| Blockchain for IoT security and privacy: The case study of a smart home A Dorri, SS Kanhere, R Jurdak, P Gauravaram 2017 IEEE international conference on pervasive computing and communications …, 2017 | 2468 | 2017 |
| LSB: A Lightweight Scalable Blockchain for IoT security and anonymity A Dorri, SS Kanhere, R Jurdak, P Gauravaram Journal of Parallel and Distributed Computing 134, 180-197, 2019 | 683 | 2019 |
| Grøstl-a SHA-3 candidate P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... Schloss Dagstuhl–Leibniz-Zentrum für Informatik, 2009 | 363 | 2009 |
| A holistic review of cybersecurity and reliability perspectives in smart airports N Koroniotis, N Moustafa, F Schiliro, P Gauravaram, H Janicke IEEE Access 8, 209802-209834, 2020 | 214 | 2020 |
| Security Analysis of salt|| password Hashes P Gauravaram 2012 International Conference on Advanced Computer Science Applications and …, 2012 | 98 | 2012 |
| Cryptographic hash functions: cryptanalysis, design and applications P Gauravaram Queensland University of Technology, 2007 | 74 | 2007 |
| Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems HT Bui, H Aboutorab, A Mahboubi, Y Gao, NH Sultan, A Chauhan, ... Computers & Security 140, 103754, 2024 | 68 | 2024 |
| A framework for migrating to post-quantum cryptography: security dependency analysis and case studies KF Hasan, L Simpson, MAR Baee, C Islam, Z Rahman, W Armstrong, ... IEEE Access 12, 23427-23450, 2024 | 65 | 2024 |
| The sair-iiot cyber testbed as a service: A novel cybertwins architecture in iiot-based smart airports N Koroniotis, N Moustafa, F Schiliro, P Gauravaram, H Janicke IEEE Transactions on Intelligent Transportation Systems 24 (2), 2368-2381, 2021 | 57 | 2021 |
| Constructing secure hash functions by enhancing Merkle-Damgård construction P Gauravaram, W Millan, E Dawson, K Viswanathan Australasian Conference on Information Security and Privacy, 407-420, 2006 | 57 | 2006 |
| Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48 MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... International Conference on Cryptology in India, 153-179, 2015 | 56 | 2015 |
| Cryptanalysis of SIMON variants with connections J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ... International Workshop on Radio Frequency Identification: Security and …, 2014 | 53 | 2014 |
| Linear cryptanalysis of round reduced SIMON J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya Cryptology ePrint Archive, 2013 | 45 | 2013 |
| Linear-XOR and additive checksums don’t protect Damgård-Merkle hashes from generic attacks P Gauravaram, J Kelsey Cryptographers’ Track at the RSA Conference, 36-51, 2008 | 43 | 2008 |
| Performance analysis of sorting of FHE data: integer-wise comparison vs bit-wise comparison H Narumanchi, D Goyal, N Emmadi, P Gauravaram 2017 IEEE 31st International Conference on Advanced Information Networking …, 2017 | 35 | 2017 |
| Updates on sorting of fully homomorphic encrypted data N Emmadi, P Gauravaram, H Narumanchi, H Syed 2015 International Conference on Cloud Computing Research and Innovation …, 2015 | 32 | 2015 |
| A deep learning-based penetration testing framework for vulnerability identification in internet of things environments N Koroniotis, N Moustafa, B Turnbull, F Schiliro, P Gauravaram, H Janicke 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021 | 30 | 2021 |
| On hash functions using checksums P Gauravaram, J Kelsey, LR Knudsen, SS Thomsen International Journal of Information Security 9 (2), 137-151, 2010 | 28 | 2010 |
| Improved linear cryptanalysis of reduced-round SIMON MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Cryptology ePrint Archive, 2014 | 27 | 2014 |
| Weak-key analysis for BIKE post-quantum key encapsulation mechanism MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ... IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023 | 26 | 2023 |