Pankaj Rohatgi
Pankaj Rohatgi
Verified email at google.com
Title
Cited by
Cited by
Year
Template attacks
S Chari, JR Rao, P Rohatgi
International Workshop on Cryptographic Hardware and Embedded Systems, 13-28, 2002
13122002
Towards sound approaches to counteract power-analysis attacks
S Chari, CS Jutla, JR Rao, P Rohatgi
Annual International Cryptology Conference, 398-412, 1999
10371999
The EM side—channel (s)
D Agrawal, B Archambeault, JR Rao, P Rohatgi
International workshop on cryptographic hardware and embedded systems, 29-45, 2002
10152002
Trojan detection using IC fingerprinting
D Agrawal, S Baktir, D Karakoyunlu, P Rohatgi, B Sunar
2007 IEEE Symposium on Security and Privacy (SP'07), 296-310, 2007
8392007
How to sign digital streams
R Gennaro, P Rohatgi
Annual International Cryptology Conference, 180-197, 1997
5361997
Introduction to differential power analysis
P Kocher, J Jaffe, B Jun, P Rohatgi
Journal of Cryptographic Engineering 1 (1), 5-27, 2011
5282011
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
PC Cheng, P Rohatgi, C Keser, PA Karger, GM Wagner, AS Reninger
2007 IEEE Symposium on Security and Privacy (SP'07), 222-230, 2007
3852007
A testing methodology for side-channel resistance validation
BJ Gilbert Goodwill, J Jaffe, P Rohatgi
NIST non-invasive attack testing workshop 7, 115-136, 2011
3052011
A survey of security issues in multicast communications
MJ Moyer, JR Rao, P Rohatgi
IEEE network 13 (6), 12-23, 1999
3041999
Efficient Rijndael encryption implementation with composite field arithmetic
A Rudra, PK Dubey, CS Jutla, V Kumar, JR Rao, P Rohatgi
International Workshop on Cryptographic Hardware and Embedded Systems, 171-184, 2001
3012001
A compact and fast hybrid signature scheme for multicast packet authentication
P Rohatgi
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
2501999
A cautionary note regarding evaluation of AES candidates on smart-cards
S Chari, C Jutla, JR Rao, P Rohatgi
Second Advanced Encryption Standard Candidate Conference, 133-147, 1999
2361999
XenSocket: A high-throughput interdomain transport for virtual machines
X Zhang, S McIntosh, P Rohatgi, JL Griffin
ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2007
2062007
Multi-channel attacks
D Agrawal, JR Rao, P Rohatgi
International Workshop on Cryptographic Hardware and Embedded Systems, 2-16, 2003
1782003
Verifiable, leak-resistant encryption and decryption
PC Kocher, P Rohatgi, JM Jaffe
US Patent 8,386,800, 2013
1762013
Can pseudonymity really guarantee privacy?
JR Rao, P Rohatgi
USENIX Security Symposium, 85-96, 2000
1692000
Test vector leakage assessment (TVLA) methodology in practice
J Cooper, E DeMulder, G Goodwill, J Jaffe, G Kenworthy, P Rohatgi
International Cryptographic Module Conference 20, 2013
1542013
Test vector leakage assessment (TVLA) methodology in practice
J Cooper, E DeMulder, G Goodwill, J Jaffe, G Kenworthy, P Rohatgi
International Cryptographic Module Conference 20, 2013
1542013
How to sign digital streams
R Gennaro, P Rohatgi
US Patent 6,009,176, 1999
1451999
Partitioning attacks: or how to rapidly clone some GSM cards
JR Rao, P Rohatgi, H Scherzer, S Tinguely
Proceedings 2002 IEEE Symposium on Security and Privacy, 31-41, 2002
1392002
The system can't perform the operation now. Try again later.
Articles 1–20