Blockchain for IoT security and privacy: The case study of a smart home A Dorri, SS Kanhere, R Jurdak, P Gauravaram 2017 IEEE international conference on pervasive computing and communications …, 2017 | 1785 | 2017 |
LSB: A Lightweight Scalable Blockchain for IoT security and anonymity A Dorri, SS Kanhere, R Jurdak, P Gauravaram Journal of Parallel and Distributed Computing 134, 180-197, 2019 | 469 | 2019 |
Grøstl-a SHA-3 candidate P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... Dagstuhl Seminar Proceedings, 2009 | 309 | 2009 |
Security Analysis of salt|| password Hashes P Gauravaram 2012 International Conference on Advanced Computer Science Applications and …, 2012 | 70 | 2012 |
Cryptographic hash functions: cryptanalysis, design and applications P Gauravaram Queensland University of Technology, 2007 | 54 | 2007 |
Constructing secure hash functions by enhancing Merkle-Damgård construction P Gauravaram, W Millan, E Dawson, K Viswanathan Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006 | 53 | 2006 |
Cryptanalysis of SIMON variants with connections J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ... Radio Frequency Identification: Security and Privacy Issues: 10th …, 2014 | 49 | 2014 |
Linear cryptanalysis of round reduced SIMON J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya Cryptology ePrint Archive, 2013 | 47 | 2013 |
A holistic review of cybersecurity and reliability perspectives in smart airports N Koroniotis, N Moustafa, F Schiliro, P Gauravaram, H Janicke IEEE Access 8, 209802-209834, 2020 | 46 | 2020 |
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48 MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015 | 45 | 2015 |
Linear-XOR and additive checksums don’t protect Damgård-Merkle hashes from generic attacks P Gauravaram, J Kelsey Topics in Cryptology–CT-RSA 2008: The Cryptographers’ Track at the RSA …, 2008 | 41 | 2008 |
Grøstl–a SHA-3 candidate. Submission to NIST (2008) P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... | 31 | |
On hash functions using checksums P Gauravaram, J Kelsey, LR Knudsen, SS Thomsen International Journal of Information Security 9, 137-151, 2010 | 25 | 2010 |
Improved linear cryptanalysis of reduced-round SIMON MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ... Cryptology ePrint Archive, 2014 | 24 | 2014 |
Updates on sorting of fully homomorphic encrypted data N Emmadi, P Gauravaram, H Narumanchi, H Syed 2015 International Conference on Cloud Computing Research and Innovation …, 2015 | 21 | 2015 |
Collision attacks on MD5 and SHA-1: Is this the “Sword of Damocles” for electronic commerce P Gauravaram, A McCullagh, E Dawson Information Security Institue (ISI), Queensland University of Technology …, 2006 | 21 | 2006 |
On randomizing hash functions to strengthen the security of digital signatures P Gauravaram, LR Knudsen Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 20 | 2009 |
Performance analysis of sorting of FHE data: integer-wise comparison vs bit-wise comparison H Narumanchi, D Goyal, N Emmadi, P Gauravaram 2017 IEEE 31st International Conference on Advanced Information Networking …, 2017 | 18 | 2017 |
Improved Linear Cryptanalysis of Round Reduced SIMON. J Alizadeh, H AlKhzaimi, MR Aref, N Bagheri, P Gauravaram, ... IACR Cryptol. ePrint Arch. 2014 (681), 2014 | 18 | 2014 |
Grøstl–a SHA-3 candidate. Submission to NIST (Round 3)(2011) P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... | 18 | |