Browse By Person: Gauravaram, Praveen

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 38.

Book Chapter

Alizadeh, Javad, Alkhzaimi, Hoda A., Aref, Mohammad Reza, Bagheri, Nasour, Gauravaram, Praveen, Kumar, Abhishek, et al. (2014) Cryptanalysis of SIMON Variants with Connections. In Radio Frequency Identification: Security and Privacy Issues. Springer International Publishing, pp. 90-107.
Number of citations in Scopus 1

Bagheri, Nasour, Gauravaram, Praveen, Safkhani, Masoumeh, & Sanadhya, Somitra Kumar (2013) Desynchronization and Traceability Attacks on RIPTA-DA Protocol. In Radio Frequency Identification. Springer Berlin Heidelberg, Berlin, pp. 57-68.

Aghili, Seyed Farhad, Bagheri, Nasour, Gauravaram, Praveen, Safkhani, Masoumeh, & Sanadhya, Somitra Kumar (2013) On the Security of Two RFID Mutual Authentication Protocols. In Radio Frequency Identification. Springer Berlin Heidelberg, Berlin, pp. 86-99.

Gauravaram, Praveen, Knudsen, Lars R., Bagheri, Nasour, & Wei, Lei (2011) Improved Security Analysis of Fugue-256 (Poster). In Information Security and Privacy. Springer Berlin Heidelberg, Berlin, pp. 428-432.

Kumar, Ashish, Sanadhya, Somitra Kumar, Gauravaram, Praveen, Safkhani, Masoumeh, & Naderi, Majid (2010) Cryptanalysis of Tav-128 Hash Function. In Progress in Cryptology - INDOCRYPT 2010. Springer, Berlin, pp. 118-130.

Gauravaram, Praveen, Leurent, Gaëtan, Mendel, Florian, Naya-Plasencia, María, Peyrin, Thomas, Rechberger, Christian, et al. (2010) Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. In Progress in Cryptology – AFRICACRYPT 2010. Springer Berlin Heidelberg, pp. 419-436.
Number of citations in Scopus 6
Number of citations in Web of Science® 3

Gauravaram, Praveen & Knudsen, Lars R. (2010) Cryptographic hash functions. In Stavroulakis, Peter & Stamp, Mark (Eds.) Handbook of Information and Communication Security. Springer, Heidelberg, pp. 59-79.

Bagheri, Nasour, Gauravaram, Praveen, Naderi, Majid, & Thomsen, Søren S. (2010) On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. In Cryptology and Network Security. Springer, Berlin, pp. 96-105.

Gauravaram, Praveen & Knudsen, Lars R. (2009) On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. In Advances in Cryptology - EUROCRYPT 2009. Springer, Berlin, pp. 88-105.
Number of citations in Scopus 5
Number of citations in Web of Science® 5

Gauravaram, Praveen & Okeya, Katsuyuki (2008) Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. In Chen, Liqun, Ryan, Mark, & Wng, Guilin (Eds.) Information and Communications Security. Springer, Berlin, pp. 111-127.
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Journal Article

Gauravaram, Praveen, Bagheri, Nasour, & Knudsen, Lars R. (2014) Building indifferentiable compression functions from the PGV compression functions. Designs, Codes and Cryptography. (In Press)

Bagheri, Nasour, Gauravaram, Praveen, Knudsen, Lars R., & Zenner, Erik (2012) The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. International Journal of Information Security, 11(6), pp. 419-434.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Gauravaram, Praveen & Knudsen, Lars R. (2011) Security Analysis of Randomize-Hash-then-Sign Digital Signatures. Journal of Cryptology, 25(4), pp. 748-779.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Bagheri, Nasour, Gauravaram, Praveen, Naderi, Majid, & Sadeghiyan, Babak (2010) EPC: a provably secure permutation based compression function. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E93-A(10), pp. 1833-1836.

Biryukov, Alex, Gauravaram, Praveen, Guo, Jian, Khovratovich, Dmitry, Ling, San, Matusiewicz, Krystian, et al. (2009) Cryptanalysis of the LAKE hash family. Lecture Notes in Computer Science : Fast Software Encryption, 5665, pp. 156-179.
Number of full-text downloads 21
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Gauravaram, Praveen, Kelsey, John, Knudsen, Lars R., & Thomsen, Søren S. (2009) On hash functions using checksums. International Journal of Information Security, 9(2), pp. 137-151.
Number of citations in Scopus 7
Number of citations in Web of Science® 6

Annadurai, Suganya, Gauravaram, Praveen, & Hirose, Shoichi (2008) An update on the analysis and design of NMAC and HMAC functions. International Journal of Network Security, 7(1), pp. 49-60.

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) The Legal & Practical Implications of Recent Attacks on 128-bit Cryptographic Hash Functions. First Monday, 11(1), pp. 17-35.
Number of citations in Scopus 1

Gauravaram, Praveen & Millan, William (2004) Cryptanalysis of the Cellular Authentication and Voice Encryption Algorithm. Institute of Electronics, Information and Communication Engineers (IEICE) Electronics Express, 1(15), pp. 453-459.

Conference Paper

Gauravaram, Praveen, Narumanchi, Harika, & Emmadi, Nitesh (2014) Analytical study of implementation issues of NTRU. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI 2014), IEEE, New Delhi, India, pp. 700-707.
Number of full-text downloads 52

Kuppusamy, Lakshmi, Rangasamy, Jothi, & Gauravaram, Praveen (2014) On secure outsourcing of cryptographic computations to cloud. In Proceedings of the 2nd International Workshop on Security in Cloud Computing - SCC '14, ACM, pp. 63-68.

Gauravaram, Praveen (2012) Security Analysis of salt||password Hashes. In Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on, IEEE, Kuala Lumpur, pp. 25-30.

Gauravaram, Praveen & Kelsey, John (2008) Linear -XOR and additive checksums don't protect Damgard-Merkle hashes from generic attacks. In Malkin, Tal (Ed.) Topics in Cryptology - CT-RSA 2008, 8-11 April 2008, United States of America, San Francisco,.
Number of citations in Scopus 10
Number of citations in Web of Science® 15

Gauravaram, Praveen & Foo, Ernest (2007) Designing Secure e-Contracting Systems. In CollECTeR 2007 - 21st Conference on eCommerce / 10th Anniversary CollECTeR Australia conference, 9-11 December 2007, Melbourne.
Number of full-text downloads 467

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) Collision Attacks on MD5 and SHA-1: Is this the 'Sword of Damocles' for Electronic Commerce? In Clark, A, McPherson, M, & Mohay, G (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006, University of Queensland, Australia, Gold Coast, pp. 73-88.

Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 6
Number of citations in Web of Science® 12

Gauravaram, Praveen, May, Lauren, & Millan, William (2004) CRUSH: A New Cryptographic Hash Function Using Iterated Halving Technique. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.

Gauravaram, Praveen S. & Millan, William L. (2004) Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). In International Workshop on Cryptographic Algorithms and their Uses, July, 2004, Gold Coast, Australia.
Number of full-text downloads 756

Conference Item

Gauravaram, Praveen, Knudsen, Lars R., Matusiewicz, Krystian, Mendel, Florian, Rechberger, Christian, Schläffer, Martin, et al. (2009) Grøstl. In The First SHA-3 Candidate Conference, February 25-28, 2009, K.U. Leuven, Belgium.

Reference Entry

Gauravaram, Praveen & Knudsen, Lars R. (2011) Cryptographic Hash Functions. In Encyclopedia of Information Assurance. Taylor & Francis.

Report

Gauravaram, Praveen, Mendel, Florian, Naya-Plasencia, María, Rijmen, Vincent, & Toz, Deniz (2011) Intermediate Status Report. (Unpublished)

Rechberger, Christian, Bjorstad, Tor, Daemen, Joan, De Canniere, Christophe, & Gauravaram, Praveen (2010) SHA-3 Design and Cryptanalysis Report. (Unpublished)

QUT Thesis

Gauravaram, Praveen (2007) Cryptographic hash functions : cryptanalysis, design and applications. PhD thesis, Queensland University of Technology.
Number of full-text downloads 4,439

Other

Gauravaram, Praveen, Knudsen, Lars R., Matusiewicz, Krystian, Mendel, Florian, Rechberger, Christian, Schläffer, Martin, et al. (2011) Grøstl - a SHA-3 candidate. (Unpublished)

Gauravaram, Praveen, Knudsen, Lars R., Matusiewicz, Krystian, Mendel, Florian, Rechberger, Christian, Schläffer, Martin, et al. (2009) Grøstl Addendum. (Unpublished)

Gauravaram, Praveen, Knudsen, Lars R., Matusiewicz, Krystian, Mendel, Florian, Rechberger, Christian, Schläffer, Martin, et al. (2008) Grøstl – a SHA-3 candidate. (Unpublished)

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Gauravaram, Praveen S., McNamara, Judith, & O'Shea, Kathryn L. (2007) Electronic Contract Administration – Legal and Security Issues Research Report.
Number of full-text downloads 880

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Josang, Audun, Gauravaram, Praveen S., O'Shea, Kathryn L., et al. (2006) Electronic Contract Administration – Legal and Security Issues Literature Review.

This list was generated on Sat Aug 29 12:38:17 2015 AEST.