default search action
Pankaj Rohatgi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [i2]Sami Saab, Pankaj Rohatgi, Craig Hampel:
Side-Channel Protections for Cryptographic Instruction Set Extensions. IACR Cryptol. ePrint Arch. 2016: 700 (2016) - 2014
- [e2]Aurélien Francillon, Pankaj Rohatgi:
Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8419, Springer 2014, ISBN 978-3-319-08301-8 [contents] - 2011
- [j14]Paul C. Kocher, Joshua Jaffe, Benjamin Jun, Pankaj Rohatgi:
Introduction to differential power analysis. J. Cryptogr. Eng. 1(1): 5-27 (2011) - 2010
- [c33]Suresh Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin, Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David C. Toll:
Designing a Side Channel Resistant Random Number Generator. CARDIS 2010: 49-64
2000 – 2009
- 2009
- [c32]Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohatgi, Elisa Bertino:
Automating role-based provisioning by learning from examples. SACMAT 2009: 75-84 - [c31]Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, Peter Wrobel, John Yesberg:
A decision support system for secure information sharing. SACMAT 2009: 105-114 - [p5]Pankaj Rohatgi:
Improved Techniques for Side-Channel Analysis. Cryptographic Engineering 2009: 381-406 - [p4]Pankaj Rohatgi:
Electromagnetic Attacks and Countermeasures. Cryptographic Engineering 2009: 407-430 - 2008
- [c30]Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterson, Pankaj Rohatgi:
Trust management for secure information flows. CCS 2008: 175-188 - [c29]Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pankaj Rohatgi:
Policy evolution with Genetic Programming: A comparison of three approaches. IEEE Congress on Evolutionary Computation 2008: 1792-1800 - [c28]Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John Andrew Clark:
MLS security policy evolution with genetic programming. GECCO 2008: 1571-1578 - [c27]Mudhakar Srivatsa, Pankaj Rohatgi, Shane Balfe, Steffen Reidt:
Securing information flows: A metadata framework. MASS 2008: 748-753 - [c26]Ian M. Molloy, Pau-Chen Cheng, Pankaj Rohatgi:
Trading in risk: using markets to improve access control. NSPW 2008: 107-125 - [c25]Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pankaj Rohatgi:
Policy Evolution with Grammatical Evolution. SEAL 2008: 71-80 - [e1]Elisabeth Oswald, Pankaj Rohatgi:
Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Lecture Notes in Computer Science 5154, Springer 2008, ISBN 978-3-540-85052-6 [contents] - 2007
- [c24]Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, John Linwood Griffin:
XenSocket: A High-Throughput Interdomain Transport for Virtual Machines. Middleware 2007: 184-203 - [c23]Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger:
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. S&P 2007: 222-230 - [c22]Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar:
Trojan Detection using IC Fingerprinting. S&P 2007: 296-310 - 2005
- [c21]Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm:
Templates as Master Keys. CHES 2005: 15-29 - 2004
- [j13]Michael K. Reiter, Pankaj Rohatgi:
Homeland Security. IEEE Internet Comput. 8(6): 16-17 (2004) - 2003
- [c20]Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi:
Multi-channel Attacks. CHES 2003: 2-16 - 2002
- [c19]Suresh Chari, Josyula R. Rao, Pankaj Rohatgi:
Template Attacks. CHES 2002: 13-28 - [c18]Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi:
The EM Side-Channel(s). CHES 2002: 29-45 - [c17]Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely:
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. S&P 2002: 31-41 - 2001
- [j12]Rosario Gennaro, Pankaj Rohatgi:
How to Sign Digital Streams. Inf. Comput. 165(1): 100-116 (2001) - [c16]Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, Pankaj Rohatgi:
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. CHES 2001: 171-184 - [i1]Josyula R. Rao, Pankaj Rohatgi:
EMpowering Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2001: 37 (2001) - 2000
- [j11]Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan:
Improved Algorithms via Approximations of Probability Distributions. J. Comput. Syst. Sci. 61(1): 81-107 (2000) - [c15]Anshul Gupta, Pankaj Rohatgi, Ramesh C. Agarwal:
Fast practical algorithms for the Boolean-product-witness-matrix problem. ISSAC 2000: 146-152 - [c14]Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha:
An IPSec-based Host Architecture for Secure Internet Multicast. NDSS 2000 - [c13]Josyula R. Rao, Pankaj Rohatgi:
Can Pseudonymity Really Guarantee Privacy? USENIX Security Symposium 2000
1990 – 1999
- 1999
- [j10]Matthew J. Moyer, Josyula R. Rao, Pankaj Rohatgi:
A survey of security issues in multicast communications. IEEE Netw. 13(6): 12-23 (1999) - [c12]Pankaj Rohatgi:
A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. CCS 1999: 93-100 - [c11]Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi:
Towards Sound Approaches to Counteract Power-Analysis Attacks. CRYPTO 1999: 398-412 - 1997
- [c10]Rosario Gennaro, Pankaj Rohatgi:
How to Sign Digital Streams. CRYPTO 1997: 180-197 - 1996
- [j9]Suresh Chari, Pankaj Rohatgi:
On Completeness Under Random Reductions. J. Comput. Syst. Sci. 53(3): 545-555 (1996) - 1995
- [j8]Richard Chang, Jim Kadin, Pankaj Rohatgi:
On Unique Satisfiability and the Threshold Behavior of Randomized Reductions. J. Comput. Syst. Sci. 50(3): 359-373 (1995) - [j7]Pankaj Rohatgi:
Saving Queries with Randomness. J. Comput. Syst. Sci. 50(3): 476-492 (1995) - [j6]Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan:
Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems. SIAM J. Comput. 24(5): 1036-1050 (1995) - 1994
- [b1]Pankaj Rohatgi:
On Properties of Random Reductions. Cornell University, USA, 1994 - [j5]Richard Chang, Benny Chor, Oded Goldreich, Juris Hartmanis, Johan Håstad, Desh Ranjan, Pankaj Rohatgi:
The Random Oracle Hypothesis Is False. J. Comput. Syst. Sci. 49(1): 24-39 (1994) - [c9]Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan:
Improved algorithms via approximations of probability distributions (extended abstract). STOC 1994: 584-592 - 1993
- [j4]Desh Ranjan, Suresh Chari, Pankaj Rohatgi:
Improving Known Solutions is Hard. Comput. Complex. 3: 168-185 (1993) - [c8]Suresh Chari, Pankaj Rohatgi:
On Completeness under Random Reductions. SCT 1993: 176-184 - [c7]Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan:
Randomness-optimal unique element isolation, with applications to perfect matching and related problems. STOC 1993: 458-467 - [p3]Juris Hartmanis, Richard Chang, Desh Ranjan, Pankaj Rohatgi:
On IP = PSPACE and Theorems with Narrow Proofs. Current Trends in Theoretical Computer Science 1993: 484-493 - [p2]Richard Chang, Pankaj Rohatgi:
On Unique Satisfiability and Randomized Reductions. Current Trends in Theoretical Computer Science 1993: 494-503 - [p1]Juris Hartmanis, Richard Chang, Suresh Chari, Desh Ranjan, Pankaj Rohatgi:
Relativization: a Revisionistic Retrospective. Current Trends in Theoretical Computer Science 1993: 537-548 - 1992
- [j3]Richard Chang, Suresh Chari, Desh Ranjan, Pankaj Rohatgi:
Relativization: a revisionistic retrospective. Bull. EATCS 47: 144-153 (1992) - [c6]Pankaj Rohatgi:
Saving Queries with Randomness. SCT 1992: 71-83 - [c5]Desh Ranjan, Pankaj Rohatgi:
On Randomized Reductions to Sparse Sets. SCT 1992: 239-242 - [c4]Suresh Chari, Desh Ranjan, Pankaj Rohatgi:
On the Complexity of Incremental Computation. MFCS 1992: 172-180 - 1991
- [c3]Richard Chang, Jim Kadin, Pankaj Rohatgi:
Connections between the Complexity of Unique Satisfiability and the Threshold Behavior of Randomized Reductions. SCT 1991: 255-269 - [c2]Desh Ranjan, Suresh Chari, Pankaj Rohatgi:
Improving Known Solutions is Hard. ICALP 1991: 381-392 - 1990
- [j2]Juris Hartmanis, Richard Chang, Desh Ranjan, Pankaj Rohatgi:
On Unique Staisfiability and Randomized Reductions. Bull. EATCS 41: 166-174 (1990) - [j1]Richard Chang, Pankaj Rohatgi:
On Unique Staisfiability and Randomized Reductions. Bull. EATCS 42: 151-159 (1990) - [c1]Juris Hartmanis, Richard Chang, Desh Ranjan, Pankaj Rohatgi:
Structural Complexity Theory: recent Surprises. SWAT 1990: 1-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint