default search action
S. Sree Vivek
Person information
- affiliation: Samsung R&D Institute, Bangalore, India
- affiliation: Indian Institute of Technology Madras (IITM), Chennai, Theoretical Computer Science Laboratory
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i32]S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan:
Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption. IACR Cryptol. ePrint Arch. 2023: 931 (2023) - 2022
- [j8]Sandeep Kiran Pinjala, S. Sree Vivek, Krishna M. Sivalingam:
Delegated Anonymous Credentials With Revocation Capability for IoT Service Chains (DANCIS). IEEE Internet Things J. 9(5): 3729-3742 (2022)
2010 – 2019
- 2018
- [j7]S. Sree Vivek, Rajkumar Ramasamy, Praveen George, Bharat S. Rawal Kshatriya:
Dynamic Verifiable Encrypted Keyword Search - Using Bitmap Index. J. Signal Process. Syst. 90(8-9): 1151-1165 (2018) - 2017
- [c33]Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya:
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC. CSCloud 2017: 357-362 - [c32]Bharat S. Rawal, S. Sree Vivek:
Secure Cloud Storage and File Sharing. SmartCloud 2017: 78-83 - [i31]Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya:
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC. IACR Cryptol. ePrint Arch. 2017: 676 (2017) - 2016
- [j6]S. Sree Vivek, S. Sharmila Deva Selvi, Pallavi Chandrasekar, C. Pandu Rangan:
Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives. J. Internet Serv. Inf. Secur. 6(4): 35-53 (2016) - [j5]Sree Vivek Sivanandam, S. Sharmila Deva Selvi, Akshayaram Srinivasan, Chandrasekaran Pandu Rangan:
Stronger public key encryption system withstanding RAM scraper like attacks. Secur. Commun. Networks 9(12): 1650-1662 (2016) - [c31]Bharat S. Rawal, Harsha K. Kalutarage, S. Sree Vivek, Kamlendu Pandey:
The Disintegration Protocol: An Ultimate Technique for Cloud Data Security. SmartCloud 2016: 27-34 - 2015
- [c30]S. Sree Vivek, Rajkumar Ramasamy:
Forward Secure On-device Encryption Scheme Withstanding Cold Boot Attack. CSCloud 2015: 488-493 - [c29]S. Sree Vivek:
Stateful Certificateless Public Key Encryption with Application in Public Cloud. SECITC 2015: 130-149 - [c28]S. Sree Vivek, Guhan Balasubramanian:
Controlled Proxy Re-signing - Conditional Proxy Re-Signatures. SECRYPT 2015: 186-193 - [c27]S. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra, C. Pandu Rangan:
Practical IBE Secure under CBDH - Encrypting Without Pairing. SECRYPT 2015: 251-258 - 2013
- [j4]S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan:
Efficient Certificateless Online/Offline Signature with tight security. J. Internet Serv. Inf. Secur. 3(1/2): 115-137 (2013) - [c26]S. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan:
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round. ProvSec 2013: 38-58 - [i30]Karthik Abinav, Saikrishna Badrinarayanan, C. Pandu Rangan, S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan:
A Revocable Online-Offline Certificateless Signature Scheme without Pairing. IACR Cryptol. ePrint Arch. 2013: 758 (2013) - 2012
- [j3]S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan:
Efficient Certificateless Online/Offline Signature. J. Internet Serv. Inf. Secur. 2(3/4): 77-92 (2012) - [j2]S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan:
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 46-60 (2012) - [j1]S. Sree Vivek, S. Sharmila Deva Selvi, Salini Selvaraj Kowsalya, C. Pandu Rangan:
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 72-84 (2012) - [c25]S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan:
Group key establishment (GKE): Two/three party key exchange to GKE. IEEE ANTS 2012: 61-66 - [c24]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures. ACISP 2012: 280-293 - [c23]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
Compact Stateful Encryption Schemes with Ciphertext Verifiability. IWSEC 2012: 87-104 - [c22]S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:
ID Based Signcryption Scheme in Standard Model. ProvSec 2012: 35-52 - [c21]S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan:
Identity based partial aggregate signature scheme without pairing. Sarnoff Symposium 2012: 1-6 - [i29]S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan:
Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model. IACR Cryptol. ePrint Arch. 2012: 80 (2012) - [i28]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks. IACR Cryptol. ePrint Arch. 2012: 118 (2012) - [i27]S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:
ID Based Signcryption Scheme in Standard Model. IACR Cryptol. ePrint Arch. 2012: 392 (2012) - 2011
- [c20]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Online/Offline Encryption and Signcryption Schemes Revisited. InfoSecHiComNet 2011: 111-127 - [c19]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity-Based Deterministic Signature Scheme without Forking-Lemma. IWSEC 2011: 79-95 - [c18]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
CCA Secure Certificateless Encryption Schemes based on RSA. SECRYPT 2011: 208-217 - [i26]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Deterministic Signature Scheme Without Forking-Lemma. IACR Cryptol. ePrint Arch. 2011: 217 (2011) - [i25]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
Compact CCA-Secure Encryption with Ciphertext Verifiability. IACR Cryptol. ePrint Arch. 2011: 361 (2011) - [i24]S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:
On the Security of ID Based Signcryption Schemes. IACR Cryptol. ePrint Arch. 2011: 664 (2011) - [i23]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures. IACR Cryptol. ePrint Arch. 2011: 695 (2011) - 2010
- [c17]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Certificateless KEM and Hybrid Signcryption Schemes Revisited. ISPEC 2010: 294-307 - [c16]S. Sharmila Deva Selvi, S. Sree Vivek, Chandrasekaran Pandu Rangan, S. Priti:
On the Security of Identity Based Threshold Unsigncryption Schemes. NSS 2010: 554-559 - [c15]S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan:
Identity Based Self Delegated Signature - Self Proxy Signatures. NSS 2010: 568-573 - [c14]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Public Verifiable Signcryption Scheme. ProvSec 2010: 244-260 - [c13]S. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan:
An Identity based Ring Signcryption Scheme with Public Verifiability. SECRYPT 2010: 362-371 - [i22]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Security Weaknesses in Two Certificateless Signcryption Schemes. IACR Cryptol. ePrint Arch. 2010: 92 (2010) - [i21]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Online/Offline Encryption Scheme. IACR Cryptol. ePrint Arch. 2010: 178 (2010) - [i20]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Public Verifiable Signcryption Scheme. IACR Cryptol. ePrint Arch. 2010: 343 (2010) - [i19]S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan:
Identity Based Self Delegated Signature - Self Proxy Signatures. IACR Cryptol. ePrint Arch. 2010: 359 (2010) - [i18]S. Sharmila Deva Selvi, S. Sree Vivek, S. Priti, C. Pandu Rangan:
On the Security of Identity Based Threshold Unsigncryption Schemes. IACR Cryptol. ePrint Arch. 2010: 360 (2010) - [i17]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Online/Offline Signcryption Scheme. IACR Cryptol. ePrint Arch. 2010: 376 (2010) - [i16]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
CCA2 Secure Certificateless Encryption Schemes Based on RSA. IACR Cryptol. ePrint Arch. 2010: 459 (2010) - [i15]S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan:
Identity Based Partial Aggregate Signature Scheme Without Pairing. IACR Cryptol. ePrint Arch. 2010: 461 (2010)
2000 – 2009
- 2009
- [c12]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing. Inscrypt 2009: 75-92 - [c11]S. Sharmila Deva Selvi, S. Sree Vivek, Shilpi Nayak, C. Pandu Rangan:
Breaking and Building of Threshold Signcryption Schemes. Inscrypt 2009: 108-123 - [c10]S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan:
Identity Based Aggregate Signcryption Schemes. INDOCRYPT 2009: 378-397 - [c9]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
On the Security of Identity Based Ring Signcryption Schemes. ISC 2009: 310-325 - [c8]S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan:
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. IWSEC 2009: 71-88 - [c7]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. ProvSec 2009: 61-75 - [c6]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
On the Security of Two Ring Signcryption Schemes. SECRYPT 2009: 219-224 - [c5]S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan:
Breaking and Building of Group Inside Signature. SecureComm 2009: 330-339 - [i14]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES. IACR Cryptol. ePrint Arch. 2009: 52 (2009) - [i13]S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan:
Scalable Compilers for Group Key Establishment : Two/Three Party to Group. IACR Cryptol. ePrint Arch. 2009: 115 (2009) - [i12]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
On the security of Identity Based Ring Signcryption Schemes. IACR Cryptol. ePrint Arch. 2009: 144 (2009) - [i11]S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan:
Breaking and Building of Group Inside Signature. IACR Cryptol. ePrint Arch. 2009: 188 (2009) - [i10]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. IACR Cryptol. ePrint Arch. 2009: 235 (2009) - [i9]S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan:
Security Analysis of Aggregate signature and Batch verification signature schemes. IACR Cryptol. ePrint Arch. 2009: 290 (2009) - [i8]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing. IACR Cryptol. ePrint Arch. 2009: 298 (2009) - [i7]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
A note on the Certificateless Multi-receiver Signcryption Scheme. IACR Cryptol. ePrint Arch. 2009: 308 (2009) - [i6]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Certificateless KEM and Hybrid Signcryption Schemes Revisited. IACR Cryptol. ePrint Arch. 2009: 462 (2009) - 2008
- [c4]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, Neha Jain:
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. EUC (2) 2008: 127-132 - [c3]S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan:
Efficient and Provably Secure Certificateless Multi-receiver Signcryption. ProvSec 2008: 52-67 - [c2]S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan:
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. PST 2008: 109-120 - [c1]S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan:
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. WISA 2008: 115-129 - [i5]S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan:
Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. IACR Cryptol. ePrint Arch. 2008: 225 (2008) - [i4]S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan:
On the Provable Security of Multi-Receiver Signcryption Schemes. IACR Cryptol. ePrint Arch. 2008: 238 (2008) - [i3]S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan:
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks. IACR Cryptol. ePrint Arch. 2008: 247 (2008) - [i2]S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, C. Pandu Rangan:
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. IACR Cryptol. ePrint Arch. 2008: 341 (2008) - [i1]S. Sharmila Deva Selvi, S. Sree Vivek, Neha Jain, C. Pandu Rangan:
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. IACR Cryptol. ePrint Arch. 2008: 342 (2008)
Coauthor Index
aka: Chandrasekaran Pandu Rangan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint