Follow
Josyula Ramachandra Rao
Josyula Ramachandra Rao
IBM Research
Verified email at us.ibm.com - Homepage
Title
Cited by
Cited by
Year
Template attacks
S Chari, JR Rao, P Rohatgi
Cryptographic hardware and embedded systems-CHES 2002: 4th International …, 2003
19142003
Towards sound approaches to counteract power-analysis attacks
S Chari, CS Jutla, JR Rao, P Rohatgi
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
14311999
The EM side—channel (s)
D Agrawal, B Archambeault, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
12862003
A survey of security issues in multicast communications
MJ Moyer, JR Rao, P Rohatgi
IEEE network 13 (6), 12-23, 1999
3161999
A cautionary note regarding evaluation of AES candidates on smart-cards
S Chari, C Jutla, JR Rao, P Rohatgi
Second Advanced Encryption Standard Candidate Conference, 133-147, 1999
2631999
Multi-channel attacks
D Agrawal, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
2062003
Can pseudonymity really guarantee privacy?
JR Rao, P Rohatgi
9th USENIX Security Symposium (USENIX Security 00), 2000
2012000
Partitioning attacks: or how to rapidly clone some GSM cards
JR Rao, P Rohatgi, H Scherzer, S Tinguely
Proceedings 2002 IEEE Symposium on Security and Privacy, 31-41, 2002
1562002
Adaptive cyber-security analytics
L Amini, M Christodorescu, MA Cohen, S Parthasarathy, J Rao, R Sailer, ...
US Patent 9,032,521, 2015
1462015
Detecting malicious user activity
SN Chari, TA Habeck, IM Molloy, Y Park, JR Rao, W Teiken
US Patent 10,599,837, 2020
1312020
Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure
S Berger, Y Chen, X Hu, D Pendarakis, J Rao, R Sailer, DL Schales, ...
US Patent 9,832,217, 2017
1312017
Maintaining balanced key trees for secure multicast
MJ Moyer
IRTF Internet Draft, 1999
1111999
Intrusion detection system
S Chari, PC Cheng, J Rao, P Rohatgi, M Steiner
US Patent App. 11/037,695, 2006
1042006
Security for the cloud infrastructure: Trusted virtual data center implementation
S Berger, R Cáceres, K Goldman, D Pendarakis, R Perez, JR Rao, E Rom, ...
IBM Journal of Research and Development 53 (4), 6: 1-6: 12, 2009
1002009
Systems, methods and computer programs providing impact mitigation of cyber-security failures
Y Drissi, IIRA Hamilton, CG Harrison, JL Kouloheris, PC Pattnaik, JR Rao, ...
US Patent 9,129,108, 2015
912015
Templates as master keys
D Agrawal, JR Rao, P Rohatgi, K Schramm
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
842005
Efficient implementation of Rijndael encryption with composite field arithmetic
A Rudra, PK Dubey, CS Jutla, V Kumar, JR Rao, P Rohatgi
Proc. CHES 2001 2162, 175-188, 2001
832001
System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values
SC Gates, Y Park, JR Rao, W Teiken
US Patent 8,560,722, 2013
782013
Empowering side-channel attacks
JR Rao, P Rohatgi
Cryptology EPrint Archive, 2001
782001
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
682018
The system can't perform the operation now. Try again later.
Articles 1–20