Josyula Ramachandra Rao
Josyula Ramachandra Rao
IBM Research
Email confirmado em - Página inicial
Citado por
Citado por
Template attacks
S Chari, JR Rao, P Rohatgi
International Workshop on Cryptographic Hardware and Embedded Systems, 13-28, 2002
Towards sound approaches to counteract power-analysis attacks
S Chari, CS Jutla, JR Rao, P Rohatgi
Annual International Cryptology Conference, 398-412, 1999
The EM side—channel (s)
D Agrawal, B Archambeault, JR Rao, P Rohatgi
International workshop on cryptographic hardware and embedded systems, 29-45, 2002
A survey of security issues in multicast communications
MJ Moyer, JR Rao, P Rohatgi
IEEE network 13 (6), 12-23, 1999
A cautionary note regarding evaluation of AES candidates on smart-cards
S Chari, C Jutla, JR Rao, P Rohatgi
Second Advanced Encryption Standard Candidate Conference, 133-147, 1999
Multi-channel attacks
D Agrawal, JR Rao, P Rohatgi
International Workshop on Cryptographic Hardware and Embedded Systems, 2-16, 2003
Can pseudonymity really guarantee privacy?
JR Rao, P Rohatgi
USENIX Security Symposium, 85-96, 2000
Partitioning attacks: or how to rapidly clone some GSM cards
JR Rao, P Rohatgi, H Scherzer, S Tinguely
Proceedings 2002 IEEE Symposium on Security and Privacy, 31-41, 2002
Maintaining balanced key trees for secure multicast
MJ Moyer
IRTF Internet Draft, 1999
Adaptive cyber-security analytics
L Amini, M Christodorescu, MA Cohen, S Parthasarathy, J Rao, R Sailer, ...
US Patent 9,032,521, 2015
Security for the cloud infrastructure: Trusted virtual data center implementation
S Berger, R Cáceres, K Goldman, D Pendarakis, R Perez, JR Rao, E Rom, ...
IBM Journal of Research and Development 53 (4), 6: 1-6: 12, 2009
Intrusion detection system
S Chari, PC Cheng, J Rao, P Rohatgi, M Steiner
US Patent App. 11/037,695, 2006
Efficient implementation of Rijndael encryption with composite field arithmetic
A Rudra, PK Dubey, CS Jutla, V Kumar, JR Rao, P Rohatgi
An Introduction to Citadel: a secure crypto coprocessor for workstations
ER Palmer
IBM TJ Watson Research Center, 1992
Templates as master keys
D Agrawal, JR Rao, P Rohatgi, K Schramm
International Workshop on Cryptographic Hardware and Embedded Systems, 15-29, 2005
EMpowering Side-Channel Attacks.
JR Rao, P Rohatgi
IACR Cryptol. ePrint Arch. 2001, 37, 2001
Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure
S Berger, Y Chen, X Hu, D Pendarakis, J Rao, R Sailer, DL Schales, ...
US Patent 9,832,217, 2017
Space-efficient, side-channel attack resistant table lookups
SN Chari, JR Rao, P Rohatgi, H Scherzer
US Patent 7,142,670, 2006
A predicate transformer approach to semantics of parallel programs
CS Jutla, E Knapp, JR Rao
Proceedings of the eighth annual ACM Symposium on Principles of distributed …, 1989
A flexible security system for using Internet content
N Islam, R Anand, T Jaeger, JR Rao
IEEE Software 14 (5), 52-59, 1997
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20