]

  26. Almost Optimal Bounds for Direct Product Threshold Theorem. [Citation Graph (, )][DBLP]


  27. A Simple Biased Distribution for Dinur's Construction. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002