| Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols D Stebila, L Kuppusamy, J Rangasamy, C Boyd, J Gonzalez Nieto Cryptographers’ Track at the RSA Conference, 284-301, 2011 | 76 | 2011 |
| An integrated approach to cryptographic mitigation of denial-of-service attacks J Rangasamy, D Stebila, C Boyd, JG Nieto Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 23 | 2011 |
| Publicly verifiable ciphertexts JM González Nieto, M Manulis, B Poettering, J Rangasamy, D Stebila International Conference on Security and Cryptography for Networks, 393-410, 2012 | 19* | 2012 |
| Revisiting single-server algorithms for outsourcing modular exponentiation J Rangasamy, L Kuppusamy International Conference on Cryptology in India, 3-20, 2018 | 14 | 2018 |
| CRT-based outsourcing algorithms for modular exponentiations L Kuppusamy, J Rangasamy International Conference on Cryptology in India, 81-98, 2016 | 14 | 2016 |
| Efficient modular exponentiation-based puzzles for denial-of-service protection J Rangasamy, D Stebila, L Kuppusamy, C Boyd, J Gonzalez Nieto International Conference on Information Security and Cryptology, 319-331, 2011 | 13 | 2011 |
| Hide the modulus: a secure non-interactive fully verifiable delegation scheme for modular exponentiations via CRT O Uzunkol, J Rangasamy, L Kuppusamy International Conference on Information Security, 250-267, 2018 | 10 | 2018 |
| Practical client puzzles in the standard model L Kuppusamy, J Rangasamy, D Stebila, C Boyd, JG Nieto Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 10 | 2012 |
| Practical and efficient PUF-based protocol for authentication and key agreement in IoT S Manivannan, RS Chakraborty, I Chakrabarti, J Ramalingam IEEE Embedded Systems Letters 16 (2), 118-121, 2023 | 8 | 2023 |
| Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE R Selvam, D Shanmugam, S Annadurai, J Rangasamy International Conference on Security, Privacy, and Applied Cryptography …, 2016 | 7 | 2016 |
| Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy L Kuppusamy, J Rangasamy, D Stebila, C Boyd, J Gonzalez Nieto International Conference on Cryptology in India, 379-398, 2011 | 5 | 2011 |
| Cryptographic approaches to denial-of-service resistance C Boyd, J Gonzalez-Nieto, L Kuppusamy, H Narasimhan, CP Rangan, ... An Investigation into the Detection and Mitigation of Denial of Service (DoS …, 2011 | 5 | 2011 |
| A hybrid machine learning strategy for aquatic plant surveillance in sustainable aqua-ecosystems using IoT attributes D Palanikkumar, T Anuradha, J Ramalingam, SS Sivaraju Aquaculture 609, 742779, 2025 | 3 | 2025 |
| On efficient parallel secure outsourcing of modular exponentiation to cloud for IoT applications S Rath, J Ramalingam, CC Lee Mathematics 12 (5), 713, 2024 | 3 | 2024 |
| ES-HAS: ECC-based secure handover authentication scheme for roaming mobile user in global mobility networks S KS, J Rangasamy, S S. Kamath, CC Lee Cryptography 5 (4), 35, 2021 | 3 | 2021 |
| On “Practical and secure outsourcing algorithms for solving quadratic congruences in IoTs” from IEEE IoT journal J Rangasamy Discrete Applied Mathematics 302, 139-146, 2021 | 2 | 2021 |
| Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services J Rangasamy, L Kuppusamy, G Krishnan, Velmurugan International Journal of Information and Computer Security 9 (1-2), 114-129, 2017 | 2 | 2017 |
| Improved Cryptographic Puzzle Based on Modular Exponentiation L Kuppusamy, J Rangasamy Mathematics and Computing: ICMC, Haldia, India, January 2015, 107-121, 2015 | 2 | 2015 |
| On secure outsourcing of cryptographic computations to cloud L Kuppusamy, J Rangasamy, P Gauravaram Proceedings of the 2nd international workshop on Security in cloud computing …, 2014 | 2 | 2014 |
| Effort-release public-key encryption from cryptographic puzzles J Rangasamy, D Stebila, C Boyd, JM González-Nieto, L Kuppusamy Australasian Conference on Information Security and Privacy, 194-207, 2012 | 2 | 2012 |