|
Search the dblp DataBase
Sarvar Patel:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:599-613 [Conf]
- Mark Etzel, Sarvar Patel, Zulfikar Ramzan
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:234-251 [Conf]
- Sarvar Patel, Ganapathy S. Sundaram
An Efficient Discrete Log Pseudo Random Generator. [Citation Graph (0, 0)][DBLP] CRYPTO, 1998, pp:304-317 [Conf]
- Philip D. MacKenzie, Sarvar Patel
Hard Bits of the Discrete Log with Applications to Password Authentication. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:209-226 [Conf]
- Victor Boyko, Philip D. MacKenzie, Sarvar Patel
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2000, pp:156-171 [Conf]
- Daniel Bleichenbacher, Sarvar Patel
SOBER Crytanalysis. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1999, pp:305-316 [Conf]
- Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
Towards Making Luby-Rackoff Ciphers Optimal and Practical. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1999, pp:171-185 [Conf]
- Niranjan Joshi, Srinivas R. Kadaba, Sarvar Patel, Ganapathy S. Sundaram
Downlink scheduling in CDMA data networks. [Citation Graph (0, 0)][DBLP] MOBICOM, 2000, pp:179-190 [Conf]
- Sarvar Patel
An Efficient MAC for Short Messages. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2002, pp:353-368 [Conf]
- Sarvar Patel
Over the Air Service Provisioning. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:174-189 [Conf]
- Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2002, pp:271-290 [Conf]
- Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
Efficient Constructions of Variable-Input-Length Block Ciphers. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2004, pp:326-340 [Conf]
- Sarvar Patel
Number Theoretic Attacks on Secure Password Schemes. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:236-247 [Conf]
- Uri Blumenthal, Milind M. Buddhikot, Juan A. Garay, Scott C. Miller, Sarvar Patel, Luca Salgarelli, Dorothy Stanley
A scheme for authentication and dynamic key exchange in wireless networks. [Citation Graph (0, 0)][DBLP] Bell Labs Technical Journal, 2002, v:7, n:2, pp:37-48 [Journal]
- Uri Blumenthal, Michael Marcovici, Semyon Mizikovsky, Sarvar Patel, Ganapathy S. Sundaram, Marcus Wong
Wireless network security architecture. [Citation Graph (0, 0)][DBLP] Bell Labs Technical Journal, 2002, v:7, n:2, pp:19-36 [Journal]
- Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
Security for wireless internet access. [Citation Graph (0, 0)][DBLP] Bell Labs Technical Journal, 2001, v:6, n:2, pp:74-83 [Journal]
Search in 0.035secs, Finished in 0.036secs
|