Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Pankaj Rohatgi
@article{DBLP:journals/iacr/SaabRH16, author = {Sami Saab and Pankaj Rohatgi and Craig Hampel}, title = {Side-Channel Protections for Cryptographic Instruction Set Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {700}, year = {2016}, url = {http://eprint.iacr.org/2016/700}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SaabRH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2013, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08302-5}, doi = {10.1007/978-3-319-08302-5}, isbn = {978-3-319-08301-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KocherJJR11, author = {Paul C. Kocher and Joshua Jaffe and Benjamin Jun and Pankaj Rohatgi}, title = {Introduction to differential power analysis}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {5--27}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0006-y}, doi = {10.1007/S13389-011-0006-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KocherJJR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/ChariDKPRRRSST10, author = {Suresh Chari and Vincenzo V. Diluoffo and Paul A. Karger and Elaine R. Palmer and Tal Rabin and Josyula R. Rao and Pankaj Rohatgi and Helmut Scherzer and Michael Steiner and David C. Toll}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {Designing a Side Channel Resistant Random Number Generator}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {49--64}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_5}, doi = {10.1007/978-3-642-12510-2\_5}, timestamp = {Sat, 30 May 2020 20:05:42 +0200}, biburl = {https://dblp.org/rec/conf/cardis/ChariDKPRRRSST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/NiLCRB09, author = {Qun Ni and Jorge Lobo and Seraphin B. Calo and Pankaj Rohatgi and Elisa Bertino}, editor = {Barbara Carminati and James Joshi}, title = {Automating role-based provisioning by learning from examples}, booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, pages = {75--84}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207.1542222}, doi = {10.1145/1542207.1542222}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/NiLCRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/FokoueSRWY09, author = {Achille Fokoue and Mudhakar Srivatsa and Pankaj Rohatgi and Peter Wrobel and John Yesberg}, editor = {Barbara Carminati and James Joshi}, title = {A decision support system for secure information sharing}, booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, pages = {105--114}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207.1542226}, doi = {10.1145/1542207.1542226}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/FokoueSRWY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Rohatgi09, author = {Pankaj Rohatgi}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Improved Techniques for Side-Channel Analysis}, booktitle = {Cryptographic Engineering}, pages = {381--406}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_14}, doi = {10.1007/978-0-387-71817-0\_14}, timestamp = {Tue, 26 Jun 2018 16:12:55 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Rohatgi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Rohatgi09a, author = {Pankaj Rohatgi}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Electromagnetic Attacks and Countermeasures}, booktitle = {Cryptographic Engineering}, pages = {407--430}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_15}, doi = {10.1007/978-0-387-71817-0\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Rohatgi09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SrivatsaBPR08, author = {Mudhakar Srivatsa and Shane Balfe and Kenneth G. Paterson and Pankaj Rohatgi}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Trust management for secure information flows}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {175--188}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455794}, doi = {10.1145/1455770.1455794}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SrivatsaBPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/LimCCR08, author = {Yow Tzu Lim and Pau{-}Chen Cheng and John Andrew Clark and Pankaj Rohatgi}, title = {Policy evolution with Genetic Programming: {A} comparison of three approaches}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2008, June 1-6, 2008, Hong Kong, China}, pages = {1792--1800}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CEC.2008.4631032}, doi = {10.1109/CEC.2008.4631032}, timestamp = {Thu, 16 Dec 2021 14:01:33 +0100}, biburl = {https://dblp.org/rec/conf/cec/LimCCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/LimCRC08, author = {Yow Tzu Lim and Pau{-}Chen Cheng and Pankaj Rohatgi and John Andrew Clark}, editor = {Conor Ryan and Maarten Keijzer}, title = {{MLS} security policy evolution with genetic programming}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008}, pages = {1571--1578}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389095.1389395}, doi = {10.1145/1389095.1389395}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/LimCRC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/SrivatsaRBR08, author = {Mudhakar Srivatsa and Pankaj Rohatgi and Shane Balfe and Steffen Reidt}, title = {Securing information flows: {A} metadata framework}, booktitle = {{IEEE} 5th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2008, 29 September - 2 October 2008, Atlanta, Georgia, {USA}}, pages = {748--753}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MAHSS.2008.4660114}, doi = {10.1109/MAHSS.2008.4660114}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/SrivatsaRBR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MolloyCR08, author = {Ian M. Molloy and Pau{-}Chen Cheng and Pankaj Rohatgi}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {Trading in risk: using markets to improve access control}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {107--125}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595694}, doi = {10.1145/1595676.1595694}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MolloyCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seal/LimCCR08, author = {Yow Tzu Lim and Pau{-}Chen Cheng and John Andrew Clark and Pankaj Rohatgi}, editor = {Xiaodong Li and Michael Kirley and Mengjie Zhang and David G. Green and Victor Ciesielski and Hussein A. Abbass and Zbigniew Michalewicz and Tim Hendtlass and Kalyanmoy Deb and Kay Chen Tan and J{\"{u}}rgen Branke and Yuhui Shi}, title = {Policy Evolution with Grammatical Evolution}, booktitle = {Simulated Evolution and Learning, 7th International Conference, {SEAL} 2008, Melbourne, Australia, December 7-10, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5361}, pages = {71--80}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89694-4\_8}, doi = {10.1007/978-3-540-89694-4\_8}, timestamp = {Tue, 16 Feb 2021 15:53:52 +0100}, biburl = {https://dblp.org/rec/conf/seal/LimCCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2008, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3}, doi = {10.1007/978-3-540-85053-3}, isbn = {978-3-540-85052-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/ZhangMRG07, author = {Xiaolan Zhang and Suzanne McIntosh and Pankaj Rohatgi and John Linwood Griffin}, editor = {Renato Cerqueira and Roy H. Campbell}, title = {XenSocket: {A} High-Throughput Interdomain Transport for Virtual Machines}, booktitle = {Middleware 2007, {ACM/IFIP/USENIX} 8th International Middleware Conference, Newport Beach, CA, USA, November 26-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4834}, pages = {184--203}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76778-7\_10}, doi = {10.1007/978-3-540-76778-7\_10}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/middleware/ZhangMRG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChengRKKWR07, author = {Pau{-}Chen Cheng and Pankaj Rohatgi and Claudia Keser and Paul A. Karger and Grant M. Wagner and Angela Schuett Reninger}, title = {Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {222--230}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.21}, doi = {10.1109/SP.2007.21}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChengRKKWR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AgrawalBKRS07, author = {Dakshi Agrawal and Sel{\c{c}}uk Baktir and Deniz Karakoyunlu and Pankaj Rohatgi and Berk Sunar}, title = {Trojan Detection using {IC} Fingerprinting}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {296--310}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.36}, doi = {10.1109/SP.2007.36}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AgrawalBKRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AgrawalRRS05, author = {Dakshi Agrawal and Josyula R. Rao and Pankaj Rohatgi and Kai Schramm}, editor = {Josyula R. Rao and Berk Sunar}, title = {Templates as Master Keys}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {15--29}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_2}, doi = {10.1007/11545262\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/AgrawalRRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/ReiterR04, author = {Michael K. Reiter and Pankaj Rohatgi}, title = {Homeland Security}, journal = {{IEEE} Internet Comput.}, volume = {8}, number = {6}, pages = {16--17}, year = {2004}, url = {https://doi.org/10.1109/MIC.2004.62}, doi = {10.1109/MIC.2004.62}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/ReiterR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AgrawalRR03, author = {Dakshi Agrawal and Josyula R. Rao and Pankaj Rohatgi}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Multi-channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {2--16}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_2}, doi = {10.1007/978-3-540-45238-6\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/AgrawalRR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChariRR02, author = {Suresh Chari and Josyula R. Rao and Pankaj Rohatgi}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Template Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {13--28}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_3}, doi = {10.1007/3-540-36400-5\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/ChariRR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AgrawalARR02, author = {Dakshi Agrawal and Bruce Archambeault and Josyula R. Rao and Pankaj Rohatgi}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {The {EM} Side-Channel(s)}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {29--45}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_4}, doi = {10.1007/3-540-36400-5\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/AgrawalARR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RaoRST02, author = {Josyula R. Rao and Pankaj Rohatgi and Helmut Scherzer and St{\'{e}}phane Tinguely}, title = {Partitioning Attacks: Or How to Rapidly Clone Some {GSM} Cards}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {31--41}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004360}, doi = {10.1109/SECPRI.2002.1004360}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/RaoRST02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/GennaroR01, author = {Rosario Gennaro and Pankaj Rohatgi}, title = {How to Sign Digital Streams}, journal = {Inf. Comput.}, volume = {165}, number = {1}, pages = {100--116}, year = {2001}, url = {https://doi.org/10.1006/inco.2000.2916}, doi = {10.1006/INCO.2000.2916}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/GennaroR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RudraDJKRR01, author = {Atri Rudra and Pradeep K. Dubey and Charanjit S. Jutla and Vijay Kumar and Josyula R. Rao and Pankaj Rohatgi}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Efficient Rijndael Encryption Implementation with Composite Field Arithmetic}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {171--184}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_16}, doi = {10.1007/3-540-44709-1\_16}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/RudraDJKRR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaoR01, author = {Josyula R. Rao and Pankaj Rohatgi}, title = {EMpowering Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2001}, url = {http://eprint.iacr.org/2001/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RaoR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ChariRS00, author = {Suresh Chari and Pankaj Rohatgi and Aravind Srinivasan}, title = {Improved Algorithms via Approximations of Probability Distributions}, journal = {J. Comput. Syst. Sci.}, volume = {61}, number = {1}, pages = {81--107}, year = {2000}, url = {https://doi.org/10.1006/jcss.1999.1695}, doi = {10.1006/JCSS.1999.1695}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/ChariRS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issac/GuptaRA00, author = {Anshul Gupta and Pankaj Rohatgi and Ramesh C. Agarwal}, editor = {Carlo Traverso}, title = {Fast practical algorithms for the Boolean-product-witness-matrix problem}, booktitle = {Proceedings of the 2000 International Symposium on Symbolic and Algebraic Computation, {ISSAC} 2000, St. Andrews, United Kingdom, August 6-10, 2000}, pages = {146--152}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/345542.345611}, doi = {10.1145/345542.345611}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issac/GuptaRA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CanettiCGPRRS00, author = {Ran Canetti and Pau{-}Chen Cheng and Frederique Giraud and Dimitrios E. Pendarakis and Josyula R. Rao and Pankaj Rohatgi and Debanjan Saha}, title = {An IPSec-based Host Architecture for Secure Internet Multicast}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2000, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2000}, url = {https://www.ndss-symposium.org/ndss2000/ipsec-based-host-architecture-secure-internet-multicast-paper/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CanettiCGPRRS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RaoR00, author = {Josyula R. Rao and Pankaj Rohatgi}, editor = {Steven M. Bellovin and Greg Rose}, title = {Can Pseudonymity Really Guarantee Privacy?}, booktitle = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17, 2000}, publisher = {{USENIX} Association}, year = {2000}, url = {https://www.usenix.org/conference/9th-usenix-security-symposium/can-pseudonymity-really-guarantee-privacy}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/RaoR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/MoyerRR99, author = {Matthew J. Moyer and Josyula R. Rao and Pankaj Rohatgi}, title = {A survey of security issues in multicast communications}, journal = {{IEEE} Netw.}, volume = {13}, number = {6}, pages = {12--23}, year = {1999}, url = {https://doi.org/10.1109/65.806981}, doi = {10.1109/65.806981}, timestamp = {Thu, 01 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/MoyerRR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Rohatgi99, author = {Pankaj Rohatgi}, editor = {Juzar Motiwalla and Gene Tsudik}, title = {A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication}, booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and Communications Security, Singapore, November 1-4, 1999}, pages = {93--100}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/319709.319722}, doi = {10.1145/319709.319722}, timestamp = {Tue, 10 Nov 2020 20:00:25 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Rohatgi99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChariJRR99, author = {Suresh Chari and Charanjit S. Jutla and Josyula R. Rao and Pankaj Rohatgi}, editor = {Michael J. Wiener}, title = {Towards Sound Approaches to Counteract Power-Analysis Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {398--412}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_26}, doi = {10.1007/3-540-48405-1\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChariJRR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GennaroR97, author = {Rosario Gennaro and Pankaj Rohatgi}, editor = {Burton S. Kaliski Jr.}, title = {How to Sign Digital Streams}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {180--197}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052235}, doi = {10.1007/BFB0052235}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GennaroR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ChariR96, author = {Suresh Chari and Pankaj Rohatgi}, title = {On Completeness Under Random Reductions}, journal = {J. Comput. Syst. Sci.}, volume = {53}, number = {3}, pages = {545--555}, year = {1996}, url = {https://doi.org/10.1006/jcss.1996.0086}, doi = {10.1006/JCSS.1996.0086}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/ChariR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ChangKR95, author = {Richard Chang and Jim Kadin and Pankaj Rohatgi}, title = {On Unique Satisfiability and the Threshold Behavior of Randomized Reductions}, journal = {J. Comput. Syst. Sci.}, volume = {50}, number = {3}, pages = {359--373}, year = {1995}, url = {https://doi.org/10.1006/jcss.1995.1028}, doi = {10.1006/JCSS.1995.1028}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/ChangKR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/Rohatgi95, author = {Pankaj Rohatgi}, title = {Saving Queries with Randomness}, journal = {J. Comput. Syst. Sci.}, volume = {50}, number = {3}, pages = {476--492}, year = {1995}, url = {https://doi.org/10.1006/jcss.1995.1038}, doi = {10.1006/JCSS.1995.1038}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/Rohatgi95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/ChariRS95, author = {Suresh Chari and Pankaj Rohatgi and Aravind Srinivasan}, title = {Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems}, journal = {{SIAM} J. Comput.}, volume = {24}, number = {5}, pages = {1036--1050}, year = {1995}, url = {https://doi.org/10.1137/S0097539793250330}, doi = {10.1137/S0097539793250330}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/ChariRS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Rohatgi94, author = {Pankaj Rohatgi}, title = {On Properties of Random Reductions}, school = {Cornell University, {USA}}, year = {1994}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Rohatgi94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ChangCGHHRR94, author = {Richard Chang and Benny Chor and Oded Goldreich and Juris Hartmanis and Johan H{\aa}stad and Desh Ranjan and Pankaj Rohatgi}, title = {The Random Oracle Hypothesis Is False}, journal = {J. Comput. Syst. Sci.}, volume = {49}, number = {1}, pages = {24--39}, year = {1994}, url = {https://doi.org/10.1016/S0022-0000(05)80084-4}, doi = {10.1016/S0022-0000(05)80084-4}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/ChangCGHHRR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ChariRS94, author = {Suresh Chari and Pankaj Rohatgi and Aravind Srinivasan}, editor = {Frank Thomson Leighton and Michael T. Goodrich}, title = {Improved algorithms via approximations of probability distributions (extended abstract)}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {584--592}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/195058.195411}, doi = {10.1145/195058.195411}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/ChariRS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/RanjanCR93, author = {Desh Ranjan and Suresh Chari and Pankaj Rohatgi}, title = {Improving Known Solutions is Hard}, journal = {Comput. Complex.}, volume = {3}, pages = {168--185}, year = {1993}, url = {https://doi.org/10.1007/BF01200119}, doi = {10.1007/BF01200119}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cc/RanjanCR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/ChariR93, author = {Suresh Chari and Pankaj Rohatgi}, title = {On Completeness under Random Reductions}, booktitle = {Proceedings of the Eigth Annual Structure in Complexity Theory Conference, San Diego, CA, USA, May 18-21, 1993}, pages = {176--184}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/SCT.1993.336529}, doi = {10.1109/SCT.1993.336529}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/ChariR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ChariRS93, author = {Suresh Chari and Pankaj Rohatgi and Aravind Srinivasan}, editor = {S. Rao Kosaraju and David S. Johnson and Alok Aggarwal}, title = {Randomness-optimal unique element isolation, with applications to perfect matching and related problems}, booktitle = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of Computing, May 16-18, 1993, San Diego, CA, {USA}}, pages = {458--467}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/167088.167213}, doi = {10.1145/167088.167213}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/ChariRS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/wsscs/HartmanisCRR93, author = {Juris Hartmanis and Richard Chang and Desh Ranjan and Pankaj Rohatgi}, editor = {Grzegorz Rozenberg and Arto Salomaa}, title = {On {IP} = {PSPACE} and Theorems with Narrow Proofs}, booktitle = {Current Trends in Theoretical Computer Science - Essays and Tutorials}, series = {World Scientific Series in Computer Science}, volume = {40}, pages = {484--493}, publisher = {World Scientific}, year = {1993}, url = {https://doi.org/10.1142/9789812794499\_0036}, doi = {10.1142/9789812794499\_0036}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/wsscs/HartmanisCRR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/wsscs/ChangR93, author = {Richard Chang and Pankaj Rohatgi}, editor = {Grzegorz Rozenberg and Arto Salomaa}, title = {On Unique Satisfiability and Randomized Reductions}, booktitle = {Current Trends in Theoretical Computer Science - Essays and Tutorials}, series = {World Scientific Series in Computer Science}, volume = {40}, pages = {494--503}, publisher = {World Scientific}, year = {1993}, url = {https://doi.org/10.1142/9789812794499\_0037}, doi = {10.1142/9789812794499\_0037}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/wsscs/ChangR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/wsscs/HartmanisCCRR93, author = {Juris Hartmanis and Richard Chang and Suresh Chari and Desh Ranjan and Pankaj Rohatgi}, editor = {Grzegorz Rozenberg and Arto Salomaa}, title = {Relativization: a Revisionistic Retrospective}, booktitle = {Current Trends in Theoretical Computer Science - Essays and Tutorials}, series = {World Scientific Series in Computer Science}, volume = {40}, pages = {537--548}, publisher = {World Scientific}, year = {1993}, url = {https://doi.org/10.1142/9789812794499\_0040}, doi = {10.1142/9789812794499\_0040}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/wsscs/HartmanisCCRR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eatcs/ChangCRR92, author = {Richard Chang and Suresh Chari and Desh Ranjan and Pankaj Rohatgi}, title = {Relativization: a revisionistic retrospective}, journal = {Bull. {EATCS}}, volume = {47}, pages = {144--153}, year = {1992}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eatcs/ChangCRR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/Rohatgi92, author = {Pankaj Rohatgi}, title = {Saving Queries with Randomness}, booktitle = {Proceedings of the Seventh Annual Structure in Complexity Theory Conference, Boston, Massachusetts, USA, June 22-25, 1992}, pages = {71--83}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/SCT.1992.215382}, doi = {10.1109/SCT.1992.215382}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/Rohatgi92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/RanjanR92, author = {Desh Ranjan and Pankaj Rohatgi}, title = {On Randomized Reductions to Sparse Sets}, booktitle = {Proceedings of the Seventh Annual Structure in Complexity Theory Conference, Boston, Massachusetts, USA, June 22-25, 1992}, pages = {239--242}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/SCT.1992.215397}, doi = {10.1109/SCT.1992.215397}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/RanjanR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/ChariRR92, author = {Suresh Chari and Desh Ranjan and Pankaj Rohatgi}, editor = {Ivan M. Havel and V{\'{a}}clav Koubek}, title = {On the Complexity of Incremental Computation}, booktitle = {Mathematical Foundations of Computer Science 1992, 17th International Symposium, MFCS'92, Prague, Czechoslovakia, August 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {629}, pages = {172--180}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55808-X\_15}, doi = {10.1007/3-540-55808-X\_15}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/ChariRR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/ChangKR91, author = {Richard Chang and Jim Kadin and Pankaj Rohatgi}, title = {Connections between the Complexity of Unique Satisfiability and the Threshold Behavior of Randomized Reductions}, booktitle = {Proceedings of the Sixth Annual Structure in Complexity Theory Conference, Chicago, Illinois, USA, June 30 - July 3, 1991}, pages = {255--269}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/SCT.1991.160268}, doi = {10.1109/SCT.1991.160268}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/ChangKR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/RanjanCR91, author = {Desh Ranjan and Suresh Chari and Pankaj Rohatgi}, editor = {Javier Leach Albert and Burkhard Monien and Mario Rodr{\'{\i}}guez{-}Artalejo}, title = {Improving Known Solutions is Hard}, booktitle = {Automata, Languages and Programming, 18th International Colloquium, ICALP91, Madrid, Spain, July 8-12, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {510}, pages = {381--392}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54233-7\_149}, doi = {10.1007/3-540-54233-7\_149}, timestamp = {Fri, 17 Jul 2020 16:12:48 +0200}, biburl = {https://dblp.org/rec/conf/icalp/RanjanCR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eatcs/HartmanisCRR90, author = {Juris Hartmanis and Richard Chang and Desh Ranjan and Pankaj Rohatgi}, title = {On Unique Staisfiability and Randomized Reductions}, journal = {Bull. {EATCS}}, volume = {41}, pages = {166--174}, year = {1990}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eatcs/HartmanisCRR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eatcs/ChangR90, author = {Richard Chang and Pankaj Rohatgi}, title = {On Unique Staisfiability and Randomized Reductions}, journal = {Bull. {EATCS}}, volume = {42}, pages = {151--159}, year = {1990}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eatcs/ChangR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/swat/HartmanisCRR90, author = {Juris Hartmanis and Richard Chang and Desh Ranjan and Pankaj Rohatgi}, editor = {John R. Gilbert and Rolf G. Karlsson}, title = {Structural Complexity Theory: recent Surprises}, booktitle = {{SWAT} 90, 2nd Scandinavian Workshop on Algorithm Theory, Bergen, Norway, July 11-14, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {447}, pages = {1--12}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-52846-6\_73}, doi = {10.1007/3-540-52846-6\_73}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/swat/HartmanisCRR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.