Follow
Pankaj Rohatgi
Pankaj Rohatgi
Verified email at google.com
Title
Cited by
Cited by
Year
Template attacks
S Chari, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
20092003
Towards sound approaches to counteract power-analysis attacks
S Chari, CS Jutla, JR Rao, P Rohatgi
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
14991999
The EM side—channel (s)
D Agrawal, B Archambeault, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
13602003
Trojan detection using IC fingerprinting
D Agrawal, S Baktir, D Karakoyunlu, P Rohatgi, B Sunar
2007 IEEE Symposium on Security and Privacy (SP'07), 296-310, 2007
11132007
Introduction to differential power analysis
P Kocher, J Jaffe, B Jun, P Rohatgi
Journal of Cryptographic Engineering 1, 5-27, 2011
8602011
A testing methodology for side-channel resistance validation
BJ Gilbert Goodwill, J Jaffe, P Rohatgi
NIST non-invasive attack testing workshop 7, 115-136, 2011
6392011
How to sign digital streams
R Gennaro, P Rohatgi
Annual International Cryptology Conference, 180-197, 1997
5651997
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
PC Cheng, P Rohatgi, C Keser, PA Karger, GM Wagner, AS Reninger
2007 IEEE symposium on security and privacy (SP'07), 222-230, 2007
4532007
Efficient Rijndael encryption implementation with composite field arithmetic
A Rudra, PK Dubey, CS Jutla, V Kumar, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
3332001
A survey of security issues in multicast communications
MJ Moyer, JR Rao, P Rohatgi
IEEE network 13 (6), 12-23, 1999
3191999
Test vector leakage assessment (TVLA) methodology in practice
G Becker, J Cooper, E DeMulder, G Goodwill, J Jaffe, G Kenworthy, ...
International Cryptographic Module Conference 1001, 13, 2013
3112013
A compact and fast hybrid signature scheme for multicast packet authentication
P Rohatgi
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
2731999
Context-based virtual assistant conversations
F Brown, TM Miller, M Zartler, S Buzan
US Patent 10,109,297, 2018
2632018
A cautionary note regarding evaluation of AES candidates on smart-cards
S Chari, C Jutla, JR Rao, P Rohatgi
Second Advanced Encryption Standard Candidate Conference, 133-147, 1999
2621999
Verifiable, leak-resistant encryption and decryption
PC Kocher, P Rohatgi, JM Jaffe
US Patent 8,386,800, 2013
2432013
XenSocket: A high-throughput interdomain transport for virtual machines
X Zhang, S McIntosh, P Rohatgi, JL Griffin
Middleware 2007: ACM/IFIP/USENIX 8th International Middleware Conference …, 2007
2262007
Multi-channel attacks
D Agrawal, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
2112003
Can pseudonymity really guarantee privacy?
JR Rao, P Rohatgi
9th USENIX Security Symposium (USENIX Security 00), 2000
2022000
Partitioning attacks: or how to rapidly clone some GSM cards
JR Rao, P Rohatgi, H Scherzer, S Tinguely
Proceedings 2002 IEEE Symposium on Security and Privacy, 31-41, 2002
1572002
How to sign digital streams
R Gennaro, P Rohatgi
US Patent 6,009,176, 1999
1471999
The system can't perform the operation now. Try again later.
Articles 1–20