Browse By Person: Gauravaram, Praveen

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Jump to: 2004 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
Number of items: 38.

2004

Gauravaram, Praveen, May, Lauren, & Millan, William (2004) CRUSH: A New Cryptographic Hash Function Using Iterated Halving Technique. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.

Gauravaram, Praveen & Millan, William (2004) Cryptanalysis of the Cellular Authentication and Voice Encryption Algorithm. Institute of Electronics, Information and Communication Engineers (IEICE) Electronics Express, 1(15), pp. 453-459.

Gauravaram, Praveen S. & Millan, William L. (2004) Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). In International Workshop on Cryptographic Algorithms and their Uses, July, 2004, Gold Coast, Australia.
Number of full-text downloads 715

2006

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Josang, Audun, Gauravaram, Praveen S., O'Shea, Kathryn L., et al. (2006) Electronic Contract Administration – Legal and Security Issues Literature Review.

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) Collision Attacks on MD5 and SHA-1: Is this the 'Sword of Damocles' for Electronic Commerce? In Clark, A, McPherson, M, & Mohay, G (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006, University of Queensland, Australia, Gold Coast, pp. 73-88.

Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 6
Number of citations in Web of Science® 12

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) The Legal & Practical Implications of Recent Attacks on 128-bit Cryptographic Hash Functions. First Monday, 11(1), pp. 17-35.
Number of citations in Scopus 1

2007

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Gauravaram, Praveen S., McNamara, Judith, & O'Shea, Kathryn L. (2007) Electronic Contract Administration – Legal and Security Issues Research Report.
Number of full-text downloads 851

Gauravaram, Praveen (2007) Cryptographic hash functions : cryptanalysis, design and applications. PhD thesis, Queensland University of Technology.
Number of full-text downloads 4,383

Gauravaram, Praveen & Foo, Ernest (2007) Designing Secure e-Contracting Systems. In CollECTeR 2007 - 21st Conference on eCommerce / 10th Anniversary CollECTeR Australia conference, 9-11 December 2007, Melbourne.
Number of full-text downloads 430

2008

Gauravaram, Praveen, Knudsen, Lars R., Matusiewicz, Krystian, Mendel, Florian, Rechberger, Christian, Schläffer, Martin, et al. (2008) Grøstl – a SHA-3 candidate. (Unpublished)

Gauravaram, Praveen & Kelsey, John (2008) Linear -XOR and additive checksums don't protect Damgard-Merkle hashes from generic attacks. In Malkin, Tal (Ed.) Topics in Cryptology - CT-RSA 2008, 8-11 April 2008, United States of America, San Francisco,.
Number of citations in Scopus 10
Number of citations in Web of Science® 14

Gauravaram, Praveen & Okeya, Katsuyuki (2008) Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. In Chen, Liqun, Ryan, Mark, & Wng, Guilin (Eds.) Information and Communications Security. Springer, Berlin, pp. 111-127.
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Annadurai, Suganya, Gauravaram, Praveen, & Hirose, Shoichi (2008) An update on the analysis and design of NMAC and HMAC functions. International Journal of Network Security, 7(1), pp. 49-60.

2009

Gauravaram, Praveen, Knudsen, Lars R., Matusiewicz, Krystian, Mendel, Florian, Rechberger, Christian, Schläffer, Martin, et al. (2009) Grøstl Addendum. (Unpublished)

Biryukov, Alex, Gauravaram, Praveen, Guo, Jian, Khovratovich, Dmitry, Ling, San, Matusiewicz, Krystian, et al. (2009) Cryptanalysis of the LAKE hash family. Lecture Notes in Computer Science : Fast Software Encryption, 5665, pp. 156-179.
Number of full-text downloads 15
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Gauravaram, Praveen, Knudsen, Lars R., Matusiewicz, Krystian, Mendel, Florian, Rechberger, Christian, Schläffer, Martin, et al. (2009) Grøstl. In The First SHA-3 Candidate Conference, February 25-28, 2009, K.U. Leuven, Belgium.

Gauravaram, Praveen & Knudsen, Lars R. (2009) On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. In Advances in Cryptology - EUROCRYPT 2009. Springer, Berlin, pp. 88-105.
Number of citations in Scopus 5
Number of citations in Web of Science® 5

Gauravaram, Praveen, Kelsey, John, Knudsen, Lars R., & Thomsen, Søren S. (2009) On hash functions using checksums. International Journal of Information Security, 9(2), pp. 137-151.
Number of citations in Scopus 7
Number of citations in Web of Science® 6

2010

Bagheri, Nasour, Gauravaram, Praveen, Naderi, Majid, & Sadeghiyan, Babak (2010) EPC: a provably secure permutation based compression function. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E93-A(10), pp. 1833-1836.

Rechberger, Christian, Bjorstad, Tor, Daemen, Joan, De Canniere, Christophe, & Gauravaram, Praveen (2010) SHA-3 Design and Cryptanalysis Report. (Unpublished)

Kumar, Ashish, Sanadhya, Somitra Kumar, Gauravaram, Praveen, Safkhani, Masoumeh, & Naderi, Majid (2010) Cryptanalysis of Tav-128 Hash Function. In Progress in Cryptology - INDOCRYPT 2010. Springer, Berlin, pp. 118-130.

Gauravaram, Praveen, Leurent, Gaëtan, Mendel, Florian, Naya-Plasencia, María, Peyrin, Thomas, Rechberger, Christian, et al. (2010) Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. In Progress in Cryptology – AFRICACRYPT 2010. Springer Berlin Heidelberg, pp. 419-436.
Number of citations in Scopus 6
Number of citations in Web of Science® 2

Gauravaram, Praveen & Knudsen, Lars R. (2010) Cryptographic hash functions. In Stavroulakis, Peter & Stamp, Mark (Eds.) Handbook of Information and Communication Security. Springer, Heidelberg, pp. 59-79.

Bagheri, Nasour, Gauravaram, Praveen, Naderi, Majid, & Thomsen, Søren S. (2010) On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. In Cryptology and Network Security. Springer, Berlin, pp. 96-105.

2011

Gauravaram, Praveen & Knudsen, Lars R. (2011) Cryptographic Hash Functions. In Encyclopedia of Information Assurance. Taylor & Francis.

Gauravaram, Praveen & Knudsen, Lars R. (2011) Security Analysis of Randomize-Hash-then-Sign Digital Signatures. Journal of Cryptology, 25(4), pp. 748-779.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Gauravaram, Praveen, Mendel, Florian, Naya-Plasencia, María, Rijmen, Vincent, & Toz, Deniz (2011) Intermediate Status Report. (Unpublished)

Gauravaram, Praveen, Knudsen, Lars R., Matusiewicz, Krystian, Mendel, Florian, Rechberger, Christian, Schläffer, Martin, et al. (2011) Grøstl - a SHA-3 candidate. (Unpublished)

Gauravaram, Praveen, Knudsen, Lars R., Bagheri, Nasour, & Wei, Lei (2011) Improved Security Analysis of Fugue-256 (Poster). In Information Security and Privacy. Springer Berlin Heidelberg, Berlin, pp. 428-432.

2012

Gauravaram, Praveen (2012) Security Analysis of salt||password Hashes. In Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on, IEEE, Kuala Lumpur, pp. 25-30.

Bagheri, Nasour, Gauravaram, Praveen, Knudsen, Lars R., & Zenner, Erik (2012) The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. International Journal of Information Security, 11(6), pp. 419-434.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

2013

Bagheri, Nasour, Gauravaram, Praveen, Safkhani, Masoumeh, & Sanadhya, Somitra Kumar (2013) Desynchronization and Traceability Attacks on RIPTA-DA Protocol. In Radio Frequency Identification. Springer Berlin Heidelberg, Berlin, pp. 57-68.

Aghili, Seyed Farhad, Bagheri, Nasour, Gauravaram, Praveen, Safkhani, Masoumeh, & Sanadhya, Somitra Kumar (2013) On the Security of Two RFID Mutual Authentication Protocols. In Radio Frequency Identification. Springer Berlin Heidelberg, Berlin, pp. 86-99.

2014

Gauravaram, Praveen, Bagheri, Nasour, & Knudsen, Lars R. (2014) Building indifferentiable compression functions from the PGV compression functions. Designs, Codes and Cryptography. (In Press)

Gauravaram, Praveen, Narumanchi, Harika, & Emmadi, Nitesh (2014) Analytical study of implementation issues of NTRU. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI 2014), IEEE, New Delhi, India, pp. 700-707.
Number of full-text downloads 23

Alizadeh, Javad, Alkhzaimi, Hoda A., Aref, Mohammad Reza, Bagheri, Nasour, Gauravaram, Praveen, Kumar, Abhishek, et al. (2014) Cryptanalysis of SIMON Variants with Connections. In Radio Frequency Identification: Security and Privacy Issues. Springer International Publishing, pp. 90-107.
Number of citations in Scopus 1

Kuppusamy, Lakshmi, Rangasamy, Jothi, & Gauravaram, Praveen (2014) On secure outsourcing of cryptographic computations to cloud. In Proceedings of the 2nd International Workshop on Security in Cloud Computing - SCC '14, ACM, pp. 63-68.

This list was generated on Sat May 23 12:37:28 2015 AEST.