Rajendra Katti
Rajendra Katti
University of Washington Tacoma
Verified email at
Cited by
Cited by
Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation
M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, WS Poon, ...
IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2017
A secure identification and key agreement protocol with user anonymity (SIKA)
K Mangipudi, R Katti
Computers & Security 25 (6), 420-425, 2006
Multiple-output low-power linear feedback shift register design
RS Katti, X Ruan, H Khattri
IEEE Transactions on Circuits and Systems I: Regular Papers 53 (7), 1487-1495, 2006
Efficient hardware implementation of a new pseudo-random bit sequence generator
RS Katti, SK Srinivasan
2009 IEEE international symposium on circuits and systems, 1393-1396, 2009
Pseudorandom bit generation using coupled congruential generators
RS Katti, RG Kavasseri, V Sai
IEEE Transactions on Circuits and Systems II: Express Briefs 57 (3), 203-207, 2010
An efficient data-independent technique for compressing test vectors in systems-on-a-chip
X Ruan, R Katti
IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and …, 2006
A new residue arithmetic error correction scheme
RS Katti
IEEE transactions on computers 45 (1), 13-19, 1996
On the security of randomized arithmetic codes against ciphertext-only attacks
RS Katti, SK Srinivasan, A Vosoughi
IEEE Transactions on Information Forensics and Security 6 (1), 19-27, 2010
Low complexity multiplication in a finite field using ring representation
R Katti, J Brennan
IEEE Transactions on Computers 52 (4), 418-427, 2003
A variable length fast message authentication code for secure communication in smart grids
R Sule, RS Katti, RG Kavasseri
2012 IEEE Power and Energy Society General Meeting, 1-6, 2012
Secure pseudo-random bit sequence generation using coupled linear congruential generators
RS Katti, RG Kavasseri
2008 IEEE International Symposium on Circuits and Systems (ISCAS), 2929-2932, 2008
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols
B David, R Dowsley, R Katti, ACA Nascimento
International Conference on Provable Security, 354-367, 2015
Achieving network on chip fault tolerance by adaptive remapping
C Ababei, R Katti
2009 IEEE International Symposium on Parallel & Distributed Processing, 1-4, 2009
A Hash-based Strong Password Authentication Protocol with User Anonymity.
KV Mangipudi, RS Katti
Int. J. Netw. Secur. 2 (3), 205-209, 2006
Left-to-right optimal signed-binary representation of a pair of integers
X Ruan, RS Katti
IEEE Transactions on Computers 54 (2), 124-131, 2005
The alternating greedy expansion and applications to computing digit expansions from left-to-right in cryptography
C Heuberger, R Katti, H Prodinger, X Ruan
Theoretical computer science 341 (1-3), 55-72, 2005
A modified Booth algorithm for high radix fixed-point multiplication
R Katti
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2 (4), 522-524, 1994
Authentication and Key Agreement Protocols Preserving Anonymity.
KV Mangipudi, RS Katti, H Fu
Int. J. Netw. Secur. 3 (3), 259-270, 2006
Speeding up elliptic cryptosystems using a new signed binary representation for integers
R Katti
Proceedings Euromicro Symposium on Digital System Design. Architectures …, 2002
Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol
K Mangipudi, N Malneedi, R Katti, H Fu
IEEE Global Telecommunications Conference, 2004. GLOBECOM'04. 4, 2229-2234, 2004
The system can't perform the operation now. Try again later.
Articles 1–20