|
Search the dblp DataBase
Josyula R. Rao:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi
The EM Side-Channel(s). [Citation Graph (0, 0)][DBLP] CHES, 2002, pp:29-45 [Conf]
- Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
Multi-channel Attacks. [Citation Graph (0, 0)][DBLP] CHES, 2003, pp:2-16 [Conf]
- Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm
Templates as Master Keys. [Citation Graph (0, 0)][DBLP] CHES, 2005, pp:15-29 [Conf]
- Suresh Chari, Josyula R. Rao, Pankaj Rohatgi
Template Attacks. [Citation Graph (0, 0)][DBLP] CHES, 2002, pp:13-28 [Conf]
- Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, Pankaj Rohatgi
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. [Citation Graph (0, 0)][DBLP] CHES, 2001, pp:171-184 [Conf]
- Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi
Towards Sound Approaches to Counteract Power-Analysis Attacks. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:398-412 [Conf]
- Josyula R. Rao
Eventual determinism: using probabilistic means to achieve deterministic ends. [Citation Graph (0, 0)][DBLP] HICSS (2), 1995, pp:29-38 [Conf]
- Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha
An IPSec-based Host Architecture for Secure Internet Multicast. [Citation Graph (0, 0)][DBLP] NDSS, 2000, pp:- [Conf]
- Josyula R. Rao
Reasoning About Probabilistic Algorithms. [Citation Graph (0, 0)][DBLP] PODC, 1990, pp:247-264 [Conf]
- Charanjit S. Jutla, Edgar Knapp, Josyula R. Rao
A Predicate Transformer Approach to Semantics of Parallel Programs. [Citation Graph (0, 0)][DBLP] PODC, 1989, pp:249-263 [Conf]
- Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stephane Tinguely
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2002, pp:31-0 [Conf]
- Rangachari Anand, Nayeem Islam, Trent Jaeger, Josyula R. Rao
A Flexible Security Model for Using Internet Content. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1997, pp:89-96 [Conf]
- Joshua S. Auerbach, Arthur P. Goldberg, Germán S. Goldszmidt, Ajei S. Gopal, Mark T. Kennedy, Josyula R. Rao, James R. Russell
Concert/C: A Language for Distributed Programming. [Citation Graph (0, 0)][DBLP] USENIX Winter, 1994, pp:79-96 [Conf]
- Charanjit S. Jutla, Josyula R. Rao
A Methodology for Designing Proof Rules for Fair Parallel Programs. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 1997, v:9, n:4, pp:359-378 [Journal]
- Josyula R. Rao
On the role of formal methods in security. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2001, v:77, n:2-4, pp:209-212 [Journal]
- Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao
A Flexible Security System for Using Internet Content. [Citation Graph (0, 0)][DBLP] IEEE Software, 1997, v:14, n:5, pp:52-59 [Journal]
- Josyula R. Rao
Reasoning about Probabilistic Parallel Programs. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 1994, v:16, n:3, pp:798-842 [Journal]
Designing a Side Channel Resistant Random Number Generator. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|