Browse By Person: Gauravaram, Praveen
|Up a level|
Group by: Item Type | Date
Number of items: 11.
Annadurai, Suganya, Gauravaram, Praveen, & Hirose, Shoichi (2008) An update on the analysis and design of NMAC and HMAC functions. International Journal of Network Security, 7(1), pp. 49-60.
Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) The Legal & Practical Implications of Recent Attacks on 128-bit Cryptographic Hash Functions. First Monday, 11(1), pp. 17-35.
Gauravaram, Praveen & Millan, William (2004) Cryptanalysis of the Cellular Authentication and Voice Encryption Algorithm. Institute of Electronics, Information and Communication Engineers (IEICE) Electronics Express, 1(15), pp. 453-459.
Gauravaram, Praveen & Kelsey, John (2008) Linear -XOR and additive checksums don't protect Damgard-Merkle hashes from generic attacks. In Malkin, Tal (Ed.) Topics in Cryptology - CT-RSA 2008, 8-11 April 2008, United States of America, San Francisco,.
Gauravaram, Praveen & Foo, Ernest (2007) Designing Secure e-Contracting Systems. In CollECTeR 2007 - 21st Conference on eCommerce / 10th Anniversary CollECTeR Australia conference, 9-11 December 2007, Melbourne.
Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) Collision Attacks on MD5 and SHA-1: Is this the 'Sword of Damocles' for Electronic Commerce? In Clark, A, McPherson, M, & Mohay, G (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006, University of Queensland, Australia, Gold Coast, pp. 73-88.
Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Gauravaram, Praveen, May, Lauren, & Millan, William (2004) CRUSH: A New Cryptographic Hash Function Using Iterated Halving Technique. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.
Gauravaram, Praveen S. & Millan, William L. (2004) Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). In International Workshop on Cryptographic Algorithms and their Uses, July, 2004, Gold Coast, Australia.
Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Gauravaram, Praveen S., McNamara, Judith, & O'Shea, Kathryn L. (2007) Electronic Contract Administration – Legal and Security Issues Research Report.
Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Josang, Audun, Gauravaram, Praveen S., O'Shea, Kathryn L., et al. (2006) Electronic Contract Administration – Legal and Security Issues Literature Review.