C. Pandu Rangan

From MaRDI portal
Person:189690

Available identifiers

zbMath Open rangan.chandrasekharan-panduDBLPr/CPanduRanganWikidataQ27916088 ScholiaQ27916088MaRDI QIDQ189690

List of research outcomes

PublicationDate of PublicationType
Efficient randomized incremental algorithm for the closest pair problem using Leafary trees2023-12-12Paper
An efficient attribute-based authenticated key exchange protocol2023-08-02Paper
Connected domination and steiner set on asteroidal triple-free graphs2023-01-18Paper
Efficient attribute-based proxy re-encryption with constant size ciphertexts2022-07-06Paper
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption2022-07-01Paper
New approach to practical leakage-resilient public-key cryptography2021-05-03Paper
Identity-Based Group Encryption Revisited2020-07-20Paper
Sharing of Encrypted Files in Blockchain Made Simpler2020-06-29Paper
Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks2020-06-29Paper
Cache me if you can: capacitated selfish replication games in networks2020-02-27Paper
Public key encryption resilient to post-challenge leakage and tampering attacks2020-01-28Paper
A CCA-secure collusion-resistant identity-based proxy re-encryption scheme2018-11-07Paper
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting2018-11-07Paper
An efficient certificateless proxy re-encryption scheme without pairing2018-11-07Paper
https://portal.mardi4nfdi.de/entity/Q46438312018-05-29Paper
https://portal.mardi4nfdi.de/entity/Q46438392018-05-29Paper
Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE2017-08-25Paper
A natural family of optimization problems with arbitrarily small approximation thresholds2016-06-09Paper
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction2016-01-27Paper
Constant Size Ring Signature Without Random Oracle2015-10-20Paper
A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory2015-10-16Paper
Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model2015-10-16Paper
Efficient asynchronous verifiable secret sharing and multiparty computation2015-03-25Paper
Possibility and complexity of probabilistic reliable communication in directed networks2015-03-10Paper
Brief announcement2015-03-02Paper
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary2014-12-12Paper
Efficient single phase unconditionally secure message transmission with optimum communication complexity2014-12-12Paper
Identity-Based Identification Schemes from ID-KEMs2014-09-15Paper
Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings2014-09-15Paper
On perfectly secure communication over arbitrary networks2014-07-25Paper
Simple and efficient asynchronous byzantine agreement with optimal resilience2014-07-23Paper
Asynchronous Byzantine agreement with optimal resilience2014-07-11Paper
Constant phase efficient protocols for secure message transmission in directed networks2014-03-13Paper
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission2014-02-17Paper
Variants of Spreading Messages2013-11-28Paper
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round2013-10-23Paper
Compact Stateful Encryption Schemes with Ciphertext Verifiability2013-04-04Paper
https://portal.mardi4nfdi.de/entity/Q49021212013-01-25Paper
ID Based Signcryption Scheme in Standard Model2012-11-06Paper
An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model2012-09-07Paper
Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures2012-09-07Paper
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions2012-06-29Paper
Cache Me If You Can: Capacitated Selfish Replication Games2012-06-29Paper
Identity-Based Deterministic Signature Scheme without Forking-Lemma2011-11-10Paper
Secure message transmission in asynchronous networks2011-08-19Paper
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience2011-05-19Paper
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality2011-04-05Paper
A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs2011-02-20Paper
On conditional covering problem2011-02-19Paper
The Round Complexity of Verifiable Secret Sharing: The Statistical Case2010-12-07Paper
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing2010-11-23Paper
Sanitizable Signatures with Strong Transparency in the Standard Model2010-11-23Paper
Breaking and Building of Threshold Signcryption Schemes2010-11-23Paper
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience2010-11-23Paper
Identity Based Public Verifiable Signcryption Scheme2010-10-12Paper
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience2010-09-29Paper
Communication Optimal Multi-valued Asynchronous Broadcast Protocol2010-08-31Paper
https://portal.mardi4nfdi.de/entity/Q35794252010-08-06Paper
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience2010-05-04Paper
Variants of Spreading Messages2010-02-09Paper
Pathwidth and Searching in Parameterized Threshold Graphs2010-02-09Paper
Perfectly reliable message transmission2010-01-29Paper
Identity Based Aggregate Signcryption Schemes2009-12-17Paper
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience2009-12-17Paper
The Guarding Problem – Complexity and Approximation2009-12-11Paper
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme2009-12-11Paper
Information Theoretically Secure Multi Party Set Intersection Re-visited2009-12-09Paper
On Exponential Lower Bound for Protocols for Reliable Communication in Networks2009-12-03Paper
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security2009-11-26Paper
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers2009-10-28Paper
The Round Complexity of Verifiable Secret Sharing Revisited2009-10-20Paper
On the Security of Identity Based Ring Signcryption Schemes2009-09-29Paper
Perfectly reliable and secure message transmission tolerating mobile adversary2009-05-12Paper
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks2009-03-26Paper
On Proactive Perfectly Secure Message Transmission2009-03-06Paper
Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme2009-02-24Paper
Efficient and Provably Secure Certificateless Multi-receiver Signcryption2009-01-27Paper
Round Efficient Unconditionally Secure Multiparty Computation Protocol2009-01-22Paper
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary2009-01-09Paper
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited2008-11-20Paper
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary2008-09-02Paper
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary2008-07-08Paper
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary2008-04-15Paper
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality2008-04-11Paper
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission2008-04-11Paper
On Optimal Probabilistic Asynchronous Byzantine Agreement2008-03-06Paper
Alternative Protocols for Generalized Oblivious Transfer2008-03-06Paper
Theory of Cryptography2007-02-12Paper
Weighted irredundance of interval graphs.2006-01-17Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q48086742004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44507452004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44174242003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44130032003-07-17Paper
Asynchronous Secure Communication Tolerating Mixed Adversaries2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q47885792003-01-28Paper
The \(K_r\)-packing problem2002-01-24Paper
https://portal.mardi4nfdi.de/entity/Q27075982001-07-08Paper
https://portal.mardi4nfdi.de/entity/Q27075992001-07-08Paper
On the complexity of partial order properties2001-06-28Paper
https://portal.mardi4nfdi.de/entity/Q45203042001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q45257032001-01-24Paper
https://portal.mardi4nfdi.de/entity/Q45257502001-01-24Paper
Approximation Algorithms for the Traveling Salesman Problem with Range Condition2000-12-19Paper
Edge-disjoint paths in permutation graphs2000-11-30Paper
Feedback vertex set on cocomparability graphs2000-11-30Paper
A linear algorithm for centering a spanning tree of a biconnected graph2000-11-30Paper
Algorithmic aspects of clique-transversal and clique-independent sets2000-11-30Paper
https://portal.mardi4nfdi.de/entity/Q45147392000-11-14Paper
https://portal.mardi4nfdi.de/entity/Q49422572000-05-11Paper
https://portal.mardi4nfdi.de/entity/Q42684311999-10-31Paper
https://portal.mardi4nfdi.de/entity/Q42327751999-08-17Paper
Symmetric min-max heap: a simpler data structure for double-ended priority queue1999-04-28Paper
Parallel algorithms on interval graphs1998-01-29Paper
Restrictions of minimum spanner problems1997-12-14Paper
The parity path problem on some subclasses of perfect graphs1997-04-07Paper
Edge domination on bipartite permutation graphs and cotriangulated graphs1997-02-28Paper
Optimal parallel algorithms for path problems on planar graphs1997-02-28Paper
Approximate triclique coloring for register allocation1997-02-28Paper
Tree 3-spanners on interval, permutation and regular bipartite graphs1997-02-27Paper
An efficient distributed algorithm for centering a spanning tree of a biconnected graph1997-02-27Paper
All-pairs-shortest-length on strongly chordal graphs1996-10-09Paper
Efficient algorithms for minimal disjoint path problems on chordal graphs1996-08-26Paper
A linear algorithms for the two paths problem on permutation graphs1996-08-26Paper
Weighted independent perfect domination on cocomparability graphs1996-08-05Paper
https://portal.mardi4nfdi.de/entity/Q48470251996-05-28Paper
Efficient parallel algorithms for permutation graphs1995-07-06Paper
Treewidth of Circular-Arc Graphs1994-12-20Paper
A linear algorithm for the all-bidirectional-edges problem on planar graphs1993-05-16Paper
https://portal.mardi4nfdi.de/entity/Q40288931993-03-28Paper
An optimal algorithm for reconstructing a binary tree1993-01-16Paper
Generalized vertex covering in interval graphs1993-01-16Paper
An O\((n \log{}n)\) algorithm for a maxmin location problem1992-09-27Paper
On finding the minimum bandwidth of interval graphs1992-06-28Paper
An optimal algorithm to solve the all-pair shortest path problem on interval graphs1992-06-28Paper
An efficient algorithm for finding a two-pair, and its applications1992-06-25Paper
Efficient reduction for path problems on circular-arc graphs1991-01-01Paper
Linear algorithm for optimal path cover problem on interval graphs1990-01-01Paper
New sequential and parallel algorithms for interval graph recognition1990-01-01Paper
A fast algorithm for computing sparse visibility graphs1990-01-01Paper
Linear algorithm for domatic number problem on interval graphs1989-01-01Paper
Optimal parallel algorithms on circular-arc graphs1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33619061989-01-01Paper
A unified approach to domination problems on interval graphs1988-01-01Paper
Total domination in interval graphs revisited1988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37905471988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37984531988-01-01Paper
Matrix transposition in a magnetic bubble memory1988-01-01Paper
A linear space algorithm for the LCS problem1987-01-01Paper
On the minimum number of additions required to compute a quadratic form1983-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: C. Pandu Rangan