Ramarathnam Venkatesan


Ontology type: schema:Person     


Person Info

NAME

Ramarathnam

SURNAME

Venkatesan

Publications in SciGraph latest 50 shown

  • 2014 Randomly Partitioned Encryption for Cloud Databases in DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII
  • 2012 Threshold Discernible Ring Signatures in E-BUSINESS AND TELECOMMUNICATIONS
  • 2010 Founding Cryptography on Tamper-Proof Hardware Tokens in THEORY OF CRYPTOGRAPHY
  • 2009 Tamper-Tolerant Software: Modeling and Implementation in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2008 The Long-Short-Key Primitive and Its Applications to Key Security in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2008 Constraint-Based Invariant Inference over Predicate Abstraction in VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION
  • 2008 Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys in ADVANCES IN CRYPTOLOGY – CRYPTO 2008
  • 2008 The Superdiversifier: Peephole Individualization for Software Protection in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2007 Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection in INFORMATION HIDING
  • 2007 On the Bits of Elliptic Curve Diffie-Hellman Keys in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2007
  • 2007 Inversion Attacks on Secure Hash Functions Using sat Solvers in THEORY AND APPLICATIONS OF SATISFIABILITY TESTING – SAT 2007
  • 2007 Run-Time Randomization to Mitigate Tampering in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2007 Digit Set Randomization in Elliptic Curve Cryptography in STOCHASTIC ALGORITHMS: FOUNDATIONS AND APPLICATIONS
  • 2007 A Graph Game Model for Software Tamper Protection in INFORMATION HIDING
  • 2006 Spectral Analysis of Pollard Rho Collisions in ALGORITHMIC NUMBER THEORY
  • 2006 MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers in TOPICS IN CRYPTOLOGY – CT-RSA 2007
  • 2005-12 Watermarking via optimization algorithms for quantizing randomized semi-global image statistics in MULTIMEDIA SYSTEMS
  • 2005-12 An improved attack analysis on a public-key spread spectrum watermarking in MULTIMEDIA SYSTEMS
  • 2005 Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2005
  • 2003 A Message Authentication Code Based on Unimodular Matrix Groups in ADVANCES IN CRYPTOLOGY - CRYPTO 2003
  • 2002-12-18 Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks in INFORMATION HIDING
  • 2002-12-18 Oblivious Hashing: A Stealthy Software Integrity Verification Primitive in INFORMATION HIDING
  • 2002 Random Cayley Digraphs and the Discrete Logarithm in ALGORITHMIC NUMBER THEORY
  • 2002 New Iterative Geometric Methods for Robust Perceptual Image Hashing in SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT
  • 2001-07-13 Foiling Birthday Attacks in Length-Doubling Transformations in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’96
  • 2001-07-13 Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes in ADVANCES IN CRYPTOLOGY — CRYPTO ’96
  • 2001-05-18 High-Speed Pseudorandom Number Generation with Small Memory in FAST SOFTWARE ENCRYPTION
  • 2001-05-18 Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions in ADVANCES IN CRYPTOLOGY — CRYPTO’ 92
  • 2001 A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding in INFORMATION HIDING
  • 2001 A Graph Theoretic Approach to Software Watermarking in INFORMATION HIDING
  • 1998-10-16 New Constructions for Secure Hash Functions in FAST SOFTWARE ENCRYPTION
  • 1998-03 Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation in JOURNAL OF CRYPTOLOGY
  • 1998 The chain & sum primitive and its applications to MACs and stream ciphers in ADVANCES IN CRYPTOLOGY — EUROCRYPT'98
  • 1998 Speeding up discrete log and factoring based schemes via precomputations in ADVANCES IN CRYPTOLOGY — EUROCRYPT'98
  • 1998 Breaking RSA may not be equivalent to factoring in ADVANCES IN CRYPTOLOGY — EUROCRYPT'98
  • 1998 Security amplification by composition: The case of doubly-iterated, ideal ciphers in ADVANCES IN CRYPTOLOGY — CRYPTO '98
  • 1997 Highly parallel cryptographic attacks in RECENT ADVANCES IN PARALLEL VIRTUAL MACHINE AND MESSAGE PASSING INTERFACE
  • 1994 Interactive Hashing Simplifies Zero-Knowledge Protocol Design in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’93
  • 1993 Fair Games Against an All-Powerful Adversary in SEQUENCES II
  • 1992 Secure commitment against a powerful adversary in STACS 92
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "familyName": "Venkatesan", 
        "givenName": "Ramarathnam", 
        "id": "sg:person.014063763433.38", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014063763433.38"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:55", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1684.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.014063763433.38'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.014063763433.38'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.014063763433.38'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.014063763433.38'


     

    This table displays all metadata directly associated to this object as RDF triples.

    11 TRIPLES      9 PREDICATES      10 URIs      6 LITERALS      1 BLANK NODES

    Subject Predicate Object
    1 sg:person.014063763433.38 schema:familyName Venkatesan
    2 schema:givenName Ramarathnam
    3 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014063763433.38
    4 schema:sdDatePublished 2019-03-07T13:55
    5 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    6 schema:sdPublisher N78771ed75e754c4faef5d5a9d5616050
    7 sgo:license sg:explorer/license/
    8 sgo:sdDataset persons
    9 rdf:type schema:Person
    10 N78771ed75e754c4faef5d5a9d5616050 schema:name Springer Nature - SN SciGraph project
    11 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...