default search action
C. Pandu Rangan
Person information
- affiliation: Indian Institute of Technology Madras, Computer Science and Engineering Department, Chennai, India
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c165]Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan:
Forward Security Under Leakage Resilience, Revisited. CANS 2023: 3-27 - [i81]S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan:
Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption. IACR Cryptol. ePrint Arch. 2023: 931 (2023) - 2022
- [j90]Kunwar Singh, C. Pandu Rangan, Ilsun You, Amalan Joseph Antony, S. K. Karthika, Jiyoon Kim:
Efficient Lattice based (H)IB-DRE. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 1-23 (2022) - 2021
- [j89]Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal:
Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes. IET Inf. Secur. 15(1): 1-12 (2021) - [j88]Suvradip Chakraborty, Y. Sreenivasa Rao, C. Pandu Rangan:
Efficient single round attribute-based authenticated key exchange protocol. Int. J. Comput. Math. Comput. Syst. Theory 6(4): 313-336 (2021) - [j87]Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan:
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing. J. Internet Serv. Inf. Secur. 11(2): 1-21 (2021) - [c164]Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Pandu Rangan, Kouichi Sakurai:
A Distributed Ledger Management Mechanism for Storing and Selling Private Data. DSC 2021: 1-8 - 2020
- [j86]Kunwar Singh, C. Pandu Rangan, Richa Agrawal, Samir Sheshank:
Provably secure lattice based identity based unidirectional PRE and PRE+ schemes. J. Inf. Secur. Appl. 54: 102569 (2020) - [j85]Arinjita Paul, Lihua Wang, S. Sharmila Deva Selvi, C. Pandu Rangan:
Non-transferability in Proxy Re-Encryption Revisited. J. Internet Serv. Inf. Secur. 10(3): 1-30 (2020) - [j84]Suvradip Chakraborty, Janaka Alawatugoda, Chandrasekaran Pandu Rangan:
New approach to practical leakage-resilient public-key cryptography. J. Math. Cryptol. 14(1): 172-201 (2020) - [j83]Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Naga Naresh Karuturi, C. Pandu Rangan, Rajmohan Rajaraman, Ravi Sundaram:
Cache Me if You Can: Capacitated Selfish Replication Games in Networks. Theory Comput. Syst. 64(2): 272-310 (2020) - [c163]Maneesh Babu Adhikari, Vorapong Suppakitpaisarn, Arinjita Paul, C. Pandu Rangan:
Two-Stage Framework for Accurate and Differentially Private Network Information Publication. CSoNet 2020: 267-279 - [c162]Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan:
Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts. INDOCRYPT 2020: 644-665 - [c161]Arinjita Paul, Vorapong Suppakitpaisarn, Mitali Bafna, C. Pandu Rangan:
Improving Accuracy of Differentially Private Kronecker Social Networks via Graph Clustering. ISNCC 2020: 1-6 - [i80]Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan:
Forward-Security Under Continual Leakage with Deterministic Key Updates. IACR Cryptol. ePrint Arch. 2020: 736 (2020)
2010 – 2019
- 2019
- [c160]Mehul Kumar, Amit Kumar, C. Pandu Rangan:
Reoptimization of Path Vertex Cover Problem. COCOON 2019: 363-374 - [c159]Suvradip Chakraborty, C. Pandu Rangan:
Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks. CT-RSA 2019: 23-43 - [c158]S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan, Siva Dirisala, Saswata Basu:
Splitting and Aggregating Signatures in Cryptocurrency Protocols. DAPPCON 2019: 100-108 - [c157]S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan:
Sharing of Encrypted Files in Blockchain Made Simpler. MARBLE 2019: 45-60 - [c156]Arinjita Paul, Vorapong Suppakitpaisarn, C. Pandu Rangan:
Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks. MARBLE 2019: 201-216 - [c155]S. Sharmila Deva Selvi, S. Harish, Swethashree Dhanabal, C. Pandu Rangan:
A Closer Look at Anonymous Proxy Re-Encryption Schemes. SpaCCS 2019: 475-489 - [i79]Mehul Kumar, Amit Kumar, C. Pandu Rangan:
Reoptimization of Path Vertex Cover Problem. CoRR abs/1904.10719 (2019) - [i78]S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan:
Sharing of Encrypted files in Blockchain Made Simpler. IACR Cryptol. ePrint Arch. 2019: 418 (2019) - [i77]Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan:
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing. IACR Cryptol. ePrint Arch. 2019: 1135 (2019) - [i76]Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan:
Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts. IACR Cryptol. ePrint Arch. 2019: 1325 (2019) - [i75]S. Sharmila Deva Selvi, Irene Miriam Isaac, C. Pandu Rangan:
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. IACR Cryptol. ePrint Arch. 2019: 1439 (2019) - 2018
- [c154]Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan:
A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme. ProvSec 2018: 111-128 - [i74]Suvradip Chakraborty, C. Pandu Rangan:
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks. IACR Cryptol. ePrint Arch. 2018: 883 (2018) - [i73]Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan:
A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme. IACR Cryptol. ePrint Arch. 2018: 1131 (2018) - [i72]S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan:
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model. IACR Cryptol. ePrint Arch. 2018: 1136 (2018) - 2017
- [c153]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE. ACISP (1) 2017: 343-362 - [c152]Akshayaram Srinivasan, Chandrasekaran Pandu Rangan:
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption. ACNS 2017: 273-292 - [c151]S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan:
An Efficient Non-transferable Proxy Re-encryption Scheme. ATIS 2017: 35-47 - [c150]S. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandu Rangan:
A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without Pairing in the Random Oracle Model. CANS 2017: 459-469 - [c149]Suvradip Chakraborty, Y. Sreenivasa Rao, Chandrasekaran Pandu Rangan:
An Efficient Attribute-Based Authenticated Key Exchange Protocol. CANS 2017: 493-503 - [c148]Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe:
Identity-Based Group Encryption Revisited. ICICS 2017: 205-209 - [c147]Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan:
Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting. ProvSec 2017: 167-187 - [c146]S. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandu Rangan:
An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing. ProvSec 2017: 413-433 - [i71]Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan:
New Approach to Practical Leakage-Resilient Public-Key Cryptography. IACR Cryptol. ePrint Arch. 2017: 441 (2017) - [i70]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. IACR Cryptol. ePrint Arch. 2017: 451 (2017) - [i69]Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan:
Leakage-Resilient Tweakable Encryption from One-Way Functions. IACR Cryptol. ePrint Arch. 2017: 462 (2017) - [i68]S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan:
An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing. IACR Cryptol. ePrint Arch. 2017: 768 (2017) - [i67]S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan:
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing. IACR Cryptol. ePrint Arch. 2017: 867 (2017) - 2016
- [j82]Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice-based identity-based resplittable threshold public key encryption scheme. Int. J. Comput. Math. 93(2): 289-307 (2016) - [j81]S. Sree Vivek, S. Sharmila Deva Selvi, Pallavi Chandrasekar, C. Pandu Rangan:
Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives. J. Internet Serv. Inf. Secur. 6(4): 35-53 (2016) - [j80]Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(1): 1-22 (2016) - [j79]Sree Vivek Sivanandam, S. Sharmila Deva Selvi, Akshayaram Srinivasan, Chandrasekaran Pandu Rangan:
Stronger public key encryption system withstanding RAM scraper like attacks. Secur. Commun. Networks 9(12): 1650-1662 (2016) - [i66]Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers. IACR Cryptol. ePrint Arch. 2016: 354 (2016) - 2015
- [j78]Arpita Patra, Ashish Choudhury, C. Pandu Rangan:
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation. J. Cryptol. 28(1): 49-109 (2015) - [j77]Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice Based Mix Network for Location Privacy in Mobile System. Mob. Inf. Syst. 2015: 963628:1-963628:9 (2015) - [c145]Priyanka Bose, Dipanjan Das, Chandrasekaran Pandu Rangan:
Constant Size Ring Signature Without Random Oracle. ACISP 2015: 230-247 - [c144]Akshayaram Srinivasan, C. Pandu Rangan:
Certificateless Proxy Re-Encryption Without Pairing: Revisited. SCC@ASIACCS 2015: 41-52 - [c143]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction. ProvSec 2015: 149-166 - [c142]S. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra, C. Pandu Rangan:
Practical IBE Secure under CBDH - Encrypting Without Pairing. SECRYPT 2015: 251-258 - [i65]Priyanka Bose, Dipanjan Das, C. Pandu Rangan:
Constant Size Ring Signature Without Random Oracle. IACR Cryptol. ePrint Arch. 2015: 164 (2015) - [i64]Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2015: 520 (2015) - [i63]Akshayaram Srinivasan, C. Pandu Rangan:
Efficiently Obfuscating Re-Encryption Program under DDH Assumption. IACR Cryptol. ePrint Arch. 2015: 822 (2015) - [i62]Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan:
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks. IACR Cryptol. ePrint Arch. 2015: 1012 (2015) - 2014
- [j76]Arpita Patra, Ashish Choudhury, C. Pandu Rangan:
Asynchronous Byzantine Agreement with optimal resilience. Distributed Comput. 27(2): 111-146 (2014) - [j75]Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice Based Universal Re-encryption for Mixnet. J. Internet Serv. Inf. Secur. 4(1): 1-11 (2014) - [j74]Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Guest Editorial: Special Issue on Cyber Security Protections and Applications. J. Internet Serv. Inf. Secur. 4(2): 1-3 (2014) - [j73]Sangeetha Jose, Akash Gautam, Chandrasekaran Pandu Rangan:
A New Certificateless Blind Signature Scheme. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(1): 122-141 (2014) - [c141]Saikrishna Badrinarayanan, C. Pandu Rangan:
Certificateless and Identity based Authenticated Key Exchange Protocols. ICETE (Selected Papers) 2014: 255-277 - [c140]Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters. ICT-EurAsia 2014: 542-553 - [c139]Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme. ICT-EurAsia 2014: 564-575 - [c138]Saikrishna Badrinarayanan, C. Pandu Rangan:
Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols. SECRYPT 2014: 67-78 - [c137]Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme. SPACE 2014: 76-91 - [i61]Akshayaram Srinivasan, C. Pandu Rangan:
Certificateless Proxy Re-Encryption Without Pairing. IACR Cryptol. ePrint Arch. 2014: 933 (2014) - 2013
- [j72]Kunwar Singh, C. Pandurangan, A. K. Banerjee:
Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext. J. Internet Serv. Inf. Secur. 3(1/2): 5-19 (2013) - [j71]S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan:
Efficient Certificateless Online/Offline Signature with tight security. J. Internet Serv. Inf. Secur. 3(1/2): 115-137 (2013) - [j70]Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice Based Identity Based Proxy Re-Encryption Scheme. J. Internet Serv. Inf. Secur. 3(3/4): 38-51 (2013) - [j69]Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice Based Efficient Threshold Public Key Encryption Scheme. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 93-107 (2013) - [c136]K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan:
A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory. ICISC 2013: 342-362 - [c135]K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan:
Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model. ICISC 2013: 517-535 - [c134]S. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan:
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round. ProvSec 2013: 38-58 - [c133]Prateek Barapatre, Chandrasekaran Pandu Rangan:
Identity-Based Identification Schemes from ID-KEMs. SPACE 2013: 111-129 - [c132]Prateek Barapatre, Chandrasekaran Pandu Rangan:
Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings. SPACE 2013: 130-146 - [i60]Karthik Abinav, Saikrishna Badrinarayanan, C. Pandu Rangan, S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan:
A Revocable Online-Offline Certificateless Signature Scheme without Pairing. IACR Cryptol. ePrint Arch. 2013: 758 (2013) - 2012
- [j68]Ashwinkumar Badanidiyuru, Arpita Patra, Ashish Choudhury, Kannan Srinathan, C. Pandu Rangan:
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission. J. ACM 59(5): 22:1-22:35 (2012) - [j67]S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan:
Efficient Certificateless Online/Offline Signature. J. Internet Serv. Inf. Secur. 2(3/4): 77-92 (2012) - [j66]Kunwar Singh, C. Pandurangan, A. K. Banerjee:
Lattice Forward-Secure Identity Based Encryption Scheme. J. Internet Serv. Inf. Secur. 2(3/4): 118-128 (2012) - [j65]S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan:
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 46-60 (2012) - [j64]S. Sree Vivek, S. Sharmila Deva Selvi, Salini Selvaraj Kowsalya, C. Pandu Rangan:
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 72-84 (2012) - [c131]S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan:
Group key establishment (GKE): Two/three party key exchange to GKE. IEEE ANTS 2012: 61-66 - [c130]K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan:
An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model. ACISP 2012: 166-179 - [c129]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures. ACISP 2012: 280-293 - [c128]Amitash Ramesh, Soumya Ramesh, Sudarshan Iyengar, Vinod Sekhar, C. Pandu Rangan:
Obstacles Incentivize Human Learning: A Network Theoretic Study. ASONAM 2012: 1295-1300 - [c127]M. Vijesh, Sudarshan Iyengar, S. M. Vijay Mahantesh, Amitash Ramesh, C. Pandu Rangan, Veni Madhavan:
A Navigation Algorithm Inspired by Human Navigation. ASONAM 2012: 1309-1314 - [c126]K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan:
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions. ISPEC 2012: 144-157 - [c125]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
Compact Stateful Encryption Schemes with Ciphertext Verifiability. IWSEC 2012: 87-104 - [c124]Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Naga Naresh Karuturi, C. Pandu Rangan, Rajmohan Rajaraman, Ravi Sundaram:
Cache Me If You Can: Capacitated Selfish Replication Games. LATIN 2012: 420-432 - [c123]S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:
ID Based Signcryption Scheme in Standard Model. ProvSec 2012: 35-52 - [c122]S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan:
Identity based partial aggregate signature scheme without pairing. Sarnoff Symposium 2012: 1-6 - [c121]Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters. SPACE 2012: 153-172 - [c120]Chaya Ganesh, C. Pandu Rangan:
Optimal Parameters for Efficient Two-Party Computation Protocols. WISTP 2012: 128-143 - [i59]S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan:
Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model. IACR Cryptol. ePrint Arch. 2012: 80 (2012) - [i58]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks. IACR Cryptol. ePrint Arch. 2012: 118 (2012) - [i57]S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:
ID Based Signcryption Scheme in Standard Model. IACR Cryptol. ePrint Arch. 2012: 392 (2012) - [i56]K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan:
On Provably Secure Code-Based Signature and Signcryption Scheme. IACR Cryptol. ePrint Arch. 2012: 585 (2012) - 2011
- [j63]T. V. Thirumala Reddy, C. Pandu Rangan:
Variants of Spreading Messages. J. Graph Algorithms Appl. 15(5): 683-699 (2011) - [j62]Ashish Choudhury, Arpita Patra, B. V. Ashwinkumar, Kannan Srinathan, C. Pandu Rangan:
Secure message transmission in asynchronous networks. J. Parallel Distributed Comput. 71(8): 1067-1074 (2011) - [c119]Arpita Patra, C. Pandu Rangan:
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience. ICITS 2011: 206-226 - [c118]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Online/Offline Encryption and Signcryption Schemes Revisited. InfoSecHiComNet 2011: 111-127 - [c117]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity-Based Deterministic Signature Scheme without Forking-Lemma. IWSEC 2011: 79-95 - [c116]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
CCA Secure Certificateless Encryption Schemes based on RSA. SECRYPT 2011: 208-217 - [c115]R. Shyam Sundar, C. Pandu Rangan:
Bit-depth scalable video coding using error residual correction. VCIP 2011: 1-4 - [c114]Esha Ghosh, N. S. Narayanaswamy, C. Pandu Rangan:
A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs. WALCOM 2011: 191-201 - [i55]Esha Ghosh, Subhas Kumar Ghosh, C. Pandu Rangan:
On the Fault Tolerance and Hamiltonicity of the Optical Transpose Interconnection System of Non-Hamiltonian Base Graphs. CoRR abs/1109.1706 (2011) - [i54]William K. Moses Jr., C. Pandu Rangan:
Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security. CoRR abs/1112.4033 (2011) - [i53]William K. Moses Jr., C. Pandu Rangan:
Rational Secret Sharing with Honest Players over an Asynchronous Channel. IACR Cryptol. ePrint Arch. 2011: 68 (2011) - [i52]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Deterministic Signature Scheme Without Forking-Lemma. IACR Cryptol. ePrint Arch. 2011: 217 (2011) - [i51]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
Compact CCA-Secure Encryption with Ciphertext Verifiability. IACR Cryptol. ePrint Arch. 2011: 361 (2011) - [i50]S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:
On the Security of ID Based Signcryption Schemes. IACR Cryptol. ePrint Arch. 2011: 664 (2011) - [i49]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures. IACR Cryptol. ePrint Arch. 2011: 695 (2011) - 2010
- [j61]Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan:
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality. Int. J. Appl. Cryptogr. 2(2): 159-197 (2010) - [j60]Balasubramanian Sivan, S. Harini, C. Pandu Rangan:
On Conditional Covering Problem. Math. Comput. Sci. 3(1): 97-107 (2010) - [c113]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience. AFRICACRYPT 2010: 184-202 - [c112]Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan:
The Round Complexity of Verifiable Secret Sharing: The Statistical Case. ASIACRYPT 2010: 431-447 - [c111]Swarun Kumar, Shivank Agrawal, Subha Balaraman, C. Pandu Rangan:
Attribute Based Signatures for Bounded Multi-level Threshold Circuits. EuroPKI 2010: 141-154 - [c110]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
On Communication Complexity of Secure Message Transmission in Directed Networks. ICDCN 2010: 42-53 - [c109]Anuj Gupta, Sandeep Hans, Kannan Srinathan, C. Pandu Rangan:
On Composability of Reliable Unicast and Broadcast. ICDCN 2010: 54-66 - [c108]Swarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan:
Threshold Discernible Ring Signatures. ICETE (Selected Papers) 2010: 259-273 - [c107]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Certificateless KEM and Hybrid Signcryption Schemes Revisited. ISPEC 2010: 294-307 - [c106]Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan:
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles. ISPEC 2010: 359-376 - [c105]Arpita Patra, C. Pandu Rangan:
Communication Optimal Multi-valued Asynchronous Broadcast Protocol. LATINCRYPT 2010: 162-177 - [c104]S. Sharmila Deva Selvi, S. Sree Vivek, Chandrasekaran Pandu Rangan, S. Priti:
On the Security of Identity Based Threshold Unsigncryption Schemes. NSS 2010: 554-559 - [c103]S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan:
Identity Based Self Delegated Signature - Self Proxy Signatures. NSS 2010: 568-573 - [c102]R. Shyam Sundar, C. Pandu Rangan:
Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding. PCM (2) 2010: 121-135 - [c101]Arpita Patra, C. Pandu Rangan:
Brief announcement: communication efficient asynchronous byzantine agreement. PODC 2010: 243-244 - [c100]Arpita Patra, Ashish Choudhury, C. Pandu Rangan:
Brief announcement: perfectly secure message transmissiontolerating mobile mixed adversary with reduced phase complexity. PODC 2010: 245-246 - [c99]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Public Verifiable Signcryption Scheme. ProvSec 2010: 244-260 - [c98]S. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan:
An Identity based Ring Signcryption Scheme with Public Verifiability. SECRYPT 2010: 362-371 - [c97]Swarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan:
Forcing Out a Confession - Threshold Discernible Ring Signatures. SECRYPT 2010: 379-388 - [c96]T. V. Thirumala Reddy, D. Sai Krishna, C. Pandu Rangan:
Variants of Spreading Messages. WALCOM 2010: 240-251 - [c95]D. Sai Krishna, T. V. Thirumala Reddy, B. Sai Shashank, C. Pandu Rangan:
Pathwidth and Searching in Parameterized Threshold Graphs. WALCOM 2010: 293-304 - [c94]Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan:
Towards a Cooperative Defense Model Against Network Security Attacks. WEIS 2010 - [i48]Arpita Patra, C. Pandu Rangan:
Communication and Round Efficient Information Checking Protocol. CoRR abs/1004.3504 (2010) - [i47]Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Naga Naresh Karuturi, C. Pandu Rangan, Rajmohan Rajaraman, Ravi Sundaram:
Capacitated Caching Games. CoRR abs/1007.2694 (2010) - [i46]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience. IACR Cryptol. ePrint Arch. 2010: 7 (2010) - [i45]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Security Weaknesses in Two Certificateless Signcryption Schemes. IACR Cryptol. ePrint Arch. 2010: 92 (2010) - [i44]Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan:
Sanitizable signatures with strong transparency in the standard model. IACR Cryptol. ePrint Arch. 2010: 175 (2010) - [i43]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Online/Offline Encryption Scheme. IACR Cryptol. ePrint Arch. 2010: 178 (2010) - [i42]Amjed Shareef, Akshay Agrawal, C. Pandu Rangan:
Collusion Free Protocol for Correlated Element Selection Problem. IACR Cryptol. ePrint Arch. 2010: 238 (2010) - [i41]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Public Verifiable Signcryption Scheme. IACR Cryptol. ePrint Arch. 2010: 343 (2010) - [i40]S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan:
Identity Based Self Delegated Signature - Self Proxy Signatures. IACR Cryptol. ePrint Arch. 2010: 359 (2010) - [i39]S. Sharmila Deva Selvi, S. Sree Vivek, S. Priti, C. Pandu Rangan:
On the Security of Identity Based Threshold Unsigncryption Schemes. IACR Cryptol. ePrint Arch. 2010: 360 (2010) - [i38]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Online/Offline Signcryption Scheme. IACR Cryptol. ePrint Arch. 2010: 376 (2010) - [i37]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
CCA2 Secure Certificateless Encryption Schemes Based on RSA. IACR Cryptol. ePrint Arch. 2010: 459 (2010) - [i36]S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan:
Identity Based Partial Aggregate Signature Scheme Without Pairing. IACR Cryptol. ePrint Arch. 2010: 461 (2010)
2000 – 2009
- 2009
- [j59]Arpita Patra, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan, Prasad Raghavendra:
Perfectly reliable and secure message transmission tolerating mobile adversary. Int. J. Appl. Cryptogr. 1(3): 200-224 (2009) - [c93]G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. CANS 2009: 21-40 - [c92]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. AsiaCCS 2009: 171-182 - [c91]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing. Inscrypt 2009: 75-92 - [c90]Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan:
Sanitizable Signatures with Strong Transparency in the Standard Model. Inscrypt 2009: 93-107 - [c89]S. Sharmila Deva Selvi, S. Sree Vivek, Shilpi Nayak, C. Pandu Rangan:
Breaking and Building of Threshold Signcryption Schemes. Inscrypt 2009: 108-123 - [c88]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience. Inscrypt 2009: 179-197 - [c87]Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan:
The Round Complexity of Verifiable Secret Sharing Revisited. CRYPTO 2009: 487-504 - [c86]Ashish Choudhary, Arpita Patra, B. V. Ashwinkumar, Kannan Srinathan, C. Pandu Rangan:
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks. ICDCN 2009: 148-162 - [c85]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience. ICITS 2009: 74-92 - [c84]S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan:
Identity Based Aggregate Signcryption Schemes. INDOCRYPT 2009: 378-397 - [c83]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience. INDOCRYPT 2009: 398-417 - [c82]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
On the Security of Identity Based Ring Signcryption Schemes. ISC 2009: 310-325 - [c81]T. V. Thirumala Reddy, D. Sai Krishna, C. Pandu Rangan:
The Guarding Problem - Complexity and Approximation. IWOCA 2009: 460-470 - [c80]S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan:
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. IWSEC 2009: 71-88 - [c79]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Simple and efficient asynchronous byzantine agreement with optimal resilience. PODC 2009: 92-101 - [c78]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Brief announcement: perfectly secure message transmission in directed networks re-visited. PODC 2009: 278-279 - [c77]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. ProvSec 2009: 61-75 - [c76]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Information Theoretically Secure Multi Party Set Intersection Re-visited. Selected Areas in Cryptography 2009: 71-91 - [c75]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
On the Security of Two Ring Signcryption Schemes. SECRYPT 2009: 219-224 - [c74]S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan:
Breaking and Building of Group Inside Signature. SecureComm 2009: 330-339 - [c73]Balasubramanian Sivan, S. Harini, C. Pandu Rangan:
Core and Conditional Core Path of Specified Length in Special Classes of Graphs. WALCOM 2009: 262-273 - [i35]S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES. IACR Cryptol. ePrint Arch. 2009: 52 (2009) - [i34]S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan:
Scalable Compilers for Group Key Establishment : Two/Three Party to Group. IACR Cryptol. ePrint Arch. 2009: 115 (2009) - [i33]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Information Theoretically Secure Multi Party Set Intersection Re-Visited. IACR Cryptol. ePrint Arch. 2009: 116 (2009) - [i32]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
On the security of Identity Based Ring Signcryption Schemes. IACR Cryptol. ePrint Arch. 2009: 144 (2009) - [i31]S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan:
Breaking and Building of Group Inside Signature. IACR Cryptol. ePrint Arch. 2009: 188 (2009) - [i30]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. IACR Cryptol. ePrint Arch. 2009: 235 (2009) - [i29]S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan:
Security Analysis of Aggregate signature and Batch verification signature schemes. IACR Cryptol. ePrint Arch. 2009: 290 (2009) - [i28]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing. IACR Cryptol. ePrint Arch. 2009: 298 (2009) - [i27]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
A note on the Certificateless Multi-receiver Signcryption Scheme. IACR Cryptol. ePrint Arch. 2009: 308 (2009) - [i26]G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security. IACR Cryptol. ePrint Arch. 2009: 311 (2009) - [i25]Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan:
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles. IACR Cryptol. ePrint Arch. 2009: 350 (2009) - [i24]Arpita Patra, C. Pandu Rangan:
Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience. IACR Cryptol. ePrint Arch. 2009: 433 (2009) - [i23]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Certificateless KEM and Hybrid Signcryption Schemes Revisited. IACR Cryptol. ePrint Arch. 2009: 462 (2009) - [i22]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks. IACR Cryptol. ePrint Arch. 2009: 470 (2009) - [i21]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience. IACR Cryptol. ePrint Arch. 2009: 492 (2009) - 2008
- [c72]Arpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan:
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary. ACISP 2008: 170-186 - [c71]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Reliable Message Transmission in Directed Hypergraphs. CANS 2008: 285-303 - [c70]Varad Kirtane, C. Pandu Rangan:
RSA-TBOS signcryption with proxy re-encryption. Digital Rights Management Workshop 2008: 59-66 - [c69]S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, Neha Jain:
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. EUC (2) 2008: 127-132 - [c68]Amjed Shareef, C. Pandu Rangan:
On Optimal Probabilistic Asynchronous Byzantine Agreement. ICDCN 2008: 86-98 - [c67]Bhavani Shankar, Kannan Srinathan, C. Pandu Rangan:
Alternative Protocols for Generalized Oblivious Transfer. ICDCN 2008: 304-309 - [c66]Ashish Choudhary, Arpita Patra, B. V. Ashwinkumar, K. Srinathan, C. Pandu Rangan:
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary. ICITS 2008: 137-155 - [c65]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Round Efficient Unconditionally Secure Multiparty Computation Protocol. INDOCRYPT 2008: 185-199 - [c64]Shaik Maleka, Amjed Shareef, C. Pandu Rangan:
The deterministic protocol for rational secret sharing. IPDPS 2008: 1-7 - [c63]Shaik Maleka, Amjed Shareef, C. Pandu Rangan:
Rational Secret Sharing with Repeated Games. ISPEC 2008: 334-346 - [c62]Balasubramanian Sivan, S. Harini, C. Pandu Rangan:
On Conditional Covering Problem. IWOCA 2008: 224-238 - [c61]B. V. Ashwinkumar, Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan:
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary. PODC 2008: 115-124 - [c60]Kannan Srinathan, Ashish Choudhary, Arpita Patra, C. Pandu Rangan:
Efficient single phase unconditionally secure message transmission with optimum communication complexity. PODC 2008: 457 - [c59]S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan:
Efficient and Provably Secure Certificateless Multi-receiver Signcryption. ProvSec 2008: 52-67 - [c58]S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan:
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. PST 2008: 109-120 - [c57]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited. SCN 2008: 309-326 - [c56]Bhavani Shankar, Prasant Gopal, Kannan Srinathan, C. Pandu Rangan:
Unconditionally reliable message transmission in directed networks. SODA 2008: 1048-1055 - [c55]S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan:
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. WISA 2008: 115-129 - [i20]Arpita Patra, Ashish Choudhary, Madhu Gayatri, C. Pandu Rangan:
Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary. IACR Cryptol. ePrint Arch. 2008: 86 (2008) - [i19]Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan:
Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality. IACR Cryptol. ePrint Arch. 2008: 141 (2008) - [i18]Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan:
The Round Complexity of Verifiable Secret Sharing Revisited. IACR Cryptol. ePrint Arch. 2008: 172 (2008) - [i17]S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan:
Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. IACR Cryptol. ePrint Arch. 2008: 225 (2008) - [i16]Arpita Patra, Ashish Choudhury, B. V. Ashwinkumar, Kannan Srinathan, C. Pandu Rangan:
Perfectly Secure Message Transmission Tolerating Mixed Adversary. IACR Cryptol. ePrint Arch. 2008: 232 (2008) - [i15]S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan:
On the Provable Security of Multi-Receiver Signcryption Schemes. IACR Cryptol. ePrint Arch. 2008: 238 (2008) - [i14]S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan:
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks. IACR Cryptol. ePrint Arch. 2008: 247 (2008) - [i13]Arpita Patra, Ashish Choudhury, C. Pandu Rangan:
Statistically Reliable and Secure Message Transmission in Directed Networks. IACR Cryptol. ePrint Arch. 2008: 262 (2008) - [i12]Chandrasekar S., Ambika K., C. Pandu Rangan:
Signcryption with Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2008: 276 (2008) - [i11]Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Rahul Srinivasan, C. Pandu Rangan:
Foundations of Group Key Management - Framework, Security Model and a Generic Construction. IACR Cryptol. ePrint Arch. 2008: 295 (2008) - [i10]Varad Kirtane, C. Pandu Rangan:
RSA-TBOS Signcryption with Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2008: 324 (2008) - [i9]S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, C. Pandu Rangan:
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. IACR Cryptol. ePrint Arch. 2008: 341 (2008) - [i8]S. Sharmila Deva Selvi, S. Sree Vivek, Neha Jain, C. Pandu Rangan:
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. IACR Cryptol. ePrint Arch. 2008: 342 (2008) - [i7]Varad Kirtane, C. Pandu Rangan:
Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting. IACR Cryptol. ePrint Arch. 2008: 368 (2008) - [i6]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Reliable Message Transmission in Directed Hypergraphs. IACR Cryptol. ePrint Arch. 2008: 371 (2008) - [i5]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Round Efficient Unconditionally Secure Multiparty Computation Protocol. IACR Cryptol. ePrint Arch. 2008: 399 (2008) - [i4]Arpita Patra, Ashish Choudhury, C. Pandu Rangan:
Efficient Asynchronous Byzantine Agreement with Optimal Resilience. IACR Cryptol. ePrint Arch. 2008: 424 (2008) - [i3]Arpita Patra, Ashish Choudhury, C. Pandu Rangan:
Efficient Asynchronous Multiparty Computation with Optimal Resilience. IACR Cryptol. ePrint Arch. 2008: 425 (2008) - [i2]Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Secure Multiparty Set Intersection Re-Visited. IACR Cryptol. ePrint Arch. 2008: 462 (2008) - [i1]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary. IACR Cryptol. ePrint Arch. 2008: 506 (2008) - 2007
- [c54]Kannan Srinathan, Prasad Raghavendra, C. Pandu Rangan:
On Proactive Perfectly Secure Message Transmission. ACISP 2007: 461-473 - [c53]K. Anil Kumar, C. Pandu Rangan:
Privacy Preserving DBSCAN Algorithm for Clustering. ADMA 2007: 57-68 - [c52]P. Krishna Prasad, C. Pandu Rangan:
Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases. ADMA 2007: 146-157 - [c51]Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan:
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. CANS 2007: 80-101 - [c50]P. Krishna Prasad, C. Pandu Rangan:
Privacy Preserving CACTUS Algorithm for Clustering over Vertically Partitioned Databases. DMIN 2007: 308-314 - [c49]Avinash V. Varadarajan, Ramarathnam Venkatesan, C. Pandu Rangan:
Data structures for limited oblivious execution of programs while preserving locality of reference. Digital Rights Management Workshop 2007: 63-69 - [c48]K. Srinathan, C. Pandu Rangan, Ranjit Kumaresan:
On Exponential Lower Bound for Protocols for Reliable Communication in Networks. ICITS 2007: 89-98 - [c47]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. INDOCRYPT 2007: 101-122 - [c46]Amjed Shareef, C. Pandu Rangan:
Efficient Protocol For Approximate Agreement. PDPTA 2007: 193-199 - [c45]Arpita Patra, Ashish Choudhary, Chandrasekaran Pandu Rangan:
Constant phase efficient protocols for secure message transmission in directed networks. PODC 2007: 322-323 - [c44]Kannan Srinathan, N. R. Prasad, C. Pandu Rangan:
On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication. S&P 2007: 311-320 - [c43]Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan:
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary. DISC 2007: 496-498 - [e4]K. Srinathan, C. Pandu Rangan, Moti Yung:
Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings. Lecture Notes in Computer Science 4859, Springer 2007, ISBN 978-3-540-77025-1 [contents] - 2006
- [j58]Arvind Narayanan, K. Srinathan, C. Pandu Rangan:
Perfectly Reliable Message Transmission. Inf. Process. Lett. 100(1): 23-28 (2006) - [c42]R. C. Chakinala, Abishek Kumarasubramanian, R. Manokaran, Guevara Noubir, C. Pandu Rangan, Ravi Sundaram:
Steganographic Communication in Ordered Channels. Information Hiding 2006: 42-57 - [c41]Arpita Patra, Ashish Choudhary, K. Srinathan, C. Pandu Rangan:
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission. INDOCRYPT 2006: 221-235 - [c40]Kannan Srinathan, C. Pandu Rangan:
Possibility and complexity of probabilistic reliable communication in directed networks. PODC 2006: 265-274 - [c39]P. Krishna Prasad, C. Pandu Rangan:
Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases. Secure Data Management 2006: 84-99 - [c38]R. C. Chakinala, Abishek Kumarasubramanian, Kofi A. Laing, R. Manokaran, C. Pandu Rangan, Rajmohan Rajaraman:
Playing push vs pull: models and algorithms for disseminating dynamic data in networks. SPAA 2006: 244-253 - [c37]Matthias Fitzi, Juan A. Garay, Shyamnath Gollakota, C. Pandu Rangan, K. Srinathan:
Round-Optimal and Efficient Verifiable Secret Sharing. TCC 2006: 329-342 - 2004
- [c36]K. Srinathan, Arvind Narayanan, C. Pandu Rangan:
Optimal Perfectly Secure Message Transmission. CRYPTO 2004: 545-561 - [c35]D. V. S. Ravikant, Muthuramakrishnan Venkitasubramaniam, V. Srikanth, K. Srinathan, C. Pandu Rangan:
Brief announcement: on the round complexity of distributed consensus over synchronous networks. PODC 2004: 397 - [c34]D. V. S. Ravikant, Muthuramakrishnan Venkitasubramaniam, V. Srikanth, K. Srinathan, C. Pandu Rangan:
On Byzantine Agreement over (2, 3)-Uniform Hypergraphs. DISC 2004: 450-464 - [r2]C. Pandu Rangan:
Skew Heaps. Handbook of Data Structures and Applications 2004 - [r1]C. Pandu Rangan:
Randomized Dictionary Structures. Handbook of Data Structures and Applications 2004 - 2003
- [c33]Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim:
Practical Pay TV Schemes. ACISP 2003: 192-203 - [c32]Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim:
On the Power of Computational Secret Sharing. INDOCRYPT 2003: 162-176 - [c31]S. Amitanand, I. Sanketh, K. Srinathan, Vinod Vaikuntanathan, C. Pandu Rangan:
Distributed consensus in the presence of sectional faults. PODC 2003: 202-210 - [c30]K. Srinathan, Vinod Vaikuntanathan, C. Pandu Rangan:
Brief announcement: efficient perfectly secure communication over synchronous networks. PODC 2003: 252 - 2002
- [c29]M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan:
Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. ACISP 2002: 497-512 - [c28]K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan:
Asynchronous Secure Communication Tolerating Mixed Adversaries. ASIACRYPT 2002: 224-242 - [c27]K. Srinathan, Pranava R. Goundan, M. V. N. Ashwin Kumar, R. Nandakumar, C. Pandu Rangan:
Theory of Equal-Flows in Networks. COCOON 2002: 514-524 - [c26]B. Prabhu, K. Srinathan, C. Pandu Rangan:
Asynchronous Unconditionally Secure Computation: An Efficiency Improvement. INDOCRYPT 2002: 93-107 - [c25]K. Srinathan, N. Tharani Rajan, C. Pandu Rangan:
Non-perfect Secret Sharing over General Access Structures. INDOCRYPT 2002: 409-421 - [c24]M. V. N. Ashwin Kumar, Pranava R. Goundan, K. Srinathan, C. Pandu Rangan:
On perfectly secure cmmunication over arbitrary networks. PODC 2002: 193-202 - [c23]B. Prabhu, K. Srinathan, C. Pandu Rangan:
Trading Players for Efficiency in Unconditional Multiparty Computation. SCN 2002: 342-353 - 2001
- [j57]Venkatesan Guruswami, C. Pandu Rangan, Maw-Shang Chang, Gerard J. Chang, C. K. Wong:
The Kr-Packing Problem. Computing 66(1): 79-89 (2001) - [c22]K. Srinathan, C. Pandu Rangan, V. Kamakoti:
Toward Optimal Player Weights in Secure Distributed Protocols. INDOCRYPT 2001: 232-241 - [e3]C. Pandu Rangan, Cunsheng Ding:
Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings. Lecture Notes in Computer Science 2247, Springer 2001, ISBN 3-540-43010-5 [contents] - 2000
- [j56]Venkatesan Guruswami, C. Pandu Rangan:
Algorithmic aspects of clique-transversal and clique-independent sets. Discret. Appl. Math. 100(3): 183-202 (2000) - [j55]D. Arun Kumar, C. Pandu Rangan:
Approximation algorithms for the Traveling Salesman Problem with range condition. RAIRO Theor. Informatics Appl. 34(3): 173-182 (2000) - [j54]Lakshminarayanan Subramanian, Muralidhar Talupur, Kamala Krithivasan, C. Pandu Rangan:
On the Generative Power of Simple H Systems. J. Autom. Lang. Comb. 5(4): 457-473 (2000) - [j53]Stefan Felsner, Ravi Kant, C. Pandu Rangan, Dorothea Wagner:
On the Complexity of Partial Order Properties. Order 17(2): 179-193 (2000) - [c21]K. Srinathan, C. Pandu Rangan:
Efficient Asynchronous Secure Multiparty Distributed Computation. INDOCRYPT 2000: 117-129 - [c20]K. Srinathan, C. Pandu Rangan:
Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation. INDOCRYPT 2000: 130-142
1990 – 1999
- 1999
- [j52]A. Arvind, C. Pandu Rangan:
Symmetric Min-Max Heap: A Simpler Data Structure for Double-Ended Priority Queue. Inf. Process. Lett. 69(4): 197-199 (1999) - [e2]C. Pandu Rangan, Venkatesh Raman, Ramaswamy Ramanujam:
Foundations of Software Technology and Theoretical Computer Science, 19th Conference, Chennai, India, December 13-15, 1999, Proceedings. Lecture Notes in Computer Science 1738, Springer 1999, ISBN 3-540-66836-5 [contents] - [e1]Alok Aggarwal, C. Pandu Rangan:
Algorithms and Computation, 10th International Symposium, ISAAC '99, Chennai, India, December 16-18, 1999, Proceedings. Lecture Notes in Computer Science 1741, Springer 1999, ISBN 3-540-66916-7 [contents] - 1998
- [j51]C. Pandu Rangan, K. R. Parthasarathy, V. Prakash:
On The g-centroidal Problem in Special Classes of Perfect Graphs. Ars Comb. 50 (1998) - [j50]David G. Kirkpatrick, Madhukar K. Reddy, C. Pandu Rangan, Anand Srinivasan:
Partial and Perfect Path Covers of Cographs. Discret. Appl. Math. 89(1-3): 143-153 (1998) - [j49]Maw-Shang Chang, P. Nagavamsi, C. Pandu Rangan:
Weighted Irredundance of Interval Graphs. Inf. Process. Lett. 66(2): 65-70 (1998) - [j48]Venkatesan Guruswami, C. Pandu Rangan:
A Natural Family of Optimization Problems with Arbitrarily Small Approximation Thresholds. Inf. Process. Lett. 68(5): 241-248 (1998) - [c19]Thomas Graf, V. Kamakoti, N. S. Janaki Latha, C. Pandu Rangan:
The Colored Sector Search Tree: A Dynamic Data Structure for Efficient High Dimensional Nearest-Foreign-Neighbor Queries. COCOON 1998: 35-44 - [c18]Sridhar Ramachandran, K. Rajasekar, C. Pandu Rangan:
Probabilistic Data Structures for Priority Queues (Extended Abstract). SWAT 1998: 143-154 - [c17]Venkatesan Guruswami, C. Pandu Rangan, Maw-Shang Chang, Gerard J. Chang, C. K. Wong:
The Vertex-Disjoint Triangles Problem. WG 1998: 26-37 - 1997
- [j47]G. Venkatesan, Udi Rotics, M. S. Madanlal, Johann A. Makowsky, C. Pandu Rangan:
Restrictions of Minimum Spanner Problems. Inf. Comput. 136(2): 143-164 (1997) - [c16]Thomas Graf, V. Kamakoti, N. S. Janaki Latha, C. Pandu Rangan:
An optimal parallel algorithm for the all-nearest-foreign-neighbors problem in arbitrary dimensions. HiPC 1997: 132-136 - 1996
- [j46]K. S. Easwarakumar, S. V. Krishnan, C. Pandu Rangan, S. Seshadri:
Optimal Parallel Algorithm for Finding st-Ambitus of a Planar Biconnected Graph. Algorithmica 15(3): 242-255 (1996) - [j45]Satyan R. Coorg, C. Pandu Rangan:
The Parity Path Problem on Some Subclasses of Perfect Graphs. Discret. Appl. Math. 68(3): 293-302 (1996) - [j44]V. Balachandhran, C. Pandu Rangan:
All-pairs-shortest-length on Strongly Chordal Graphs. Discret. Appl. Math. 69(1-2): 169-182 (1996) - [j43]V. Balachandran, P. Nagavamsi, C. Pandu Rangan:
Clique Transversal and Clique Independence on Comparability Graphs. Inf. Process. Lett. 58(4): 181-184 (1996) - [j42]M. S. Madanlal, G. Venkatesan, C. Pandu Rangan:
Tree 3-Spanners on Interval, Permutation and Regular Bipartite Graphs. Inf. Process. Lett. 59(2): 97-102 (1996) - [j41]Rohan F. M. Aranha, C. Pandu Rangan:
An Efficient Distributed Algorithm for Centering a Spanning Tree of a Biconnected Graph. Inf. Process. Lett. 59(3): 145-150 (1996) - [j40]G. Venkatesan, C. Pandu Rangan:
Approximate Triclique Coloring for Register Allocation. Inf. Process. Lett. 60(5): 249-253 (1996) - 1995
- [j39]Gerard J. Chang, C. Pandu Rangan, Satyan R. Coorg:
Weighted Independent Perfect Domination on Cocomparability Graphs. Discret. Appl. Math. 63(3): 215-222 (1995) - [j38]C. P. Gopalakrishnan, C. Pandu Rangan:
Edge-disjoint paths in permutation graphs. Discuss. Math. Graph Theory 15(1): 59-72 (1995) - [j37]C. P. Gopalakrishnan, C. Pandu Rangan, Satyan R. Coorg:
Efficient algorithms for minimal disjoint path problems on chordal graphs. Discuss. Math. Graph Theory 15(2): 119-145 (1995) - [j36]C. P. Gopalakrishnan, C. Pandu Rangan:
A linear algorithms for the two paths problem on permutation graphs. Discuss. Math. Graph Theory 15(2): 147-166 (1995) - [j35]Saptarshi Mahesh, C. Siva Ram Murthy, C. Pandu Rangan:
Efficient Dynamic Job Scheduling Algorithms for Multiprocessor Systems. IEICE Trans. Inf. Syst. 78-D(1): 3-12 (1995) - [j34]Sathi Mahesh, C. Siva Ram Murthy, T. A. Gonsalves, C. Pandu Rangan:
Modeling and simulation of dynamic job scheduling in multiprocessor systems. Int. J. Comput. Math. 58(3-4): 221-247 (1995) - [j33]Anand Srinivasan, K. Madhukar, P. Nagavamsi, C. Pandu Rangan, Maw-Shang Chang:
Edge Domination on Bipartite Permutation Graphs and Cotriangulated Graphs. Inf. Process. Lett. 56(3): 165-171 (1995) - [j32]V. B. Balayogan, C. Pandu Rangan:
Parallel Algorithms on Interval Graphs. RAIRO Theor. Informatics Appl. 29(6): 451-470 (1995) - [j31]K. Arvind, V. Kamakoti, C. Pandu Rangan:
Efficient Parallel Algorithms for Permutation Graphs. J. Parallel Distributed Comput. 26(1): 116-124 (1995) - [j30]Rohan F. M. Aranha, C. Pandu Rangan:
An Efficient Distributed Algorithm For st-numbering The Verices Of A Biconnected Graph. J. Univers. Comput. Sci. 1(9): 633-650 (1995) - [j29]Satyan R. Coorg, C. Pandu Rangan:
Feedback vertex set on cocomparability graphs. Networks 26(2): 101-111 (1995) - [j28]V. Kamakoti, Kamala Krithivasan, C. Pandu Rangan:
An Efficient Randomized Algorithm for the Closest Pair Problem on Colored Point Sets. Nord. J. Comput. 2(1): 28-40 (1995) - [j27]Sathi Mahesh, C. Siva Ram Murthy, C. Pandu Rangan:
Performance Bounds for Static Multiprocessor Scheduling of Multi-Task Jobs. Parallel Process. Lett. 5: 343-355 (1995) - [j26]K. Madhukar, D. Pavan Kumar, C. Pandu Rangan, R. Sundar:
Systematic Design of an Algorithm for Biconnected Components. Sci. Comput. Program. 25(1): 63-77 (1995) - [j25]G. Srikrishna, C. Pandu Rangan:
Optimal Parallel Algorithms for Path Problems on Planar Graphs. Theor. Comput. Sci. 145(1&2): 27-43 (1995) - [c15]V. Kamakoti, Kamala Krithivasan, C. Pandu Rangan:
Efficient Randomized Incremental Algorithm For The Closest Pair Problem Using Leafary Trees. COCOON 1995: 71-80 - 1994
- [j24]K. S. Easwarakumar, C. Pandu Rangan, Grant A. Cheston:
A Linear Algorithm for Centering a Spanning Tree of a Biconnected Graph. Inf. Process. Lett. 51(3): 121-124 (1994) - [j23]Maurice Nivat, G. D. S. Ramkumar, C. Pandu Rangan, Ahmed Saoudi, Ravi Sundaram:
Efficient Parallel Shuffle Recognition. Parallel Process. Lett. 4: 455-463 (1994) - [j22]Ravi Sundaram, Karan Sher Singh, C. Pandu Rangan:
Treewidth of Circular-Arc Graphs. SIAM J. Discret. Math. 7(4): 647-655 (1994) - [c14]P. Jagan Mohan, V. Kamakoti, C. Pandu Rangan:
Efficient Randomized Parallel Algorithm for the Closest Pair Problem in D-dimension. IFIP Congress (1) 1994: 547-552 - [c13]C. P. Gopalakrishnan, C. Pandu Rangan:
Edge-Disjoint Paths in Permutation Graphs. ISAAC 1994: 208-216 - [c12]C. Pandu Rangan, Maw-Shang Chang:
Weighted Irredundance of Interval Graphs. ISAAC 1994: 567-574 - 1993
- [j21]P. B. Ramprasad, C. Pandu Rangan:
A Linear Algorithm for the All-Bidirectional-Edges Problem on Planar Graphs. Algorithmica 9(3): 199-216 (1993) - [j20]Arjun Raman, C. Pandu Rangan:
A Unified Approach to Parallel Algorithms for the Domatic Partition Problem on Special Classes of Perfect Graphs. Parallel Process. Lett. 3: 233-241 (1993) - [j19]R. Srikant, Ravi Sundaram, Karan Sher Singh, C. Pandu Rangan:
Optimal Path Cover Problem on Block Graphs and Bipartite Permutation Graphs. Theor. Comput. Sci. 115(2): 351-357 (1993) - [c11]Gerard J. Chang, C. Pandu Rangan, Satyan R. Coorg:
Weighted Independent Perfect Domination on Cocomparability Graphs. ISAAC 1993: 506-514 - [c10]Hari Balakrishnan, Anand Rajaraman, C. Pandu Rangan:
Connected Domination and Steiner Set on Asteroidal Triple-Free Graphs. WADS 1993: 131-141 - 1992
- [j18]C. Pandu Rangan, Ramesh Govindan:
An O(n log n) algorithm for a maxmin location problem. Discret. Appl. Math. 36(2): 203-205 (1992) - [j17]Madhav V. Marathe, R. Ravi, C. Pandu Rangan:
Generalized Vertex Covering in Interval Graphs. Discret. Appl. Math. 39(1): 87-93 (1992) - [j16]V. Kamakoti, C. Pandu Rangan:
An Optimal Algorithm for Reconstructing a Binary Tree. Inf. Process. Lett. 42(2): 113-115 (1992) - [j15]R. Ravi, Madhav V. Marathe, C. Pandu Rangan:
An optimal algorithm to solve the all-pair shortest path problem on interval graphs. Networks 22(1): 21-35 (1992) - [c9]Ahmed Saoudi, Maurice Nivat, C. Pandu Rangan, Ravi Sundaram, G. D. S. Ramkumar:
A Parallel Algorithm for Recognizing the Shuffle of Two Strings. IPPS 1992: 112-115 - 1991
- [j14]Srinivasa Rao Arikati, C. Pandu Rangan, Glenn K. Manacher:
Efficient Reduction for Path Problems on Circular-Arc Graphs. BIT 31(2): 181-193 (1991) - [j13]Srinivasa Rao Arikati, C. Pandu Rangan:
An efficient algorithm for finding a two-pair, and its applications. Discret. Appl. Math. 31(1): 71-74 (1991) - [j12]R. Mahesh, C. Pandu Rangan, Aravind Srinivasan:
On Finding the Minimum Bandwidth of Interval Graphs. Inf. Comput. 95(2): 218-224 (1991) - [j11]Aravind Srinivasan, C. Pandu Rangan:
Efficient Algorithms for the Minimum Weighted Dominating Clique Problem on Permutation Graphs. Theor. Comput. Sci. 91(1): 1-21 (1991) - [c8]Ravi Sundaram, Karan Sher Singh, C. Pandu Rangan:
Treewidth of Circular-Arc Graphs (Abstract). WADS 1991: 41 - 1990
- [j10]S. Sudarshan, C. Pandu Rangan:
A Fast Algorithm for Computing Sparse Visibility Graphs. Algorithmica 5(2): 210-214 (1990) - [j9]G. Ramalingam, C. Pandu Rangan:
New Sequential and Parallel Algorithms for Interval Graph Recognition. Inf. Process. Lett. 34(4): 215-219 (1990) - [j8]Srinivasa Rao Arikati, C. Pandu Rangan:
Linear Algorithm for Optimal Path Cover Problem on Interval Graphs. Inf. Process. Lett. 35(3): 149-153 (1990) - [c7]G. D. S. Ramkumar, C. Pandu Rangan:
Parallel Algorithms on Interval Graphs. ICPP (3) 1990: 72-74
1980 – 1989
- 1989
- [j7]A. Srinivasa Rao, C. Pandu Rangan:
Linear Algorithm for Domatic Number Problem on Interval Graphs. Inf. Process. Lett. 33(1): 29-33 (1989) - [j6]A. Srinivasa Rao, C. Pandu Rangan:
Optimal Parallel Algorithms on Circular-Arc Graphs. Inf. Process. Lett. 33(3): 147-156 (1989) - [j5]Suresh Venkatasubramanian, Kamala Krithivasan, C. Pandu Rangan:
Algorithms for Weighted Graph Problems on The Modified Cellular Graph Automaton. RAIRO Theor. Informatics Appl. 23(3): 251-279 (1989) - [c6]A. Srinivasa Rao, C. Pandu Rangan:
Optimal Parallel Algorithms on Circular-Arc Graphs. FSTTCS 1989: 44-55 - [c5]A. Srinivasa Rao, C. Pandu Rangan:
Linear Algorithms for Parity Path and Two Path Problems on Circular-Arc Graph. WADS 1989: 267-290 - 1988
- [j4]G. Ramalingam, C. Pandu Rangan:
Total Domination in Interval Graphs Revisited. Inf. Process. Lett. 27(1): 17-21 (1988) - [j3]G. Ramalingam, C. Pandu Rangan:
A Unified Approach to Domination Problems on Interval Graphs. Inf. Process. Lett. 27(5): 271-274 (1988) - [c4]S. V. Krishnan, C. Pandu Rangan, S. Seshadri:
A New Linear Algorithm for the Two Path Problem on Chordal Graphs. FSTTCS 1988: 49-66 - 1987
- [j2]S. Kiran Kumar, C. Pandu Rangan:
A Linear Space Algorithm for the LCS Problem. Acta Informatica 24(3): 353-362 (1987) - [c3]T. Hari Krishna Prasad, C. Pandurangan:
New Parallel Algorithms for the Maximum Empty Rectangle Problem. ICPP 1987: 286-288 - [c2]Ramesh Govindan, C. Pandu Rangan:
Competitive Location in the L1 and LINF Metrics. WG 1987: 70-83 - 1986
- [c1]Ramesh Dewangan, C. Pandu Rangan:
A Simple Implementation of Warshall's Algorithm on a VLSI Chip. WG 1986: 131-145 - 1983
- [j1]C. Pandu Rangan:
On the Minimum Number of Additions Required to Compute a Quadratic Form. J. Algorithms 4(3): 282-285 (1983)
Coauthor Index
aka: Ashish Choudhary
aka: Kannan Srinathan
aka: Sree Vivek Sivanandam
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint