The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Pankaj Rohatgi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pankaj Rohatgi
    A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:93-100 [Conf]
  2. Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi
    The EM Side-Channel(s). [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:29-45 [Conf]
  3. Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
    Multi-channel Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:2-16 [Conf]
  4. Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm
    Templates as Master Keys. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:15-29 [Conf]
  5. Suresh Chari, Josyula R. Rao, Pankaj Rohatgi
    Template Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:13-28 [Conf]
  6. Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, Pankaj Rohatgi
    Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:171-184 [Conf]
  7. Richard Chang, Jim Kadin, Pankaj Rohatgi
    Connections between the Complexity of Unique Satisfiability and the Threshold Behavior of Randomized Reductions. [Citation Graph (0, 0)][DBLP]
    Structure in Complexity Theory Conference, 1991, pp:255-269 [Conf]
  8. Suresh Chari, Pankaj Rohatgi
    On Completeness under Random Reductions. [Citation Graph (0, 0)][DBLP]
    Structure in Complexity Theory Conference, 1993, pp:176-184 [Conf]
  9. Desh Ranjan, Pankaj Rohatgi
    On Randomized Reductions to Sparse Sets. [Citation Graph (0, 0)][DBLP]
    Structure in Complexity Theory Conference, 1992, pp:239-242 [Conf]
  10. Pankaj Rohatgi
    Saving Queries with Randomness. [Citation Graph (0, 0)][DBLP]
    Structure in Complexity Theory Conference, 1992, pp:71-83 [Conf]
  11. Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi
    Towards Sound Approaches to Counteract Power-Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:398-412 [Conf]
  12. Rosario Gennaro, Pankaj Rohatgi
    How to Sign Digital Streams. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:180-197 [Conf]
  13. Desh Ranjan, Suresh Chari, Pankaj Rohatgi
    Improving Known Solutions is Hard. [Citation Graph (0, 0)][DBLP]
    ICALP, 1991, pp:381-392 [Conf]
  14. Anshul Gupta, Pankaj Rohatgi, Ramesh C. Agarwal
    Fast practical algorithms for the Boolean-product-witness-matrix problem. [Citation Graph (0, 0)][DBLP]
    ISSAC, 2000, pp:146-152 [Conf]
  15. Suresh Chari, Desh Ranjan, Pankaj Rohatgi
    On the Complexity of Incremental Computation. [Citation Graph (0, 0)][DBLP]
    MFCS, 1992, pp:172-180 [Conf]
  16. Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha
    An IPSec-based Host Architecture for Secure Internet Multicast. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  17. Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stephane Tinguely
    Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:31-0 [Conf]
  18. Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar
    Trojan Detection using IC Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:296-310 [Conf]
  19. Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger
    Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:222-230 [Conf]
  20. Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan
    Randomness-optimal unique element isolation, with applications to perfect matching and related problems. [Citation Graph (0, 0)][DBLP]
    STOC, 1993, pp:458-467 [Conf]
  21. Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan
    Improved algorithms via approximations of probability distributions (extended abstract). [Citation Graph (0, 0)][DBLP]
    STOC, 1994, pp:584-592 [Conf]
  22. Juris Hartmanis, Richard Chang, Desh Ranjan, Pankaj Rohatgi
    Structural Complexity Theory: recent Surprises. [Citation Graph (0, 0)][DBLP]
    SWAT, 1990, pp:1-12 [Conf]
  23. Desh Ranjan, Suresh Chari, Pankaj Rohatgi
    Improving Known Solutions is Hard. [Citation Graph (0, 0)][DBLP]
    Computational Complexity, 1993, v:3, n:, pp:168-185 [Journal]
  24. Richard Chang, Suresh Chari, Desh Ranjan, Pankaj Rohatgi
    Relativization: a revisionistic retrospective. [Citation Graph (0, 0)][DBLP]
    Bulletin of the EATCS, 1992, v:47, n:, pp:144-153 [Journal]
  25. Richard Chang, Pankaj Rohatgi
    On Unique Staisfiability and Randomized Reductions. [Citation Graph (0, 0)][DBLP]
    Bulletin of the EATCS, 1990, v:42, n:, pp:151-159 [Journal]
  26. Juris Hartmanis, Richard Chang, Desh Ranjan, Pankaj Rohatgi
    On Unique Staisfiability and Randomized Reductions. [Citation Graph (0, 0)][DBLP]
    Bulletin of the EATCS, 1990, v:41, n:, pp:166-174 [Journal]
  27. Rosario Gennaro, Pankaj Rohatgi
    How to Sign Digital Streams. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:165, n:1, pp:100-116 [Journal]
  28. Michael K. Reiter, Pankaj Rohatgi
    Homeland Security. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2004, v:8, n:6, pp:16-17 [Journal]
  29. Richard Chang, Benny Chor, Oded Goldreich, Juris Hartmanis, Johan Håstad, Desh Ranjan, Pankaj Rohatgi
    The Random Oracle Hypothesis Is False. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1994, v:49, n:1, pp:24-39 [Journal]
  30. Richard Chang, Jim Kadin, Pankaj Rohatgi
    On Unique Satisfiability and the Threshold Behavior of Randomized Reductions. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1995, v:50, n:3, pp:359-373 [Journal]
  31. Suresh Chari, Pankaj Rohatgi
    On Completeness Under Random Reductions. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1996, v:53, n:3, pp:545-555 [Journal]
  32. Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan
    Improved Algorithms via Approximations of Probability Distributions. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2000, v:61, n:1, pp:81-107 [Journal]
  33. Pankaj Rohatgi
    Saving Queries with Randomness. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1995, v:50, n:3, pp:476-492 [Journal]
  34. Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan
    Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1995, v:24, n:5, pp:1036-1050 [Journal]
  35. Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, John Linwood Griffin
    XenSocket: A High-Throughput Interdomain Transport for Virtual Machines. [Citation Graph (0, 0)][DBLP]
    Middleware, 2007, pp:184-203 [Conf]

  36. Designing a Side Channel Resistant Random Number Generator. [Citation Graph (, )][DBLP]


  37. Trust management for secure information flows. [Citation Graph (, )][DBLP]


  38. MLS security policy evolution with genetic programming. [Citation Graph (, )][DBLP]


  39. A decision support system for secure information sharing. [Citation Graph (, )][DBLP]


  40. Automating role-based provisioning by learning from examples. [Citation Graph (, )][DBLP]


  41. Policy Evolution with Grammatical Evolution. [Citation Graph (, )][DBLP]


  42. Policy evolution with Genetic Programming: A comparison of three approaches. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002