2009 |
9 | EE | Praveen Gauravaram,
Lars R. Knudsen:
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures.
EUROCRYPT 2009: 88-105 |
2008 |
8 | EE | Praveen Gauravaram,
John Kelsey:
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks.
CT-RSA 2008: 36-51 |
7 | EE | Praveen Gauravaram,
Katsuyuki Okeya:
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements.
ICICS 2008: 111-127 |
2007 |
6 | EE | Praveen Gauravaram,
Katsuyuki Okeya:
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions.
INDOCRYPT 2007: 393-403 |
2006 |
5 | EE | Praveen Gauravaram,
William Millan,
Ed Dawson,
Kapali Viswanathan:
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction.
ACISP 2006: 407-420 |
4 | EE | Praveen Gauravaram,
Adrian McCullagh,
Ed Dawson:
The legal and practical implications of recent attacks on 128-bit cryptographic hash functions.
First Monday 11(1): (2006) |
2004 |
3 | | Praveen Gauravaram,
William Millan:
Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE).
Cryptographic Algorithms and their Uses 2004: 1-13 |
2 | | Praveen Gauravaram,
William Millan,
Lauren May:
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique.
Cryptographic Algorithms and their Uses 2004: 28-39 |
1 | EE | William Millan,
Praveen Gauravaram:
Cryptanalysis of the cellular authentication and voice encryption algorithm.
IEICE Electronic Express 1(15): 453-459 (2004) |