Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: C. Pandu
    Last name: Rangan
    DBLP: r/CPanduRangan
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 303  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan.
    Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE.
    Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I 2017 (0) 2017
    Conference paper
    Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan.
    Leakage-Resilient Tweakable Encryption from One-Way Functions.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan.
    Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan.
    New Approach to Practical Leakage-Resilient Public-Key Cryptography.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan.
    An Efficient Non-transferable Proxy Re-encryption Scheme.
    Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Akshayaram Srinivasan, C. Pandu Rangan.
    Efficiently Obfuscating Re-Encryption Program Under DDH Assumption.
    Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings 2017 (0) 2017
    Conference paper
    S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan.
    An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan.
    Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting.
    Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings 2017 (0) 2017
    Conference paper
    S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan.
    An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing.
    Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Lattice-based identity-based resplittable threshold public key encryption scheme.
    Int. J. Comput. Math. 2016, Volume 93 (0) 2016
    Conference paper
    Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan.
    A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    S. Sree Vivek, S. Sharmila Deva Selvi, Akshayaram Srinivasan, C. Pandu Rangan.
    Stronger public key encryption system withstanding RAM scraper like attacks.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan.
    Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Journal article
    Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan.
    A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers.
    JoWUA 2016, Volume 7 (0) 2016
    Journal article
    S. Sree Vivek, S. Sharmila Deva Selvi, Pallavi Chandrasekar, C. Pandu Rangan.
    Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives.
    J. Internet Serv. Inf. Secur. 2016, Volume 6 (0) 2016
    Journal article
    Arpita Patra, Ashish Choudhury, C. Pandu Rangan.
    Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation.
    J. Cryptology 2015, Volume 28 (0) 2015
    Conference paper
    Priyanka Bose, Dipanjan Das 0002, C. Pandu Rangan.
    Constant Size Ring Signature Without Random Oracle.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan.
    Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Priyanka Bose, Dipanjan Das 0002, C. Pandu Rangan.
    Constant Size Ring Signature Without Random Oracle.
    Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan.
    Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Akshayaram Srinivasan, C. Pandu Rangan.
    Certificateless Proxy Re-Encryption Without Pairing: Revisited.
    Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015 2015 (0) 2015
    Conference paper
    S. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra, C. Pandu Rangan.
    Practical IBE Secure under CBDH - Encrypting Without Pairing.
    SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015. 2015 (0) 2015
    Conference paper
    Akshayaram Srinivasan, C. Pandu Rangan.
    Efficiently Obfuscating Re-Encryption Program under DDH Assumption.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan.
    An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan.
    Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction.
    Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Dipanjan Das 0002, Priyanka Bose, S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan.
    An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Journal article
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Lattice Based Mix Network for Location Privacy in Mobile System.
    Mobile Information Systems 2015, Volume 2015 (0) 2015
    Conference paper
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme.
    Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters.
    Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Arpita Patra, Ashish Choudhury, C. Pandu Rangan.
    Asynchronous Byzantine Agreement with optimal resilience.
    Distributed Computing 2014, Volume 27 (0) 2014
    Conference paper
    Saikrishna Badrinarayanan, C. Pandu Rangan.
    Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols.
    SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 2014 (0) 2014
    Conference paper
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme.
    Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Akshayaram Srinivasan, C. Pandu Rangan.
    Certificateless Proxy Re-Encryption Without Pairing.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Saikrishna Badrinarayanan, C. Pandu Rangan.
    Certificateless and Identity based Authenticated Key Exchange Protocols.
    E-Business and Telecommunications - 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers 2015 (0) 2014
    Journal article
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Lattice Based Universal Re-encryption for Mixnet.
    J. Internet Serv. Inf. Secur. 2014, Volume 4 (0) 2014
    Journal article
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Guest Editorial: Special Issue on Cyber Security Protections and Applications.
    J. Internet Serv. Inf. Secur. 2014, Volume 4 (0) 2014
    Conference paper
    Prateek Barapatre, C. Pandu Rangan.
    Identity-Based Identification Schemes from ID-KEMs.
    Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Prateek Barapatre, C. Pandu Rangan.
    Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings.
    Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings 2013 (0) 2013
    Conference paper
    S. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan.
    Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round.
    Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Karthik Abinav, Saikrishna Badrinarayanan, C. Pandu Rangan, S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan.
    A Revocable Online-Offline Certificateless Signature Scheme without Pairing.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan.
    A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory.
    Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers 2014 (0) 2013
    Conference paper
    K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan.
    Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model.
    Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers 2014 (0) 2013
    Journal article
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Lattice Based Efficient Threshold Public Key Encryption Scheme.
    JoWUA 2013, Volume 4 (0) 2013
    Journal article
    S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan.
    Efficient Certificateless Online/Offline Signature with tight security.
    J. Internet Serv. Inf. Secur. 2013, Volume 3 (0) 2013
    Journal article
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Lattice Based Identity Based Proxy Re-Encryption Scheme.
    J. Internet Serv. Inf. Secur. 2013, Volume 3 (0) 2013
    Journal article
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext.
    J. Internet Serv. Inf. Secur. 2013, Volume 3 (0) 2013
    Conference paper
    Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Naga Naresh Karuturi, C. Pandu Rangan, Rajmohan Rajaraman, Ravi Sundaram.
    Cache Me If You Can: Capacitated Selfish Replication Games.
    LATIN 2012: Theoretical Informatics - 10th Latin American Symposium, Arequipa, Peru, April 16-20, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Chaya Ganesh, C. Pandu Rangan.
    Optimal Parameters for Efficient Two-Party Computation Protocols.
    Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings 2012 (0) 2012
    Conference paper
    K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan.
    A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions.
    Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings 2012 (0) 2012
    Conference paper
    K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan.
    An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan.
    Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan.
    ID Based Signcryption Scheme in Standard Model.
    Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings 2012 (0) 2012
    Conference paper
    S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan.
    Compact Stateful Encryption Schemes with Ciphertext Verifiability.
    Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Ashwinkumar Badanidiyuru, Arpita Patra, Ashish Choudhury, K. Srinathan, C. Pandu Rangan.
    On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission.
    J. ACM 2012, Volume 59 (0) 2012
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan.
    ID Based Signcryption Scheme in Standard Model.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan.
    Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan.
    On Provably Secure Code-Based Signature and Signcryption Scheme.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan.
    Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    S. Sharmila Deva Selvi, Subhashini Venugopalan, C. Pandu Rangan.
    On the Security of Attribute Based Signature Schemes.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Amitash Ramesh, Soumya Ramesh, Sudarshan Iyengar, Vinod Sekhar, C. Pandu Rangan.
    Obstacles Incentivize Human Learning: A Network Theoretic Study.
    International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012, Istanbul, Turkey, 26-29 August 2012 2012 (0) 2012
    Conference paper
    M. Vijesh, Sudarshan Iyengar, S. M. Vijay Mahantesh, Amitash Ramesh, C. Pandu Rangan, Veni Madhavan.
    A Navigation Algorithm Inspired by Human Navigation.
    International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012, Istanbul, Turkey, 26-29 August 2012 2012 (0) 2012
    Conference paper
    S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan.
    Group key establishment (GKE): Two/three party key exchange to GKE.
    IEEE International Conference on Advanced Networks and Telecommuncations Systems, ANTS 2012, Bangalore, India, 16-19 December, 2012 2012 (0) 2012
    Journal article
    S. Sree Vivek, S. Sharmila Deva Selvi, Salini Selvaraj Kowsalya, C. Pandu Rangan.
    PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction.
    JoWUA 2012, Volume 3 (0) 2012
    Journal article
    S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan.
    A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network.
    JoWUA 2012, Volume 3 (0) 2012
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan.
    Identity based partial aggregate signature scheme without pairing.
    2012 35th IEEE Sarnoff Symposium, Newark, NJ, USA, May 21-22, 2012 2012 (0) 2012
    Journal article
    Kunwar Singh, C. Pandu Rangan, A. K. Banerjee.
    Lattice Forward-Secure Identity Based Encryption Scheme.
    J. Internet Serv. Inf. Secur. 2012, Volume 2 (0) 2012
    Journal article
    S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan.
    Efficient Certificateless Online/Offline Signature.
    J. Internet Serv. Inf. Secur. 2012, Volume 2 (0) 2012
    Conference paper
    Esha Ghosh, N. S. Narayanaswamy, C. Pandu Rangan.
    A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs.
    WALCOM: Algorithms and Computation - 5th International Workshop, WALCOM 2011, New Delhi, India, February 18-20, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Arpita Patra, C. Pandu Rangan.
    Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience.
    Information Theoretic Security - 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Ashish Choudhury, Arpita Patra, Ashwinkumar Badanidiyuru, K. Srinathan, C. Pandu Rangan.
    Secure message transmission in asynchronous networks.
    J. Parallel Distrib. Comput. 2011, Volume 71 (0) 2011
    Conference paper
    B. Vignesh, Siddharth S, Sridhar Ramachandran, Sudarshan Iyengar, C. Pandu Rangan.
    A Lookahead algorithm to compute Betweenness Centrality
    CoRR 2011, Volume 0 (0) 2011
    Journal article
    Esha Ghosh, Subhas K. Ghosh, C. Pandu Rangan.
    On the Fault Tolerance and Hamiltonicity of the Optical Transpose Interconnection System of Non-Hamiltonian Base Graphs
    CoRR 2011, Volume 0 (0) 2011
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan.
    Identity-Based Deterministic Signature Scheme without Forking-Lemma.
    Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings 2011 (0) 2011
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan.
    Identity Based Online/Offline Encryption and Signcryption Schemes Revisited.
    Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings 2011 (0) 2011
    Conference paper
    S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan.
    CCA Secure Certificateless Encryption Schemes based on RSA.
    SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2011 (0) 2011
    Conference paper
    S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan.
    Compact CCA-Secure Encryption with Ciphertext Verifiability.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    William K. Moses Jr., C. Pandu Rangan.
    Rational Secret Sharing with Honest Players over an Asynchronous Channel.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan.
    Identity Based Deterministic Signature Scheme Without Forking-Lemma.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan.
    Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan.
    On the Security of ID Based Signcryption Schemes.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    R. Shyam Sundar, C. Pandu Rangan.
    Bit-depth scalable video coding using error residual correction.
    2011 IEEE Visual Communications and Image Processing, VCIP 2011, Tainan, Taiwan, November 6-9, 2011 2011 (0) 2011
    Conference paper
    T. V. Thirumala Reddy, C. Pandu Rangan.
    Variants of Spreading Messages.
    J. Graph Algorithms Appl. 2011, Volume 15 (0) 2011
    Conference paper
    William K. Moses Jr., C. Pandu Rangan.
    Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security
    CoRR 2011, Volume 0 (0) 2011
    Journal article
    Balasubramanian Sivan, S. Harini, C. Pandu Rangan.
    On Conditional Covering Problem.
    Mathematics in Computer Science 2010, Volume 3 (0) 2010
    Conference paper
    Arpita Patra, Ashish Choudhury, C. Pandu Rangan.
    Brief announcement: perfectly secure message transmissiontolerating mobile mixed adversary with reduced phase complexity.
    Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, PODC 2010, Zurich, Switzerland, July 25-28, 2010 2010 (0) 2010
    Conference paper
    Arpita Patra, C. Pandu Rangan.
    Brief announcement: communication efficient asynchronous byzantine agreement.
    Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, PODC 2010, Zurich, Switzerland, July 25-28, 2010 2010 (0) 2010
    Journal article
    Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Naga Naresh Karuturi, C. Pandu Rangan, Rajmohan Rajaraman, Ravi Sundaram.
    Capacitated Caching Games
    CoRR 2010, Volume 0 (0) 2010
    Conference paper
    Arpita Patra, C. Pandu Rangan.
    Communication Optimal Multi-valued Asynchronous Broadcast Protocol.
    Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings 2010 (0) 2010
    Conference paper
    R. Shyam Sundar, C. Pandu Rangan.
    Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding.
    Advances in Multimedia Information Processing - PCM 2010 - 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 2010, Proceedings, Part II 2011 (0) 2010
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan.
    Identity Based Public Verifiable Signcryption Scheme.
    Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan.
    The Round Complexity of Verifiable Secret Sharing: The Statistical Case.
    Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings 2010 (0) 2010
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan.
    An Identity based Ring Signcryption Scheme with Public Verifiability.
    SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2010 (0) 2010
    Conference paper
    Swarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan.
    Forcing Out a Confession - Threshold Discernible Ring Signatures.
    SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2010 (0) 2010
    Conference paper
    Arpita Patra, Ashish Choudhury, C. Pandu Rangan, K. Srinathan.
    Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality.
    IJACT 2010, Volume 2 (0) 2010
    Conference paper
    Swarun Kumar, Shivank Agrawal, Subha Balaraman, C. Pandu Rangan.
    Attribute Based Signatures for Bounded Multi-level Threshold Circuits.
    Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers 2011 (0) 2010
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, S. Priti.
    On the Security of Identity Based Threshold Unsigncryption Schemes.
    Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010 2010 (0) 2010
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan.
    Identity Based Self Delegated Signature - Self Proxy Signatures.
    Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010 2010 (0) 2010
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan.
    Security Weaknesses in Two Certificateless Signcryption Schemes.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan.
    CCA2 Secure Certificateless Encryption Schemes Based on RSA.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan.
    Identity Based Online/Offline Encryption Scheme.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Show item 1 to 100 of 303  

    Your query returned 303 matches in the database.