Sanjit Chatterjee, M. Prem Laxman Das, Tapas Pandit."Revisiting the Security of Salted UOV Signature", INDOCRYPT 2022(14 December 2022)
Abhishek Kunal, E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography" In Cybernetics and Information Technologies, Volume 21, No 2, pp. 70-88., June 2021. DOI: 10.2478/cait-2021-0020
T.R.Reshmi, "Information Security breaches due to ransomware attacks - a systematic literature review", International Journal for Information Management data Insights, no. 2 (2021): 100013
T. R. Reshmi, M. Azath, “Improved self-healing technique for 5G networks using predictive analysis” Peer-to-Peer Networking and Applications volume14, pp.375–391(January, 2021)
Prachi Sarode, T. R. Reshmi & Venkatasubbu Pattabiraman, “ Combination of Fitness-Mated Lion Algorithm with Neural Network for Optimal Query Ordering Data Aggregation Model in WSN”, Wireless Personal Communications volume 116, pp.513-538(January,2021)
"Cryptography and Society", R Balasubramanian, M Prem Laxman Das, Proceedings of the Indian National Science Academy, 86 No. 4 (December, 2020) pp. 1447-1459
Varun Satheesh and Dillibabu Shanmugam, "Implementation Vulnerability Analysis: A Case Study on ChaCha of SPHINCS", IEEE-iSES 2020( December, 2020)
Lakshmi Devi Kuppusamy, Sivappriya Manivannan, Sarat Chandra Babu N, "TRAP-GATE: A Probabilistic Approach to Enhance Hardware Trojan Detection and its Game Theoretic Analysis" , Journal of Electronic Testing: Theory and Applications, Volume 36, Number 5, pp.607-616. (October, 2020)
Yehoshuva C, Adhithan RR, Anandakumar NN. A Survey of Security Attacks on Silicon Based Weak PUF Architectures. InSecurity in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers (p. 107). Springer Nature.
Anandakumar NN, Sanadhya SK, Hashmi MS. Design, Implementation and Analysis of Efficient Hardware-based Security Primitives,IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC) (October, 2020), (pp. 198-199).
Varun Satheesh, Dillibabu Shanmugam, “Implementation vulnerability analysis: A case of chacha SPHINCS”, Proceedings of IEEE International Symposium on Smart Electronic Systems 2020 (IEEE-iSES).
Nagulapati Giri and N. NallaAnandakumar, “Design and Analysis of Hardware Trojan Threats in Reconfigurable Hardware”, ic-ETITE 2020, IEEE, pp. 1-5 (February, 2020)
Dillibabu Shanmugam, Suganya Annadurai, Vijayasarathy Rajagopaplan, Venkatesh Prasad T, "Denial of Service Detection System on various platforms", IEEE (53rd) International Carnahan Conference on Security Technology ,pp. 1-12 (October, 2019)
K.Venkatesh, K.Pratibha, Suganya Annadurai, Lakshmi Kuppusamy, "Reconfigurable architecture to speed up modular exponentiation", IEEE (53rd) International Carnahan Conference on Security Technology , pp. 1-6 (October, 2019)
Kunal Abhishek, Dr. George Dharma Prakash Raj, “Operating Sytem Security”, a Short Note, IEEE India Info, volume 14,No. 2, pp 157-159 (April – June, 2019)
N. NallaAnandakumar, SomitraKumar Sanadhya, and Mohammad S. Hashmi, “FPGA-Based True Random Number Generation Using Programmable Delays in Oscillator-Rings". IEEE Transactions Circuits and systems, volume 67, number 3, pp.570-574 (May, 2019)
Kunal Abhishek, “Elliptic Curve Cryptography based Certification”, IEEE India Council Newsletter volume 14, No.1(Jan-Mar, 2019)
N. Nalla Anandakumar, M. S. Hashmi and Somitra K. Sanadhya, “FPGA-Based True Random Number Generation Using Programmable Delays in Oscillator-Rings". IEEE Transactions Circuits and Systems, 2019
Jothi Ramalingam and Lakshmi Devi, "Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation," in INDOCRYPT 2018, Pages 3-20.
Dillibabu Shanmugam and Suganya Annadurai, "Crypto Primitives IPCore Implementation susceptibility in Cyber Physical System," in IEEE International Symposium on Smart Electronic Systems (IEEE-iSES) 2018.
Osmanbey Uzunkol, Jothi Ramalingam and Lakshmi Devi. “Hide the Modulus, a secure non-interactive fully verifiable delegation scheme for modular exponentiation via CRT in “21st international conference on ISC-2018”, Springer-2018.
N. Nalla Anandakumar, M. Prem Laxman Das, Somitra K. Sanadhya and M.S. Hashmi. “Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve” in “ACM Transactions on Reconfigurable Technology and Systems (TRETS)”, Vol. 11, No. 2, August 2018.
Sanjit Chatterjee, M. Prem Laxman Das and R. Kabaleeshwaran: Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis, Journal of Mathematical Cryptology, 2018.
Sivapriya Manivannan, N. Nalla Anandakumar and M. Nirmala Devi "Key Retrieval from AES Architecture through Hardware Trojan Horse" in 6th international conference on SSCC-2018, India, Springer-2018.
Varsha Satheesh, Dillibabu Shanmugam: Secure Implementation of light weight cipher: A case study on GIST cipher. 8th International Conference on SPACE 2018, India, Springer.
N. Nalla Anandakumar, Mohammad S. Hasmi, Somitra Kumar Sanadhya, “Compact Implementations of FPGA-based PUFs with Enhanced Performance" in 30th International Conference on VLSI Design 2017, India, Jan 7 – 11, pp. 69–86, IEEE Computer Society.
Jothi Rangasamy, Lakshmi Kuppusamy, Gopikrishnan and Velmurugan. Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services, Int. J. Information and Computer Security (IJICS), Vol. 9, Nos. 1/2, pp.114-129. 2017.
M Prem Laxman Das, Jothi Rangasamy and R Kabaleeshwaran. Refined Shacham-Waters ring signature scheme in Seo-Cheon framework. Journal of Security and Communication Networks, Vol. 9, Issue 13, pages 2122-2134. 2016.
Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy, Decomposed S-boxes and DPA attacks: A quantitative case study using PRINCE, in 6th International Conference, SPACE-2016, Hyderabad, India, December 14-18, 2016.Volume 10076 of Lecture Notes in Computer Science, pages 179--193. Springer 2016.
Lakshmi Kuppusamy and Jothi Rangasamy. CRT-based Outsourcing Algorithms for Modular Exponentiations. In Orr Dunkelman and Somitra Kumar Sanadhya, editors, Proc. 17th International Conference on Cryptology in India-INDOCRYPT 2016, Volume 10095 of LNCS, pages 81--98. Springer, 2016.
Sanjit Chatterjee, M.Prem Laxman Das, Property Preserving Symmetric Encryption Revisited, in proceedings 21st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2015. Volume 9453 of Lecture Notes in Computer Science, pages 658-682.
Dillibabu Shanmugam, Suganya Annadurai, A Secure Implementation of Stream Cipher: Trivium, in 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12 2015. Volume 9522 of Lecture Notes in Computer Science, pages 253-266. Springer 2015.
N. Nalla Anandakumar, SCA Resistance Analysis on FPGA Implementations of Sponge Based MAC-PHOTON. In 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12 2015. Volume 9522 of LNCS, pages 69-86. Springer 2015.
Ravikumar Selvam, Dillibabu Shanmugam and Suganya Annadurai, A Vulnerability Analysis of PRINCE and RECTANGLE using CPA, in Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCSS 2015, Singapore, Republic of Singapore, April 14 - 16, 2015. ACM 2015, ISBN 978-1-4503-3448-8 p 81-87.
Lakshmi Kuppusamy and Jothi Rangasamy. Improved Cryptographic Puzzle Based on Modular Exponentiation. In Ram N. Mohapatra, Dipanwita Roy Chowdhury, and Debasis Giri, editors, Mathematics and Computing, volume 139 of Springer Proceedings in Mathematics and Statistics, pages 107--121. Springer India, 2015.
Lakshmi Kuppusamy, Jothi Rangasamy and Praveen Gauravaram. On Secure Outsourcing of Cryptographic Computations to Cloud. In Robert H. Deng, Elaine Shi and Kui Ren, editors, Proceedings of the 2014 International workshop on Security in cloud computing, SCC@AsiaCCS 2014, pages 63--68. ACM, 2014.
Dillibabu Shanmugam , Ravikumar Selvam and Suganya Annadurai, A Differential Power Analysis Attack on SIMON and LED block ciphers,in 4th International Conference on SPACE-2014, Pune, India, October 18-22, 2014.Volume 8804 of Lecture Notes in Computer Science, pages 110--125. Springer 2014.
N.Nalla Anandakumar, Thomas Peyrin and Axel Y. Poschmann. A Very Compact FPGA Implementation of LED and PHOTON" in Progress in Cryptology – INDOCRYPT 2014 – 15th International Conference on Cryptology in India, Springer, 2014, pp. 304–321.
Juan Gonzalez Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy and Douglas Stebila. Publicly Verifiable Ciphertexts. Journal of Computer Security, Vol. 21(5), pp. 749--778. IOS Press, 2013.
N.Nalla Anandakumar and S. Dillibabu. Correlation Power Analysis Attack of AES on FPGA Using Customized Communication Protocol in Second International Conference on CCSEIT'2012, India, Oct 26-28, Pages 683-688, ACM-2012.
G.Dinesh Babu, N.Nalla Anandakumar, and D. Muralidharan. “Countermeasures against DPA attacks on FPGA implementation of AES". International Journal of Information Technology, vol.5, pp. 186-192, Science Alert, 2012.
R.Panneerselvam, Suganya Annadurai, N.Nalla Anandakumar, and R.Muthaiah, An efficient implementation of rolling array based Stream cipher in FPGA, in proceeding of International Conference on Embedded and Cloud Computing, ICECC-2012, Science Alert.
Juan Gonzalez Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy and Douglas Stebila. Publicly Verifiable Ciphertexts. In Ivan Visconti and Roberto De Prisco, editors, Proc. 8th Conference on Security and Cryptography for Networks, SCN-2012, volume 7485 of LNCS, pages 393-410. Springer, 2012.
Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Gonzalez Nieto, and Lakshmi Kuppusamy. Effort Release Public-Key Encryption from Cryptographic Puzzles. Proc. 17th Australasian Conference on Information Security and Privacy (ACISP 2012), volume 7372 of LNCS, pages 194-207. Springer, 2012.
Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, and Juanma Gonzalez Nieto. Practical client puzzles in the standard model. In 7th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2012), volume 7259 of LNCS, pages 319-331. ACM, 2012.
N.Nalla Anandakumar and Suganya Annadurai, Design and Optimized Implementation of Six- Operand Single Precision Floating-Point Addition. In proceeding of International Conference on Advancements in Information Technology (ICAIT'2011), India, December 17-18, 2011. Volume 20 ACM 2011.
Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Gonzalez Nieto and Lakshmi Kuppusamy. Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection. In 14th International Conference on Information Security and Cryptology (ICISC 2011), volume 7259 of LNCS, pages 319-331. Springer, 2011.
Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, and Juanma Gonzalez Nieto. Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy. In Proc. 12th International Conference on Cryptology in India (INDOCRYPT 2011), volume 7107 of LNCS, pages 379-398. Springer, 2011.
Jothi Rangasamy, Douglas Stebila, Colin Boyd, and Juan Gonzalez Nieto. An Integrated Approach to Cryptographic Mitigation of Denial-of-Service Attacks. In 6th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2011), pages 114-123. ACM, 2011.
Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, and Juan Gonzalez Nieto. Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Aggelos Kiayias, editor, Proc. The Cryptographers Track at the RSA Conference 2011 (CT-RSA 2011), volume 6558 of LNCS, pages 284-301. Springer, 2011.
Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai, An Update on the Analysis and Design of NMAC and HMAC Functions, in Int. Journal of Network Security, Volume 7, No.1, pages 49-60, July 2008.
Suganya Annadurai and N.Vijayarangan, Landau-Ramanujan Keyed Hash Functions for Message Authentication, Journal of Discrete Mathematical Sciences and Cryptology, Volume 9 (2006), No.1. pages 1-8, 2006.
Natarajan V and M Prem Laxman Das, Aggregation of Tokenized Signature Scheme and Its Applications, QCRYPT2022(August, 2022)
Varun Satheesh and Dillibabu Shanmugam “Securing Post-Quantum Signature - SPHINCS” , SPACE2019 (December, 2019)
Dillibabu Shanmugam and Jothi Ramalingam, “Robust message authentication in the context of Quantum Key Distribution(QKD)” ,SPACE2019 (December, 2019)
Sanjit Chatterjee, M. Prem Laxman Das, Tapas Pandit."Revisiting the Security of Salted UOV Signature", INDOCRYPT 2022(14 December 2022)
Abhishek Kunal, E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography" In Cybernetics and Information Technologies, Volume 21, No 2, pp. 70-88., June 2021. DOI: 10.2478/cait-2021-0020
T.R.Reshmi, "Information Security breaches due to ransomware attacks - a systematic literature review", International Journal for Information Management data Insights, no. 2 (2021): 100013
T. R. Reshmi, M. Azath, “Improved self-healing technique for 5G networks using predictive analysis” Peer-to-Peer Networking and Applications volume14, pp.375–391(January, 2021)
Prachi Sarode, T. R. Reshmi & Venkatasubbu Pattabiraman, “ Combination of Fitness-Mated Lion Algorithm with Neural Network for Optimal Query Ordering Data Aggregation Model in WSN”, Wireless Personal Communications volume 116, pp.513-538(January,2021)
"Cryptography and Society", R Balasubramanian, M Prem Laxman Das, Proceedings of the Indian National Science Academy, 86 No. 4 (December, 2020) pp. 1447-1459
Varun Satheesh and Dillibabu Shanmugam, "Implementation Vulnerability Analysis: A Case Study on ChaCha of SPHINCS", IEEE-iSES 2020( December, 2020)
Lakshmi Devi Kuppusamy, Sivappriya Manivannan, Sarat Chandra Babu N, "TRAP-GATE: A Probabilistic Approach to Enhance Hardware Trojan Detection and its Game Theoretic Analysis" , Journal of Electronic Testing: Theory and Applications, Volume 36, Number 5, pp.607-616. (October, 2020)
Yehoshuva C, Adhithan RR, Anandakumar NN. A Survey of Security Attacks on Silicon Based Weak PUF Architectures. InSecurity in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers (p. 107). Springer Nature.
Anandakumar NN, Sanadhya SK, Hashmi MS. Design, Implementation and Analysis of Efficient Hardware-based Security Primitives,IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC) (October, 2020), (pp. 198-199).
Varun Satheesh, Dillibabu Shanmugam, “Implementation vulnerability analysis: A case of chacha SPHINCS”, Proceedings of IEEE International Symposium on Smart Electronic Systems 2020 (IEEE-iSES).
Nagulapati Giri and N. NallaAnandakumar, “Design and Analysis of Hardware Trojan Threats in Reconfigurable Hardware”, ic-ETITE 2020, IEEE, pp. 1-5 (February, 2020)
Dillibabu Shanmugam, Suganya Annadurai, Vijayasarathy Rajagopaplan, Venkatesh Prasad T, "Denial of Service Detection System on various platforms", IEEE (53rd) International Carnahan Conference on Security Technology ,pp. 1-12 (October, 2019)
K.Venkatesh, K.Pratibha, Suganya Annadurai, Lakshmi Kuppusamy, "Reconfigurable architecture to speed up modular exponentiation", IEEE (53rd) International Carnahan Conference on Security Technology , pp. 1-6 (October, 2019)
Kunal Abhishek, Dr. George Dharma Prakash Raj, “Operating Sytem Security”, a Short Note, IEEE India Info, volume 14,No. 2, pp 157-159 (April – June, 2019)
N. NallaAnandakumar, SomitraKumar Sanadhya, and Mohammad S. Hashmi, “FPGA-Based True Random Number Generation Using Programmable Delays in Oscillator-Rings". IEEE Transactions Circuits and systems, volume 67, number 3, pp.570-574 (May, 2019)
Kunal Abhishek, “Elliptic Curve Cryptography based Certification”, IEEE India Council Newsletter volume 14, No.1(Jan-Mar, 2019)
N. Nalla Anandakumar, M. S. Hashmi and Somitra K. Sanadhya, “FPGA-Based True Random Number Generation Using Programmable Delays in Oscillator-Rings". IEEE Transactions Circuits and Systems, 2019
Jothi Ramalingam and Lakshmi Devi, "Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation," in INDOCRYPT 2018, Pages 3-20.
Dillibabu Shanmugam and Suganya Annadurai, "Crypto Primitives IPCore Implementation susceptibility in Cyber Physical System," in IEEE International Symposium on Smart Electronic Systems (IEEE-iSES) 2018.
Osmanbey Uzunkol, Jothi Ramalingam and Lakshmi Devi. “Hide the Modulus, a secure non-interactive fully verifiable delegation scheme for modular exponentiation via CRT in “21st international conference on ISC-2018”, Springer-2018.
N. Nalla Anandakumar, M. Prem Laxman Das, Somitra K. Sanadhya and M.S. Hashmi. “Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve” in “ACM Transactions on Reconfigurable Technology and Systems (TRETS)”, Vol. 11, No. 2, August 2018.
Sanjit Chatterjee, M. Prem Laxman Das and R. Kabaleeshwaran: Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis, Journal of Mathematical Cryptology, 2018.
Sivapriya Manivannan, N. Nalla Anandakumar and M. Nirmala Devi "Key Retrieval from AES Architecture through Hardware Trojan Horse" in 6th international conference on SSCC-2018, India, Springer-2018.
Varsha Satheesh, Dillibabu Shanmugam: Secure Implementation of light weight cipher: A case study on GIST cipher. 8th International Conference on SPACE 2018, India, Springer.
N. Nalla Anandakumar, Mohammad S. Hasmi, Somitra Kumar Sanadhya, “Compact Implementations of FPGA-based PUFs with Enhanced Performance" in 30th International Conference on VLSI Design 2017, India, Jan 7 – 11, pp. 69–86, IEEE Computer Society.
Jothi Rangasamy, Lakshmi Kuppusamy, Gopikrishnan and Velmurugan. Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services, Int. J. Information and Computer Security (IJICS), Vol. 9, Nos. 1/2, pp.114-129. 2017.
M Prem Laxman Das, Jothi Rangasamy and R Kabaleeshwaran. Refined Shacham-Waters ring signature scheme in Seo-Cheon framework. Journal of Security and Communication Networks, Vol. 9, Issue 13, pages 2122-2134. 2016.
Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy, Decomposed S-boxes and DPA attacks: A quantitative case study using PRINCE, in 6th International Conference, SPACE-2016, Hyderabad, India, December 14-18, 2016.Volume 10076 of Lecture Notes in Computer Science, pages 179--193. Springer 2016.
Lakshmi Kuppusamy and Jothi Rangasamy. CRT-based Outsourcing Algorithms for Modular Exponentiations. In Orr Dunkelman and Somitra Kumar Sanadhya, editors, Proc. 17th International Conference on Cryptology in India-INDOCRYPT 2016, Volume 10095 of LNCS, pages 81--98. Springer, 2016.
Sanjit Chatterjee, M.Prem Laxman Das, Property Preserving Symmetric Encryption Revisited, in proceedings 21st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2015. Volume 9453 of Lecture Notes in Computer Science, pages 658-682.
Dillibabu Shanmugam, Suganya Annadurai, A Secure Implementation of Stream Cipher: Trivium, in 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12 2015. Volume 9522 of Lecture Notes in Computer Science, pages 253-266. Springer 2015.
N. Nalla Anandakumar, SCA Resistance Analysis on FPGA Implementations of Sponge Based MAC-PHOTON. In 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12 2015. Volume 9522 of LNCS, pages 69-86. Springer 2015.
Ravikumar Selvam, Dillibabu Shanmugam and Suganya Annadurai, A Vulnerability Analysis of PRINCE and RECTANGLE using CPA, in Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCSS 2015, Singapore, Republic of Singapore, April 14 - 16, 2015. ACM 2015, ISBN 978-1-4503-3448-8 p 81-87.
Lakshmi Kuppusamy and Jothi Rangasamy. Improved Cryptographic Puzzle Based on Modular Exponentiation. In Ram N. Mohapatra, Dipanwita Roy Chowdhury, and Debasis Giri, editors, Mathematics and Computing, volume 139 of Springer Proceedings in Mathematics and Statistics, pages 107--121. Springer India, 2015.
Lakshmi Kuppusamy, Jothi Rangasamy and Praveen Gauravaram. On Secure Outsourcing of Cryptographic Computations to Cloud. In Robert H. Deng, Elaine Shi and Kui Ren, editors, Proceedings of the 2014 International workshop on Security in cloud computing, SCC@AsiaCCS 2014, pages 63--68. ACM, 2014.
Dillibabu Shanmugam , Ravikumar Selvam and Suganya Annadurai, A Differential Power Analysis Attack on SIMON and LED block ciphers,in 4th International Conference on SPACE-2014, Pune, India, October 18-22, 2014.Volume 8804 of Lecture Notes in Computer Science, pages 110--125. Springer 2014.
N.Nalla Anandakumar, Thomas Peyrin and Axel Y. Poschmann. A Very Compact FPGA Implementation of LED and PHOTON" in Progress in Cryptology – INDOCRYPT 2014 – 15th International Conference on Cryptology in India, Springer, 2014, pp. 304–321.
Juan Gonzalez Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy and Douglas Stebila. Publicly Verifiable Ciphertexts. Journal of Computer Security, Vol. 21(5), pp. 749--778. IOS Press, 2013.
N.Nalla Anandakumar and S. Dillibabu. Correlation Power Analysis Attack of AES on FPGA Using Customized Communication Protocol in Second International Conference on CCSEIT'2012, India, Oct 26-28, Pages 683-688, ACM-2012.
G.Dinesh Babu, N.Nalla Anandakumar, and D. Muralidharan. “Countermeasures against DPA attacks on FPGA implementation of AES". International Journal of Information Technology, vol.5, pp. 186-192, Science Alert, 2012.
R.Panneerselvam, Suganya Annadurai, N.Nalla Anandakumar, and R.Muthaiah, An efficient implementation of rolling array based Stream cipher in FPGA, in proceeding of International Conference on Embedded and Cloud Computing, ICECC-2012, Science Alert.
Juan Gonzalez Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy and Douglas Stebila. Publicly Verifiable Ciphertexts. In Ivan Visconti and Roberto De Prisco, editors, Proc. 8th Conference on Security and Cryptography for Networks, SCN-2012, volume 7485 of LNCS, pages 393-410. Springer, 2012.
Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Gonzalez Nieto, and Lakshmi Kuppusamy. Effort Release Public-Key Encryption from Cryptographic Puzzles. Proc. 17th Australasian Conference on Information Security and Privacy (ACISP 2012), volume 7372 of LNCS, pages 194-207. Springer, 2012.
Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, and Juanma Gonzalez Nieto. Practical client puzzles in the standard model. In 7th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2012), volume 7259 of LNCS, pages 319-331. ACM, 2012.
N.Nalla Anandakumar and Suganya Annadurai, Design and Optimized Implementation of Six- Operand Single Precision Floating-Point Addition. In proceeding of International Conference on Advancements in Information Technology (ICAIT'2011), India, December 17-18, 2011. Volume 20 ACM 2011.
Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Gonzalez Nieto and Lakshmi Kuppusamy. Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection. In 14th International Conference on Information Security and Cryptology (ICISC 2011), volume 7259 of LNCS, pages 319-331. Springer, 2011.
Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, and Juanma Gonzalez Nieto. Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy. In Proc. 12th International Conference on Cryptology in India (INDOCRYPT 2011), volume 7107 of LNCS, pages 379-398. Springer, 2011.
Jothi Rangasamy, Douglas Stebila, Colin Boyd, and Juan Gonzalez Nieto. An Integrated Approach to Cryptographic Mitigation of Denial-of-Service Attacks. In 6th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2011), pages 114-123. ACM, 2011.
Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, and Juan Gonzalez Nieto. Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Aggelos Kiayias, editor, Proc. The Cryptographers Track at the RSA Conference 2011 (CT-RSA 2011), volume 6558 of LNCS, pages 284-301. Springer, 2011.
Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai, An Update on the Analysis and Design of NMAC and HMAC Functions, in Int. Journal of Network Security, Volume 7, No.1, pages 49-60, July 2008.
Suganya Annadurai and N.Vijayarangan, Landau-Ramanujan Keyed Hash Functions for Message Authentication, Journal of Discrete Mathematical Sciences and Cryptology, Volume 9 (2006), No.1. pages 1-8, 2006.
Copyright 2018 © SETS | ALL Rights Reserved | Last Updated: Friday, 22-Feb, 2019.
Copyright 2018 © SETS | ALL Rights Reserved | Last Updated: Friday, 22-Feb, 2019