Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, WS Poon, ... IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2017 | 152 | 2017 |
A secure identification and key agreement protocol with user anonymity (SIKA) K Mangipudi, R Katti Computers & Security 25 (6), 420-425, 2006 | 84 | 2006 |
Multiple-output low-power linear feedback shift register design RS Katti, X Ruan, H Khattri IEEE Transactions on Circuits and Systems I: Regular Papers 53 (7), 1487-1495, 2006 | 69 | 2006 |
Efficient hardware implementation of a new pseudo-random bit sequence generator RS Katti, SK Srinivasan 2009 IEEE international symposium on circuits and systems, 1393-1396, 2009 | 58 | 2009 |
Pseudorandom bit generation using coupled congruential generators RS Katti, RG Kavasseri, V Sai IEEE Transactions on Circuits and Systems II: Express Briefs 57 (3), 203-207, 2010 | 49 | 2010 |
An efficient data-independent technique for compressing test vectors in systems-on-a-chip X Ruan, R Katti IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and …, 2006 | 49 | 2006 |
A new residue arithmetic error correction scheme RS Katti IEEE transactions on computers 45 (1), 13-19, 1996 | 48 | 1996 |
On the security of randomized arithmetic codes against ciphertext-only attacks RS Katti, SK Srinivasan, A Vosoughi IEEE Transactions on Information Forensics and Security 6 (1), 19-27, 2010 | 44 | 2010 |
Low complexity multiplication in a finite field using ring representation R Katti, J Brennan IEEE Transactions on Computers 52 (4), 418-427, 2003 | 43 | 2003 |
A variable length fast message authentication code for secure communication in smart grids R Sule, RS Katti, RG Kavasseri 2012 IEEE Power and Energy Society General Meeting, 1-6, 2012 | 42 | 2012 |
Secure pseudo-random bit sequence generation using coupled linear congruential generators RS Katti, RG Kavasseri 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 2929-2932, 2008 | 39 | 2008 |
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols B David, R Dowsley, R Katti, ACA Nascimento International Conference on Provable Security, 354-367, 2015 | 36 | 2015 |
Achieving network on chip fault tolerance by adaptive remapping C Ababei, R Katti 2009 IEEE International Symposium on Parallel & Distributed Processing, 1-4, 2009 | 34 | 2009 |
A Hash-based Strong Password Authentication Protocol with User Anonymity. KV Mangipudi, RS Katti Int. J. Netw. Secur. 2 (3), 205-209, 2006 | 28 | 2006 |
Left-to-right optimal signed-binary representation of a pair of integers X Ruan, RS Katti IEEE Transactions on Computers 54 (2), 124-131, 2005 | 27 | 2005 |
The alternating greedy expansion and applications to computing digit expansions from left-to-right in cryptography C Heuberger, R Katti, H Prodinger, X Ruan Theoretical computer science 341 (1-3), 55-72, 2005 | 26 | 2005 |
A modified Booth algorithm for high radix fixed-point multiplication R Katti IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2 (4), 522-524, 1994 | 26 | 1994 |
Authentication and Key Agreement Protocols Preserving Anonymity. KV Mangipudi, RS Katti, H Fu Int. J. Netw. Secur. 3 (3), 259-270, 2006 | 25 | 2006 |
Speeding up elliptic cryptosystems using a new signed binary representation for integers R Katti Proceedings Euromicro Symposium on Digital System Design. Architectures …, 2002 | 22 | 2002 |
Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol K Mangipudi, N Malneedi, R Katti, H Fu IEEE Global Telecommunications Conference, 2004. GLOBECOM'04. 4, 2229-2234, 2004 | 17 | 2004 |