Jothi Rangasamy a.k.a Jothi Ramalingam
Jothi Rangasamy a.k.a Jothi Ramalingam
Verified email at nitk.edu.in - Homepage
Title
Cited by
Cited by
Year
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
D Stebila, L Kuppusamy, J Rangasamy, C Boyd, JG Nieto
Cryptographers’ Track at the RSA Conference, 284-301, 2011
632011
An integrated approach to cryptographic mitigation of denial-of-service attacks
J Rangasamy, D Stebila, C Boyd, JG Nieto
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
212011
Crt-based outsourcing algorithms for modular exponentiations
L Kuppusamy, J Rangasamy
International Conference on Cryptology in India, 81-98, 2016
152016
Publicly verifiable ciphertexts
JMG Nieto, M Manulis, B Poettering, J Rangasamy, D Stebila
International Conference on Security and Cryptography for Networks, 393-410, 2012
142012
Efficient modular exponentiation-based puzzles for denial-of-service protection
J Rangasamy, D Stebila, L Kuppusamy, C Boyd, JG Nieto
International Conference on Information Security and Cryptology, 319-331, 2011
122011
Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
O Uzunkol, J Rangasamy, L Kuppusamy
International Conference on Information Security, 250-267, 2018
82018
Practical client puzzles in the standard model
L Kuppusamy, J Rangasamy, D Stebila, C Boyd, JG Nieto
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
82012
Revisiting single-server algorithms for outsourcing modular exponentiation
J Rangasamy, L Kuppusamy
International Conference on Cryptology in India, 3-20, 2018
72018
Decomposed s-boxes and DPA attacks: A quantitative case study using PRINCE
R Selvam, D Shanmugam, S Annadurai, J Rangasamy
International Conference on Security, Privacy, and Applied Cryptography …, 2016
52016
Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy
L Kuppusamy, J Rangasamy, D Stebila, C Boyd, JG Nieto
International Conference on Cryptology in India, 379-398, 2011
42011
Cryptographic approaches to denial-of-service resistance
C Boyd, J Gonzalez-Nieto, L Kuppusamy, H Narasimhan, CP Rangan, ...
An Investigation into the Detection and Mitigation of Denial of Service (DoS …, 2011
42011
On secure outsourcing of cryptographic computations to cloud
L Kuppusamy, J Rangasamy, P Gauravaram
Proceedings of the 2nd international workshop on Security in cloud computing …, 2014
22014
Effort-release public-key encryption from cryptographic puzzles
J Rangasamy, D Stebila, C Boyd, JM González-Nieto, L Kuppusamy
Australasian Conference on Information Security and Privacy, 194-207, 2012
22012
Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services
J Rangasamy, L Kuppusamy, G Krishnan, Velmurugan
International Journal of Information and Computer Security 9 (1-2), 114-129, 2017
12017
On “Practical and secure outsourcing algorithms for solving quadratic congruences in IoTs” from IEEE IoT journal
J Rangasamy
Discrete Applied Mathematics 302, 139-146, 2021
2021
Refined Shacham–Waters ring signature scheme in Seo–Cheon framework
MP Laxman Das, J Rangasamy, R Kabaleeshwaran
Security and Communication Networks 9 (13), 2122-2134, 2016
2016
Improved Cryptographic Puzzle Based on Modular Exponentiation
L Kuppusamy, J Rangasamy
Mathematics and Computing, 107-121, 2015
2015
Preserving Privacy in Data Outsourcing: by Sara Foresti Springer 2011
J Rangasamy
2013
Cryptographic techniques for managing computational effort
JR Rangasamy
Queensland University of Technology, 2012
2012
This file was downloaded from: http://eprints. qut. edu. au/47824
L Kuppusamy, J Rangasamy, D Stebila, C Boyd, JG Nieto
The system can't perform the operation now. Try again later.
Articles 1–20