Pankaj Rohatgi

According to our database1, Pankaj Rohatgi authored at least 50 papers between 1990 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Side-Channel Protections for Cryptographic Instruction Set Extensions.
IACR Cryptol. ePrint Arch., 2016

2011
Introduction to differential power analysis.
J. Cryptogr. Eng., 2011

2010
Designing a Side Channel Resistant Random Number Generator.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
Automating role-based provisioning by learning from examples.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

A decision support system for secure information sharing.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Electromagnetic Attacks and Countermeasures.
Proceedings of the Cryptographic Engineering, 2009

Improved Techniques for Side-Channel Analysis.
Proceedings of the Cryptographic Engineering, 2009

2008
Policy Evolution with Grammatical Evolution.
Proceedings of the Simulated Evolution and Learning, 7th International Conference, 2008

Trading in risk: using markets to improve access control.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

Securing information flows: A metadata framework.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

MLS security policy evolution with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Policy evolution with Genetic Programming: A comparison of three approaches.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

Trust management for secure information flows.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Trojan Detection using IC Fingerprinting.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

XenSocket: A High-Throughput Interdomain Transport for Virtual Machines.
Proceedings of the Middleware 2007, 2007

2005
Templates as Master Keys.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Homeland Security.
IEEE Internet Comput., 2004

2003
Multi-channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Template Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

The EM Side-Channel(s).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
How to Sign Digital Streams.
Inf. Comput., 2001

EMpowering Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2001

Efficient Rijndael Encryption Implementation with Composite Field Arithmetic.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
Improved Algorithms via Approximations of Probability Distributions.
J. Comput. Syst. Sci., 2000

Can Pseudonymity Really Guarantee Privacy?
Proceedings of the 9th USENIX Security Symposium, 2000

An IPSec-based Host Architecture for Secure Internet Multicast.
Proceedings of the Network and Distributed System Security Symposium, 2000

Fast practical algorithms for the Boolean-product-witness-matrix problem.
Proceedings of the 2000 International Symposium on Symbolic and Algebraic Computation, 2000

1999
A survey of security issues in multicast communications.
IEEE Netw., 1999

Towards Sound Approaches to Counteract Power-Analysis Attacks.
Proceedings of the Advances in Cryptology, 1999

A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication.
Proceedings of the CCS '99, 1999

1996
On Completeness Under Random Reductions.
J. Comput. Syst. Sci., 1996

1995
Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems.
SIAM J. Comput., 1995

Saving Queries with Randomness.
J. Comput. Syst. Sci., 1995

On Unique Satisfiability and the Threshold Behavior of Randomized Reductions.
J. Comput. Syst. Sci., 1995

1994
On Properties of Random Reductions.
PhD thesis, 1994

The Random Oracle Hypothesis Is False.
J. Comput. Syst. Sci., 1994

Improved algorithms via approximations of probability distributions (extended abstract).
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994

1993
On IP = PSPACE and Theorems with Narrow Proofs.
Proceedings of the Current Trends in Theoretical Computer Science - Essays and Tutorials, 1993

Relativization: a Revisionistic Retrospective.
Proceedings of the Current Trends in Theoretical Computer Science - Essays and Tutorials, 1993

On Unique Satisfiability and Randomized Reductions.
Proceedings of the Current Trends in Theoretical Computer Science - Essays and Tutorials, 1993

Improving Known Solutions is Hard.
Comput. Complex., 1993

1992
Relativization: a revisionistic retrospective.
Bull. EATCS, 1992

On the Complexity of Incremental Computation.
Proceedings of the Mathematical Foundations of Computer Science 1992, 1992

On Randomized Reductions to Sparse Sets.
Proceedings of the Seventh Annual Structure in Complexity Theory Conference, 1992

1991
Connections between the Complexity of Unique Satisfiability and the Threshold Behavior of Randomized Reductions.
Proceedings of the Sixth Annual Structure in Complexity Theory Conference, Chicago, Illinois, USA, June 30, 1991

1990
On Unique Staisfiability and Randomized Reductions.
Bull. EATCS, 1990

On Unique Staisfiability and Randomized Reductions.
Bull. EATCS, 1990

Structural Complexity Theory: recent Surprises.
Proceedings of the SWAT 90, 1990


  Loading...