[go: up one dir, main page]

Follow
Jothi Rangasamy a.k.a Jothi Ramalingam
Jothi Rangasamy a.k.a Jothi Ramalingam
Verified email at nitk.edu.in - Homepage
Title
Cited by
Cited by
Year
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
D Stebila, L Kuppusamy, J Rangasamy, C Boyd, J Gonzalez Nieto
Cryptographers’ Track at the RSA Conference, 284-301, 2011
762011
An integrated approach to cryptographic mitigation of denial-of-service attacks
J Rangasamy, D Stebila, C Boyd, JG Nieto
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
232011
Publicly verifiable ciphertexts
JM González Nieto, M Manulis, B Poettering, J Rangasamy, D Stebila
International Conference on Security and Cryptography for Networks, 393-410, 2012
19*2012
Revisiting single-server algorithms for outsourcing modular exponentiation
J Rangasamy, L Kuppusamy
International Conference on Cryptology in India, 3-20, 2018
142018
CRT-based outsourcing algorithms for modular exponentiations
L Kuppusamy, J Rangasamy
International Conference on Cryptology in India, 81-98, 2016
142016
Efficient modular exponentiation-based puzzles for denial-of-service protection
J Rangasamy, D Stebila, L Kuppusamy, C Boyd, J Gonzalez Nieto
International Conference on Information Security and Cryptology, 319-331, 2011
132011
Hide the modulus: a secure non-interactive fully verifiable delegation scheme for modular exponentiations via CRT
O Uzunkol, J Rangasamy, L Kuppusamy
International Conference on Information Security, 250-267, 2018
102018
Practical client puzzles in the standard model
L Kuppusamy, J Rangasamy, D Stebila, C Boyd, JG Nieto
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
102012
Practical and efficient PUF-based protocol for authentication and key agreement in IoT
S Manivannan, RS Chakraborty, I Chakrabarti, J Ramalingam
IEEE Embedded Systems Letters 16 (2), 118-121, 2023
82023
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE
R Selvam, D Shanmugam, S Annadurai, J Rangasamy
International Conference on Security, Privacy, and Applied Cryptography …, 2016
72016
Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy
L Kuppusamy, J Rangasamy, D Stebila, C Boyd, J Gonzalez Nieto
International Conference on Cryptology in India, 379-398, 2011
52011
Cryptographic approaches to denial-of-service resistance
C Boyd, J Gonzalez-Nieto, L Kuppusamy, H Narasimhan, CP Rangan, ...
An Investigation into the Detection and Mitigation of Denial of Service (DoS …, 2011
52011
A hybrid machine learning strategy for aquatic plant surveillance in sustainable aqua-ecosystems using IoT attributes
D Palanikkumar, T Anuradha, J Ramalingam, SS Sivaraju
Aquaculture 609, 742779, 2025
32025
On efficient parallel secure outsourcing of modular exponentiation to cloud for IoT applications
S Rath, J Ramalingam, CC Lee
Mathematics 12 (5), 713, 2024
32024
ES-HAS: ECC-based secure handover authentication scheme for roaming mobile user in global mobility networks
S KS, J Rangasamy, S S. Kamath, CC Lee
Cryptography 5 (4), 35, 2021
32021
On “Practical and secure outsourcing algorithms for solving quadratic congruences in IoTs” from IEEE IoT journal
J Rangasamy
Discrete Applied Mathematics 302, 139-146, 2021
22021
Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services
J Rangasamy, L Kuppusamy, G Krishnan, Velmurugan
International Journal of Information and Computer Security 9 (1-2), 114-129, 2017
22017
Improved Cryptographic Puzzle Based on Modular Exponentiation
L Kuppusamy, J Rangasamy
Mathematics and Computing: ICMC, Haldia, India, January 2015, 107-121, 2015
22015
On secure outsourcing of cryptographic computations to cloud
L Kuppusamy, J Rangasamy, P Gauravaram
Proceedings of the 2nd international workshop on Security in cloud computing …, 2014
22014
Effort-release public-key encryption from cryptographic puzzles
J Rangasamy, D Stebila, C Boyd, JM González-Nieto, L Kuppusamy
Australasian Conference on Information Security and Privacy, 194-207, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20