C. Pandu Rangan

From MaRDI portal
Person:189690

Available identifiers

zbMath Open rangan.chandrasekharan-panduDBLPr/CPanduRanganWikidataQ27916088 ScholiaQ27916088MaRDI QIDQ189690

List of research outcomes





PublicationDate of PublicationType
Forward security under leakage resilience, revisited2024-06-05Paper
Efficient randomized incremental algorithm for the closest pair problem using Leafary trees2023-12-12Paper
An efficient attribute-based authenticated key exchange protocol2023-08-02Paper
Connected domination and steiner set on asteroidal triple-free graphs2023-01-18Paper
Efficient attribute-based proxy re-encryption with constant size ciphertexts2022-07-06Paper
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption2022-07-01Paper
New approach to practical leakage-resilient public-key cryptography2021-05-03Paper
Identity-Based Group Encryption Revisited2020-07-20Paper
Sharing of Encrypted Files in Blockchain Made Simpler2020-06-29Paper
Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks2020-06-29Paper
Cache me if you can: capacitated selfish replication games in networks2020-02-27Paper
Public key encryption resilient to post-challenge leakage and tampering attacks2020-01-28Paper
A CCA-secure collusion-resistant identity-based proxy re-encryption scheme2018-11-07Paper
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting2018-11-07Paper
An efficient certificateless proxy re-encryption scheme without pairing2018-11-07Paper
https://portal.mardi4nfdi.de/entity/Q46438312018-05-29Paper
https://portal.mardi4nfdi.de/entity/Q46438392018-05-29Paper
Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE2017-08-25Paper
A natural family of optimization problems with arbitrarily small approximation thresholds2016-06-09Paper
Lattice-based identity-based resplittable threshold public key encryption scheme2016-05-06Paper
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction2016-01-27Paper
Constant Size Ring Signature Without Random Oracle2015-10-20Paper
Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model2015-10-16Paper
A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory2015-10-16Paper
Efficient asynchronous verifiable secret sharing and multiparty computation2015-03-25Paper
Possibility and complexity of probabilistic reliable communication in directed networks2015-03-10Paper
Brief announcement2015-03-02Paper
Efficient single phase unconditionally secure message transmission with optimum communication complexity2014-12-12Paper
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary2014-12-12Paper
Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings2014-09-15Paper
Identity-Based Identification Schemes from ID-KEMs2014-09-15Paper
On perfectly secure communication over arbitrary networks2014-07-25Paper
Simple and efficient asynchronous byzantine agreement with optimal resilience2014-07-23Paper
Asynchronous Byzantine agreement with optimal resilience2014-07-11Paper
Constant phase efficient protocols for secure message transmission in directed networks2014-03-13Paper
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission2014-02-17Paper
Variants of spreading messages2013-11-28Paper
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round2013-10-23Paper
Compact Stateful Encryption Schemes with Ciphertext Verifiability2013-04-04Paper
https://portal.mardi4nfdi.de/entity/Q49021212013-01-25Paper
ID Based Signcryption Scheme in Standard Model2012-11-06Paper
Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures2012-09-07Paper
An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model2012-09-07Paper
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions2012-06-29Paper
Cache Me If You Can: Capacitated Selfish Replication Games2012-06-29Paper
Identity-Based Deterministic Signature Scheme without Forking-Lemma2011-11-10Paper
Secure message transmission in asynchronous networks2011-08-19Paper
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience2011-05-19Paper
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality2011-04-05Paper
A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs2011-02-20Paper
On conditional covering problem2011-02-19Paper
The Round Complexity of Verifiable Secret Sharing: The Statistical Case2010-12-07Paper
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience2010-11-23Paper
Sanitizable Signatures with Strong Transparency in the Standard Model2010-11-23Paper
Breaking and Building of Threshold Signcryption Schemes2010-11-23Paper
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing2010-11-23Paper
Identity Based Public Verifiable Signcryption Scheme2010-10-12Paper
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience2010-09-29Paper
Communication Optimal Multi-valued Asynchronous Broadcast Protocol2010-08-31Paper
https://portal.mardi4nfdi.de/entity/Q35794252010-08-06Paper
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience2010-05-04Paper
Pathwidth and Searching in Parameterized Threshold Graphs2010-02-09Paper
Variants of Spreading Messages2010-02-09Paper
Perfectly reliable message transmission2010-01-29Paper
Identity Based Aggregate Signcryption Schemes2009-12-17Paper
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience2009-12-17Paper
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme2009-12-11Paper
The Guarding Problem – Complexity and Approximation2009-12-11Paper
Information Theoretically Secure Multi Party Set Intersection Re-visited2009-12-09Paper
On Exponential Lower Bound for Protocols for Reliable Communication in Networks2009-12-03Paper
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security2009-11-26Paper
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers2009-10-28Paper
The Round Complexity of Verifiable Secret Sharing Revisited2009-10-20Paper
On the Security of Identity Based Ring Signcryption Schemes2009-09-29Paper
Perfectly reliable and secure message transmission tolerating mobile adversary2009-05-12Paper
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks2009-03-26Paper
On Proactive Perfectly Secure Message Transmission2009-03-06Paper
Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme2009-02-24Paper
Efficient and Provably Secure Certificateless Multi-receiver Signcryption2009-01-27Paper
Round Efficient Unconditionally Secure Multiparty Computation Protocol2009-01-22Paper
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary2009-01-09Paper
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited2008-11-20Paper
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary2008-09-02Paper
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary2008-07-08Paper
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary2008-04-15Paper
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission2008-04-11Paper
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality2008-04-11Paper
Alternative Protocols for Generalized Oblivious Transfer2008-03-06Paper
On Optimal Probabilistic Asynchronous Byzantine Agreement2008-03-06Paper
Theory of Cryptography2007-02-12Paper
Weighted irredundance of interval graphs.2006-01-17Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q48086742004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44507452004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44174242003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44130032003-07-17Paper
Asynchronous Secure Communication Tolerating Mixed Adversaries2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q47885792003-01-28Paper
The \(K_r\)-packing problem2002-01-24Paper
https://portal.mardi4nfdi.de/entity/Q27075992001-07-08Paper
https://portal.mardi4nfdi.de/entity/Q27075982001-07-08Paper
On the complexity of partial order properties2001-06-28Paper
On the g-centroidal problem in special classes of perfect graphs2001-06-10Paper
https://portal.mardi4nfdi.de/entity/Q45203042001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q45257032001-01-24Paper
https://portal.mardi4nfdi.de/entity/Q45257502001-01-24Paper
Approximation Algorithms for the Traveling Salesman Problem with Range Condition2000-12-19Paper
Edge-disjoint paths in permutation graphs2000-11-30Paper
Algorithmic aspects of clique-transversal and clique-independent sets2000-11-30Paper
A linear algorithm for centering a spanning tree of a biconnected graph2000-11-30Paper
Feedback vertex set on cocomparability graphs2000-11-30Paper
https://portal.mardi4nfdi.de/entity/Q45147392000-11-14Paper
https://portal.mardi4nfdi.de/entity/Q49422572000-05-11Paper
https://portal.mardi4nfdi.de/entity/Q42684311999-10-31Paper
https://portal.mardi4nfdi.de/entity/Q42327751999-08-17Paper
Symmetric min-max heap: a simpler data structure for double-ended priority queue1999-04-28Paper
Parallel algorithms on interval graphs1998-01-29Paper
Restrictions of minimum spanner problems1997-12-14Paper
The parity path problem on some subclasses of perfect graphs1997-04-07Paper
Edge domination on bipartite permutation graphs and cotriangulated graphs1997-02-28Paper
Optimal parallel algorithms for path problems on planar graphs1997-02-28Paper
Approximate triclique coloring for register allocation1997-02-28Paper
Tree 3-spanners on interval, permutation and regular bipartite graphs1997-02-27Paper
An efficient distributed algorithm for centering a spanning tree of a biconnected graph1997-02-27Paper
All-pairs-shortest-length on strongly chordal graphs1996-10-09Paper
A linear algorithms for the two paths problem on permutation graphs1996-08-26Paper
Efficient algorithms for minimal disjoint path problems on chordal graphs1996-08-26Paper
Weighted independent perfect domination on cocomparability graphs1996-08-05Paper
https://portal.mardi4nfdi.de/entity/Q48470251996-05-28Paper
Efficient parallel algorithms for permutation graphs1995-07-06Paper
Treewidth of Circular-Arc Graphs1994-12-20Paper
A linear algorithm for the all-bidirectional-edges problem on planar graphs1993-05-16Paper
https://portal.mardi4nfdi.de/entity/Q40288931993-03-28Paper
Generalized vertex covering in interval graphs1993-01-16Paper
An optimal algorithm for reconstructing a binary tree1993-01-16Paper
An O\((n \log{}n)\) algorithm for a maxmin location problem1992-09-27Paper
An optimal algorithm to solve the all-pair shortest path problem on interval graphs1992-06-28Paper
On finding the minimum bandwidth of interval graphs1992-06-28Paper
An efficient algorithm for finding a two-pair, and its applications1992-06-25Paper
Efficient reduction for path problems on circular-arc graphs1991-01-01Paper
Linear algorithm for optimal path cover problem on interval graphs1990-01-01Paper
New sequential and parallel algorithms for interval graph recognition1990-01-01Paper
A fast algorithm for computing sparse visibility graphs1990-01-01Paper
Linear algorithm for domatic number problem on interval graphs1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33619061989-01-01Paper
Optimal parallel algorithms on circular-arc graphs1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37984531988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37905471988-01-01Paper
Matrix transposition in a magnetic bubble memory1988-01-01Paper
A unified approach to domination problems on interval graphs1988-01-01Paper
Total domination in interval graphs revisited1988-01-01Paper
A linear space algorithm for the LCS problem1987-01-01Paper
On the minimum number of additions required to compute a quadratic form1983-01-01Paper

Research outcomes over time

This page was built for person: C. Pandu Rangan