scispace - formally typeset
J

Jothi Rangasamy

Publications -  8
Citations -  36

Jothi Rangasamy is an academic researcher. The author has contributed to research in topics: Cryptographic primitive & Proof-of-work system. The author has an hindex of 4, co-authored 8 publications receiving 36 citations.

Papers
More filters
Book ChapterDOI

CRT-Based Outsourcing Algorithms for Modular Exponentiations

TL;DR: An algorithm for secure outsourcing of (simultaneous) modular exponentiation(s) which can be seen as another application of the Chinese remainder theorem (CRT), which is superior in both efficiency and checkability compared to that of the previously known schemes of the same kind.

Stronger diculty notions for client puzzles and denial-of-service-resistant protocols (full version)

TL;DR: A security model for analyzing the DoS resistance of any protocol in the context of client puzzles is described and a generic technique forcombining any protocol with a strong client puzzle to obtain a DoS-resistant protocol is given.
Posted Content

Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE.

TL;DR: In this article, the authors propose a method to choose the efficient decomposition of S-box in terms of area and present the practical implementation of two level decomposition using PRINCE S-Box.
Proceedings ArticleDOI

On secure outsourcing of cryptographic computations to cloud

TL;DR: In this paper, the authors present the problem of secure outsourcing of cryptographic computations with RFID technology as the use case together with their ideas, where applicable, that can provide a direction towards solving the problems.
Book ChapterDOI

Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study Using PRINCE

TL;DR: In this paper, the authors propose a method to choose the efficient decomposition of S-box in terms of area and present the practical implementation of two level decomposition using PRINCE S-Box.