J
Jothi Rangasamy
Publications - 8
Citations - 36
Jothi Rangasamy is an academic researcher. The author has contributed to research in topics: Cryptographic primitive & Proof-of-work system. The author has an hindex of 4, co-authored 8 publications receiving 36 citations.
Papers
More filters
Book ChapterDOI
CRT-Based Outsourcing Algorithms for Modular Exponentiations
TL;DR: An algorithm for secure outsourcing of (simultaneous) modular exponentiation(s) which can be seen as another application of the Chinese remainder theorem (CRT), which is superior in both efficiency and checkability compared to that of the previously known schemes of the same kind.
Stronger diculty notions for client puzzles and denial-of-service-resistant protocols (full version)
TL;DR: A security model for analyzing the DoS resistance of any protocol in the context of client puzzles is described and a generic technique forcombining any protocol with a strong client puzzle to obtain a DoS-resistant protocol is given.
Posted Content
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE.
TL;DR: In this article, the authors propose a method to choose the efficient decomposition of S-box in terms of area and present the practical implementation of two level decomposition using PRINCE S-Box.
Proceedings ArticleDOI
On secure outsourcing of cryptographic computations to cloud
TL;DR: In this paper, the authors present the problem of secure outsourcing of cryptographic computations with RFID technology as the use case together with their ideas, where applicable, that can provide a direction towards solving the problems.
Book ChapterDOI
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study Using PRINCE
TL;DR: In this paper, the authors propose a method to choose the efficient decomposition of S-box in terms of area and present the practical implementation of two level decomposition using PRINCE S-Box.