Cryptographers' World
 

Charanjit S. Jutla


Author's Web Page Link

13 papers in database with 785 citations StarStar

H-number: 8

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Charanjit S. Jutla,  Encryption Modes with Almost Free Message Integrity, Journal of Cryptology, Volume 21(4), pp. 547 - 578, Springer, 2008.

[Cited 154 times Red StarRed Star]

2. Don Coppersmith,  Jean-Sébastien Coron,  François Grieu,  Shai Halevi,  Charanjit S. Jutla,  David Naccache,  Julien P. Stern,  Cryptanalysis of ISO/IEC 9796-1, Journal of Cryptology, Volume 21(1), pp. 27 - 51, Springer, 2008.

[Cited 3 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Charanjit S. Jutla,  PRF Domain Extension Using DAGs, pp. 561 - 580, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 5 times ]

2. Charanjit S. Jutla,  Anindya C. Patthak,  Provably Good Codes for Hash Function Design, pp. 376 - 393, SAC 2006.

[Electronic Edition][Cited 8 times ]

3. W. Eric Hall,  Charanjit S. Jutla,  Parallelizable Authentication Trees, pp. 95 - 109, SAC 2005.

[Electronic Edition][Cited 12 times ]

4. Charanjit S. Jutla,  Lower Bound on Linear Authenticated Encryption, pp. 348 - 360, SAC 2003.

[Electronic Edition][Cited 2 times ]

5. Don Coppersmith,  Shai Halevi,  Charanjit S. Jutla,  Cryptanalysis of Stream Ciphers with Linear Masking, pp. 515 - 532, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 91 times Red Star]

6. Shai Halevi,  Don Coppersmith,  Charanjit S. Jutla,  Scream: A Software-Efficient Stream Cipher, pp. 195 - 209, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

7. Atri Rudra,  Pradeep K. Dubey,  Charanjit S. Jutla,  Vijay Kumar,  Josyula R. Rao,  Pankaj Rohatgi,  Efficient Rijndael Encryption Implementation with Composite Field Arithmetic, pp. 171 - 184, CHES 2001.

[Electronic Edition][Cited 112 times Red StarRed Star]

8. Charanjit S. Jutla,  Encryption Modes with Almost Free Message Integrity, pp. 529 - 544, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 172 times Red StarRed Star]

9. Suresh Chari,  Charanjit S. Jutla,  Josyula R. Rao,  Pankaj Rohatgi,  Towards Sound Approaches to Counteract Power-Analysis Attacks, pp. 398 - 412, CRYPTO 1999.

[Electronic Edition][Cited 294 times Red StarRed StarRed Star]

10. Charanjit S. Jutla,  Generalized Birthday Attacks on Unbalanced Feistel Networks, pp. 186 - 199, CRYPTO 1998.

[Electronic Edition][Cited 15 times ]

11. Charanjit S. Jutla,  On Finding Small Solutions of Modular Multivariate Polynomial Equations, pp. 158 - 170, EUROCRYPT 1998.

[Electronic Edition][Cited 32 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...