Template attacks S Chari, JR Rao, P Rohatgi Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003 | 2026 | 2003 |
Towards sound approaches to counteract power-analysis attacks S Chari, CS Jutla, JR Rao, P Rohatgi Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999 | 1510 | 1999 |
The EM side—channel (s) D Agrawal, B Archambeault, JR Rao, P Rohatgi Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003 | 1370 | 2003 |
Trojan detection using IC fingerprinting D Agrawal, S Baktir, D Karakoyunlu, P Rohatgi, B Sunar 2007 IEEE Symposium on Security and Privacy (SP'07), 296-310, 2007 | 1114 | 2007 |
Introduction to differential power analysis P Kocher, J Jaffe, B Jun, P Rohatgi Journal of Cryptographic Engineering 1, 5-27, 2011 | 864 | 2011 |
A testing methodology for side-channel resistance validation BJ Gilbert Goodwill, J Jaffe, P Rohatgi NIST non-invasive attack testing workshop 7, 115-136, 2011 | 647 | 2011 |
How to sign digital streams R Gennaro, P Rohatgi Annual International Cryptology Conference, 180-197, 1997 | 565 | 1997 |
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control PC Cheng, P Rohatgi, C Keser, PA Karger, GM Wagner, AS Reninger 2007 IEEE symposium on security and privacy (SP'07), 222-230, 2007 | 453 | 2007 |
Efficient Rijndael encryption implementation with composite field arithmetic A Rudra, PK Dubey, CS Jutla, V Kumar, JR Rao, P Rohatgi Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001 | 333 | 2001 |
A survey of security issues in multicast communications MJ Moyer, JR Rao, P Rohatgi IEEE network 13 (6), 12-23, 1999 | 319 | 1999 |
Test vector leakage assessment (TVLA) methodology in practice G Becker, J Cooper, E DeMulder, G Goodwill, J Jaffe, G Kenworthy, ... International Cryptographic Module Conference 1001, 13, 2013 | 315 | 2013 |
A compact and fast hybrid signature scheme for multicast packet authentication P Rohatgi Proceedings of the 6th ACM Conference on Computer and Communications …, 1999 | 273 | 1999 |
Context-based virtual assistant conversations F Brown, TM Miller, M Zartler, S Buzan US Patent 10,109,297, 2018 | 263 | 2018 |
A cautionary note regarding evaluation of AES candidates on smart-cards S Chari, C Jutla, JR Rao, P Rohatgi Second Advanced Encryption Standard Candidate Conference, 133-147, 1999 | 263 | 1999 |
Verifiable, leak-resistant encryption and decryption PC Kocher, P Rohatgi, JM Jaffe US Patent 8,386,800, 2013 | 243 | 2013 |
XenSocket: A high-throughput interdomain transport for virtual machines X Zhang, S McIntosh, P Rohatgi, JL Griffin Middleware 2007: ACM/IFIP/USENIX 8th International Middleware Conference …, 2007 | 226 | 2007 |
Multi-channel attacks D Agrawal, JR Rao, P Rohatgi Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003 | 211 | 2003 |
Can pseudonymity really guarantee privacy? JR Rao, P Rohatgi 9th USENIX Security Symposium (USENIX Security 00), 2000 | 203 | 2000 |
Partitioning attacks: or how to rapidly clone some GSM cards JR Rao, P Rohatgi, H Scherzer, S Tinguely Proceedings 2002 IEEE Symposium on Security and Privacy, 31-41, 2002 | 157 | 2002 |
How to sign digital streams R Gennaro, P Rohatgi US Patent 6,009,176, 1999 | 147 | 1999 |