Praveen Gauravaram
Praveen Gauravaram
Senior Scientist and Innovation Evangelist, Tata Consultancy Services
Verified email at tcs.com
TitleCited byYear
Blockchain for IoT security and privacy: The case study of a smart home
A Dorri, SS Kanhere, R Jurdak, P Gauravaram
2017 IEEE international conference on pervasive computing and communications …, 2017
4292017
Grøstl-a SHA-3 candidate
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Dagstuhl Seminar Proceedings, 2009
2412009
Lsb: A lightweight scalable blockchain for iot security and privacy
A Dorri, SS Kanhere, R Jurdak, P Gauravaram
arXiv preprint arXiv:1712.02969, 2017
522017
Constructing secure hash functions by enhancing Merkle-Damgård construction
P Gauravaram, W Millan, E Dawson, K Viswanathan
Australasian Conference on Information Security and Privacy, 407-420, 2006
442006
Linear-XOR and additive checksums don’t protect Damgård-Merkle hashes from generic attacks
P Gauravaram, J Kelsey
Cryptographers’ Track at the RSA Conference, 36-51, 2008
392008
Cryptographic hash functions: cryptanalysis, design and applications
P Gauravaram
Queensland University of Technology, 2007
392007
Linear Cryptanalysis of Round Reduced SIMON.
J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya
IACR Cryptology ePrint Archive 2013, 663, 2013
372013
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2015
312015
Security Analysis of salt|| password Hashes
P Gauravaram
2012 International Conference on Advanced Computer Science Applications and …, 2012
312012
Grøstl–a SHA-3 candidate. Submission to NIST (2008)
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
29
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
International Conference on Cryptology in India, 153-179, 2015
252015
On hash functions using checksums
P Gauravaram, J Kelsey, LR Knudsen, SS Thomsen
International Journal of Information Security 9 (2), 137-151, 2010
202010
Collision attacks on MD5 and SHA-1: Is this the “Sword of Damocles” for electronic commerce
P Gauravaram, A McCullagh, E Dawson
Information Security Institue (ISI), Queensland University of Technology …, 2006
202006
On randomizing hash functions to strengthen the security of digital signatures
P Gauravaram, LR Knudsen
Annual International Conference on the Theory and Applications of …, 2009
172009
Grøstl–a SHA-3 candidate. Submission to NIST (Round 3)(2011)
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
17
Grøstl: a SHA-3 candidate, 2011
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Submission to NIST’s SHA-3 competition, 0
16
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique.
P Gauravaram, W Millan, L May
Cryptographic Algorithms and their Uses, 28-39, 2004
152004
Side channel analysis of some hash based MACs: a response to SHA-3 requirements
P Gauravaram, K Okeya
International Conference on Information and Communications Security, 111-127, 2008
142008
Cryptanalysis of a class of cryptographic hash functions
P Gauravaram, J Kelsey
practice 25 (26), 36, 2007
142007
3C-A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function. The preliminary draft version of this work …
P Gauravaram, W Millan, JG Neito, E Dawson
142005
The system can't perform the operation now. Try again later.
Articles 1–20