C. Pandu Rangan
Affiliations:- Indian Institute of Technology Madras, Computer Science and Engineering Department, Chennai, India
According to our database1,
C. Pandu Rangan
authored at least 294 papers
between 1983 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
2021
J. Internet Serv. Inf. Secur., 2021
Int. J. Comput. Math. Comput. Syst. Theory, 2021
IET Inf. Secur., 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
Theory Comput. Syst., 2020
J. Math. Cryptol., 2020
J. Internet Serv. Inf. Secur., 2020
J. Inf. Secur. Appl., 2020
IACR Cryptol. ePrint Arch., 2020
Improving Accuracy of Differentially Private Kronecker Social Networks via Graph Clustering.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
Two-Stage Framework for Accurate and Differentially Private Network Information Publication.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks.
Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy, 2019
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019
2018
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting.
Proceedings of the Provable Security, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
Secur. Commun. Networks, 2016
J. Internet Serv. Inf. Secur., 2016
Int. J. Comput. Math., 2016
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers.
IACR Cryptol. ePrint Arch., 2016
2015
Mob. Inf. Syst., 2015
J. Cryptol., 2015
IACR Cryptol. ePrint Arch., 2015
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the SECRYPT 2015, 2015
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction.
Proceedings of the Provable Security, 2015
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
J. Internet Serv. Inf. Secur., 2014
J. Internet Serv. Inf. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols.
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
J. Internet Serv. Inf. Secur., 2013
Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext.
J. Internet Serv. Inf. Secur., 2013
J. Internet Serv. Inf. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round.
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
2012
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Internet Serv. Inf. Secur., 2012
J. Internet Serv. Inf. Secur., 2012
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission.
J. ACM, 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012
Proceedings of the LATIN 2012: Theoretical Informatics, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012
2011
J. Parallel Distributed Comput., 2011
IACR Cryptol. ePrint Arch., 2011
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security
CoRR, 2011
On the Fault Tolerance and Hamiltonicity of the Optical Transpose Interconnection System of Non-Hamiltonian Base Graphs
CoRR, 2011
Proceedings of the WALCOM: Algorithms and Computation - 5th International Workshop, 2011
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011
CCA Secure Certificateless Encryption Schemes based on RSA.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Security Aspects in Information Technology, 2011
2010
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality.
Int. J. Appl. Cryptogr., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the WALCOM: Algorithms and Computation, 4th International Workshop, 2010
Proceedings of the WALCOM: Algorithms and Computation, 4th International Workshop, 2010
An Identity based Ring Signcryption Scheme with Public Verifiability.
Proceedings of the SECRYPT 2010, 2010
Forcing Out a Confession - Threshold Discernible Ring Signatures.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Brief announcement: perfectly secure message transmissiontolerating mobile mixed adversary with reduced phase complexity.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
Int. J. Appl. Cryptogr., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2009
Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2009
On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security.
IACR Cryptol. ePrint Arch., 2009
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the WALCOM: Algorithms and Computation, Third International Workshop, 2009
Brief announcement: perfectly secure message transmission in directed networks re-visited.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009
Proceedings of the Combinatorial Algorithms, 20th International Workshop, 2009
Proceedings of the Progress in Cryptology, 2009
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience.
Proceedings of the Progress in Cryptology, 2009
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting.
IACR Cryptol. ePrint Arch., 2008
Foundations of Group Key Management - Framework, Security Model and a Generic Construction.
IACR Cryptol. ePrint Arch., 2008
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2008
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Efficient single phase unconditionally secure message transmission with optimum communication complexity.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary.
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary.
Proceedings of the Distributed Computing, 21st International Symposium, 2007
On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Constant phase efficient protocols for secure message transmission in directed networks.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007
Efficient Protocol For Approximate Agreement.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality.
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Data structures for limited oblivious execution of programs while preserving locality of reference.
Proceedings of the Seventh ACM Workshop on Digital Rights Management, 2007
Privacy Preserving CACTUS Algorithm for Clustering over Vertically Partitioned Databases.
Proceedings of the 2007 International Conference on Data Mining, 2007
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases.
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Playing push vs pull: models and algorithms for disseminating dynamic data in networks.
Proceedings of the SPAA 2006: Proceedings of the 18th Annual ACM Symposium on Parallelism in Algorithms and Architectures, Cambridge, Massachusetts, USA, July 30, 2006
Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006
Possibility and complexity of probabilistic reliable communication in directed networks.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission.
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
2004
Proceedings of the Handbook of Data Structures and Applications., 2004
Proceedings of the Distributed Computing, 18th International Conference, 2004
Brief announcement: on the round complexity of distributed consensus over synchronous networks.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Brief announcement: efficient perfectly secure communication over synchronous networks.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Progress in Cryptology, 2001
2000
RAIRO Theor. Informatics Appl., 2000
Discret. Appl. Math., 2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the Progress in Cryptology, 2000
1999
Inf. Process. Lett., 1999
1998
A Natural Family of Optimization Problems with Arbitrarily Small Approximation Thresholds.
Inf. Process. Lett., 1998
On The g-centroidal Problem in Special Classes of Perfect Graphs.
Ars Comb., 1998
Proceedings of the Graph-Theoretic Concepts in Computer Science, 1998
Proceedings of the Algorithm Theory, 1998
The Colored Sector Search Tree: A Dynamic Data Structure for Efficient High Dimensional Nearest-Foreign-Neighbor Queries.
Proceedings of the Computing and Combinatorics, 4th Annual International Conference, 1998
1997
An optimal parallel algorithm for the all-nearest-foreign-neighbors problem in arbitrary dimensions.
Proceedings of the Fourth International on High-Performance Computing, 1997
1996
Inf. Process. Lett., 1996
Inf. Process. Lett., 1996
An Efficient Distributed Algorithm for Centering a Spanning Tree of a Biconnected Graph.
Inf. Process. Lett., 1996
Discret. Appl. Math., 1996
Algorithmica, 1996
1995
Theor. Comput. Sci., 1995
Sci. Comput. Program., 1995
Parallel Process. Lett., 1995
An Efficient Randomized Algorithm for the Closest Pair Problem on Colored Point Sets.
Nord. J. Comput., 1995
An Efficient Distributed Algorithm For st-numbering The Verices Of A Biconnected Graph
J. Univers. Comput. Sci., 1995
J. Parallel Distributed Comput., 1995
Inf. Process. Lett., 1995
Int. J. Comput. Math., 1995
IEICE Trans. Inf. Syst., 1995
Discuss. Math. Graph Theory, 1995
Discuss. Math. Graph Theory, 1995
Discret. Appl. Math., 1995
Efficient Randomized Incremental Algorithm For The Closest Pair Problem Using Leafary Trees.
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995
1994
Inf. Process. Lett., 1994
Proceedings of the Algorithms and Computation, 5th International Symposium, 1994
Efficient Randomized Parallel Algorithm for the Closest Pair Problem in D-dimension.
Proceedings of the Technology and Foundations - Information Processing '94, Volume 1, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994
1993
Theor. Comput. Sci., 1993
A Unified Approach to Parallel Algorithms for the Domatic Partition Problem on Special Classes of Perfect Graphs.
Parallel Process. Lett., 1993
Algorithmica, 1993
Proceedings of the Algorithms and Data Structures, Third Workshop, 1993
1992
Networks, 1992
Proceedings of the 6th International Parallel Processing Symposium, 1992
1991
Efficient Algorithms for the Minimum Weighted Dominating Clique Problem on Permutation Graphs.
Theor. Comput. Sci., 1991
Discret. Appl. Math., 1991
Proceedings of the Algorithms and Data Structures, 1991
1990
Inf. Process. Lett., 1990
Inf. Process. Lett., 1990
Parallel Algorithms on Interval Graphs.
Proceedings of the 1990 International Conference on Parallel Processing, 1990
1989
RAIRO Theor. Informatics Appl., 1989
Inf. Process. Lett., 1989
Proceedings of the Algorithms and Data Structures, 1989
1988
Inf. Process. Lett., 1988
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1988
1987
Proceedings of the Graph-Theoretic Concepts in Computer Science, International Workshop, 1987
New Parallel Algorithms for the Maximum Empty Rectangle Problem.
Proceedings of the International Conference on Parallel Processing, 1987
1986
Proceedings of the Graphtheoretic Concepts in Computer Science, International Workshop, 1986
1983
J. Algorithms, 1983