Rajendra Katti
Rajendra Katti
University of Washington Tacoma
Verified email at uw.edu
Cited by
Cited by
A secure identification and key agreement protocol with user anonymity (SIKA)
K Mangipudi, R Katti
Computers & Security 25 (6), 420-425, 2006
Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation
M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, WS Poon, ...
IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2017
Multiple-output low-power linear feedback shift register design
RS Katti, X Ruan, H Khattri
IEEE Transactions on Circuits and Systems I: Regular Papers 53 (7), 1487-1495, 2006
An efficient data-independent technique for compressing test vectors in systems-on-a-chip
X Ruan, R Katti
IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and …, 2006
A new residue arithmetic error correction scheme
RS Katti
IEEE transactions on computers 45 (1), 13-19, 1996
Efficient hardware implementation of a new pseudo-random bit sequence generator
RS Katti, SK Srinivasan
2009 IEEE International Symposium on Circuits and Systems, 1393-1396, 2009
On the security of randomized arithmetic codes against ciphertext-only attacks
RS Katti, SK Srinivasan, A Vosoughi
IEEE Transactions on Information Forensics and Security 6 (1), 19-27, 2010
Low complexity multiplication in a finite field using ring representation
R Katti, J Brennan
IEEE Transactions on Computers 52 (4), 418-427, 2003
Pseudorandom bit generation using coupled congruential generators
RS Katti, RG Kavasseri, V Sai
IEEE Transactions on Circuits and Systems II: Express Briefs 57 (3), 203-207, 2010
Achieving network on chip fault tolerance by adaptive remapping
C Ababei, R Katti
2009 IEEE International Symposium on Parallel & Distributed Processing, 1-4, 2009
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols
B David, R Dowsley, R Katti, ACA Nascimento
International Conference on Provable Security, 354-367, 2015
Left-to-right optimal signed-binary representation of a pair of integers
X Ruan, RS Katti
IEEE Transactions on Computers 54 (2), 124-131, 2005
Secure pseudo-random bit sequence generation using coupled linear congruential generators
RS Katti, RG Kavasseri
2008 IEEE International Symposium on Circuits and Systems, 2929-2932, 2008
A Hash-based Strong Password Authentication Protocol with User Anonymity.
KV Mangipudi, RS Katti
Int. J. Netw. Secur. 2 (3), 205-209, 2006
A modified Booth algorithm for high radix fixed-point multiplication
R Katti
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2 (4), 522-524, 1994
Authentication and Key Agreement Protocols Preserving Anonymity.
KV Mangipudi, RS Katti, H Fu
Int. J. Netw. Secur. 3 (3), 259-270, 2006
A variable length fast message authentication code for secure communication in smart grids
R Sule, RS Katti, RG Kavasseri
2012 IEEE Power and Energy Society General Meeting, 1-6, 2012
The alternating greedy expansion and applications to computing digit expansions from left-to-right in cryptography
C Heuberger, R Katti, H Prodinger, X Ruan
Theoretical computer science 341 (1-3), 55-72, 2005
Speeding up elliptic cryptosystems using a new signed binary representation for integers
R Katti
Proceedings Euromicro Symposium on Digital System Design. Architectures …, 2002
Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol
K Mangipudi, N Malneedi, R Katti, H Fu
IEEE Global Telecommunications Conference, 2004. GLOBECOM'04. 4, 2229-2234, 2004
The system can't perform the operation now. Try again later.
Articles 1–20