What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ramarathnam Venkatesan
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2011
conf/ccs
ZDVUE: prioritization of javascript attacks to discover new vulnerabilities.
Sandeep Karanth
Srivatsan Laxman
Prasad Naldurg
Ramarathnam Venkatesan
John Lambert
Jinwook Shin
2010
conf/tcc
Founding Cryptography on Tamper-Proof Hardware Tokens.
Vipul Goyal
Yuval Ishai
Amit Sahai
Ramarathnam Venkatesan
Akshay Wadia
2009
conf/iwsec
Tamper-Tolerant Software: Modeling and Implementation.
Mariusz H. Jakubowski
Chit Wei Saw
Ramarathnam Venkatesan
2008
conf/crypto
Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys.
Dimitar Jetchev
Ramarathnam Venkatesan
2008
conf/iwsec
The Long-Short-Key Primitive and Its Applications to Key Security.
Matthew Cary
Matthias Jacob
Mariusz H. Jakubowski
Ramarathnam Venkatesan
2008
conf/iwsec
The Superdiversifier: Peephole Individualization for Software Protection.
Matthias Jacob
Mariusz H. Jakubowski
Prasad Naldurg
Chit Wei Saw
Ramarathnam Venkatesan
2007
conf/ih
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.
Mariusz H. Jakubowski
Prasad Naldurg
Vijay Patankar
Ramarathnam Venkatesan
2007
conf/ih
A Graph Game Model for Software Tamper Protection.
Nenad Dedic
Mariusz H. Jakubowski
Ramarathnam Venkatesan
2007
conf/ctrsa
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers.
Nathan Keller
Stephen D. Miller
Ilya Mironov
Ramarathnam Venkatesan
2007
conf/iwsec
Run-Time Randomization to Mitigate Tampering.
Bertrand Anckaert
Mariusz H. Jakubowski
Ramarathnam Venkatesan
Koen De Bosschere
2005
conf/asiacrypt
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
David Jao
Stephen D. Miller
Ramarathnam Venkatesan
2003
conf/crypto
A Message Authentication Code Based on Unimodular Matrix Groups.
Matthew Cary
Ramarathnam Venkatesan
2002
conf/ih
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks.
Mehmet Kivanç Mihçak
Ramarathnam Venkatesan
Mustafa Kesal
2002
conf/ih
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
Yuqun Chen
Ramarathnam Venkatesan
Matthew Cary
Ruoming Pang
Saurabh Sinha
Mariusz H. Jakubowski
2001
conf/ccs
New Iterative Geometric Methods for Robust Perceptual Image Hashing.
Mehmet Kivanç Mihçak
Ramarathnam Venkatesan
2001
conf/ih
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding.
Mehmet Kivanç Mihçak
Ramarathnam Venkatesan
2001
conf/ih
A Graph Theoretic Approach to Software Watermarking.
Ramarathnam Venkatesan
Vijay V. Vazirani
Saurabh Sinha
1999
conf/fse
High-Speed Pseudorandom Number Generation with Small Memory.
William Aiello
Sivaramakrishnan Rajagopalan
Ramarathnam Venkatesan
1998
journals/joc
Using Any One-Way Permutation.
Moni Naor
Rafail Ostrovsky
Ramarathnam Venkatesan
Moti Yung
1998
conf/fse
New Constructions for Secure Hash Functions.
William Aiello
Stuart Haber
Ramarathnam Venkatesan
1998
conf/crypto
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers.
William Aiello
Mihir Bellare
Giovanni Di Crescenzo
Ramarathnam Venkatesan
1998
conf/eurocrypt
Speeding up Discrete Log and Factoring Based Schemes via Precomputations.
Victor Boyko
Marcus Peinado
Ramarathnam Venkatesan
1998
conf/eurocrypt
The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers.
Mariusz H. Jakubowski
Ramarathnam Venkatesan
1998
conf/eurocrypt
Breaking RSA May Not Be Equivalent to Factoring.
Dan Boneh
Ramarathnam Venkatesan
1996
conf/crypto
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes.
Dan Boneh
Ramarathnam Venkatesan
1996
conf/eurocrypt
Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel.
William Aiello
Ramarathnam Venkatesan
1993
conf/eurocrypt
Interactive Hashing Simplifies Zero-Knowledge Protocol Design.
Rafail Ostrovsky
Ramarathnam Venkatesan
Moti Yung
1992
conf/crypto
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
Moni Naor
Rafail Ostrovsky
Ramarathnam Venkatesan
Moti Yung
Coauthors
Akshay Wadia
(1)
Amit Sahai
(1)
Bertrand Anckaert
(1)
Chit Wei Saw
(2)
Dan Boneh
(2)
David Jao
(1)
Dimitar Jetchev
(1)
Giovanni Di Crescenzo
(1)
Ilya Mironov
(1)
Jinwook Shin
(1)
John Lambert
(1)
Koen De Bosschere
(1)
Marcus Peinado
(1)
Mariusz H. Jakubowski
(8)
Matthew Cary
(3)
Matthias Jacob
(2)
Mehmet Kivanç Mihçak
(3)
Mihir Bellare
(1)
Moni Naor
(2)
Moti Yung
(3)
Mustafa Kesal
(1)
Nathan Keller
(1)
Nenad Dedic
(1)
Prasad Naldurg
(3)
Rafail Ostrovsky
(3)
Ramarathnam Venkatesan
(28)
Ruoming Pang
(1)
Sandeep Karanth
(1)
Saurabh Sinha
(2)
Sivaramakrishnan Rajagopalan
(1)
Srivatsan Laxman
(1)
Stephen D. Miller
(2)
Stuart Haber
(1)
Victor Boyko
(1)
Vijay Patankar
(1)
Vijay V. Vazirani
(1)
Vipul Goyal
(1)
William Aiello
(4)
Yuqun Chen
(1)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to