Ramarathnam Venkatesan
Affiliations:- Microsoft Research
According to our database1,
Ramarathnam Venkatesan
authored at least 99 papers
between 1986 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
2020
Proceedings of the 2020 International Conference on Management of Data, 2020
2019
Proceedings of the 9th Biennial Conference on Innovative Data Systems Research, 2019
2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 ACM International Conference on Management of Data, 2017
2016
2015
2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013
Proceedings of the Sixth Biennial Conference on Innovative Data Systems Research, 2013
2012
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
Proceedings of the 22nd International Conference on Field Programmable Logic and Applications (FPL), 2012
2011
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Forcing Out a Confession - Threshold Discernible Ring Signatures.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
2009
Proceedings of the Verification, 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Iterated Transformations and Quantitative Metrics for Software Protection.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009
2008
Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, 2008
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the 46th Annual Allerton Conference on Communication, 2008
2007
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007
Proceedings of the Theory and Applications of Satisfiability Testing, 2007
Proceedings of the Stochastic Algorithms: Foundations and Applications, 2007
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings.
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007
Data structures for limited oblivious execution of programs while preserving locality of reference.
Proceedings of the Seventh ACM Workshop on Digital Rights Management, 2007
Proceedings of the Seventh ACM Workshop on Digital Rights Management, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006
2005
Watermarking via optimization algorithms for quantizing randomized semi-global image statistics.
Multim. Syst., 2005
Multim. Syst., 2005
Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Randomized Detection For Spread-Spectrum Watermarking: Defending Against Sensitivity and Other Attacks.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
2004
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves.
IACR Cryptol. ePrint Arch., 2004
Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics.
Proceedings of the 6th workshop on Multimedia & Security, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
2003
Proceedings of the Advances in Cryptology, 2003
2002
J. Parallel Distributed Comput., 2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
Blind image watermarking via derivation and quantization of robust semi-global statistics.
Proceedings of the IEEE International Conference on Acoustics, 2002
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Information Hiding, 4th International Workshop, 2001
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding.
Proceedings of the Information Hiding, 4th International Workshop, 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001
2000
Proceedings of the 2000 International Conference on Image Processing, 2000
Proceedings of the 2000 International Conference on Image Processing, 2000
1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
1998
J. Cryptol., 1998
IACR Cryptol. ePrint Arch., 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 1997
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 1997
1996
Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel.
Proceedings of the Advances in Cryptology, 1996
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes.
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, 1995
Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, 1995
1994
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994
1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the 1991 International Symposium on Fault-Tolerant Computing, 1991
1990
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990
Proceedings of the Advances In Computational Complexity Theory, 1990
1988
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1988
1986
Proceedings of the 24th Annual Meeting of the Association for Computational Linguistics, 1986