Follow
Praveen Gauravaram
Praveen Gauravaram
Senior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSW
Verified email at tcs.com
Title
Cited by
Cited by
Year
Blockchain for IoT security and privacy: The case study of a smart home
A Dorri, SS Kanhere, R Jurdak, P Gauravaram
2017 IEEE international conference on pervasive computing and communications …, 2017
20832017
LSB: A Lightweight Scalable Blockchain for IoT security and anonymity
A Dorri, SS Kanhere, R Jurdak, P Gauravaram
Journal of Parallel and Distributed Computing 134, 180-197, 2019
5782019
Grøstl-a SHA-3 candidate
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2009
3292009
A holistic review of cybersecurity and reliability perspectives in smart airports
N Koroniotis, N Moustafa, F Schiliro, P Gauravaram, H Janicke
IEEE Access 8, 209802-209834, 2020
992020
Security Analysis of salt|| password Hashes
P Gauravaram
2012 International Conference on Advanced Computer Science Applications and …, 2012
782012
Cryptographic hash functions: cryptanalysis, design and applications
P Gauravaram
Queensland University of Technology, 2007
592007
Constructing secure hash functions by enhancing Merkle-Damgård construction
P Gauravaram, W Millan, E Dawson, K Viswanathan
Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006
552006
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2014
492014
Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015
472015
Linear cryptanalysis of round reduced SIMON
J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya
Cryptology ePrint Archive, 2013
422013
Linear-XOR and additive checksums don’t protect Damgård-Merkle hashes from generic attacks
P Gauravaram, J Kelsey
Cryptographers’ Track at the RSA Conference, 36-51, 2008
422008
Grøstl–a SHA-3 candidate. Submission to NIST, 2008
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
35
The sair-iiot cyber testbed as a service: A novel cybertwins architecture in iiot-based smart airports
N Koroniotis, N Moustafa, F Schiliro, P Gauravaram, H Janicke
IEEE Transactions on Intelligent Transportation Systems 24 (2), 2368-2381, 2021
262021
On hash functions using checksums
P Gauravaram, J Kelsey, LR Knudsen, SS Thomsen
International Journal of Information Security 9, 137-151, 2010
262010
Performance analysis of sorting of FHE data: integer-wise comparison vs bit-wise comparison
H Narumanchi, D Goyal, N Emmadi, P Gauravaram
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
252017
Improved linear cryptanalysis of reduced-round SIMON
MA Abdelraheem, J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, ...
Cryptology ePrint Archive, 2014
232014
Updates on sorting of fully homomorphic encrypted data
N Emmadi, P Gauravaram, H Narumanchi, H Syed
2015 International Conference on Cloud Computing Research and Innovation …, 2015
222015
Collision attacks on MD5 and SHA-1: Is this the “Sword of Damocles” for electronic commerce
P Gauravaram, A McCullagh, E Dawson
Information Security Institue (ISI), Queensland University of Technology …, 2006
212006
On randomizing hash functions to strengthen the security of digital signatures
P Gauravaram, LR Knudsen
Annual International Conference on the Theory and Applications of …, 2009
202009
Grøstl–a SHA-3 candidate. Submission to NIST (Round 3)(2011)
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
19
The system can't perform the operation now. Try again later.
Articles 1–20