Josyula Ramachandra Rao
Josyula Ramachandra Rao
IBM Research
Verified email at - Homepage
Cited by
Cited by
Template attacks
S Chari, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
Towards sound approaches to counteract power-analysis attacks
S Chari, CS Jutla, JR Rao, P Rohatgi
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
The EM side—channel (s)
D Agrawal, B Archambeault, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
A survey of security issues in multicast communications
MJ Moyer, JR Rao, P Rohatgi
IEEE network 13 (6), 12-23, 1999
A cautionary note regarding evaluation of AES candidates on smart-cards
S Chari, C Jutla, JR Rao, P Rohatgi
Second Advanced Encryption Standard Candidate Conference, 133-147, 1999
Multi-channel attacks
D Agrawal, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
Can pseudonymity really guarantee privacy?
JR Rao, P Rohatgi
9th USENIX Security Symposium (USENIX Security 00), 2000
Partitioning attacks: or how to rapidly clone some GSM cards
JR Rao, P Rohatgi, H Scherzer, S Tinguely
Proceedings 2002 IEEE Symposium on Security and Privacy, 31-41, 2002
Adaptive cyber-security analytics
L Amini, M Christodorescu, MA Cohen, S Parthasarathy, J Rao, R Sailer, ...
US Patent 9,032,521, 2015
Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure
S Berger, Y Chen, X Hu, D Pendarakis, J Rao, R Sailer, DL Schales, ...
US Patent 9,832,217, 2017
Maintaining balanced key trees for secure multicast
MJ Moyer
IRTF Internet Draft, 1999
Detecting malicious user activity
SN Chari, TA Habeck, IM Molloy, Y Park, JR Rao, W Teiken
US Patent 10,599,837, 2020
Intrusion detection system
S Chari, PC Cheng, J Rao, P Rohatgi, M Steiner
US Patent App. 11/037,695, 2006
Security for the cloud infrastructure: Trusted virtual data center implementation
S Berger, R Cáceres, K Goldman, D Pendarakis, R Perez, JR Rao, E Rom, ...
IBM Journal of Research and Development 53 (4), 6: 1-6: 12, 2009
Systems, methods and computer programs providing impact mitigation of cyber-security failures
Y Drissi, IIRA Hamilton, CG Harrison, JL Kouloheris, PC Pattnaik, JR Rao, ...
US Patent 9,129,108, 2015
Templates as master keys
D Agrawal, JR Rao, P Rohatgi, K Schramm
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
Efficient implementation of Rijndael encryption with composite field arithmetic
A Rudra, PK Dubey, CS Jutla, V Kumar, JR Rao, P Rohatgi
Proc. CHES 2001 2162, 175-188, 2001
Empowering side-channel attacks
JR Rao, P Rohatgi
Cryptology EPrint Archive, 2001
System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values
SC Gates, Y Park, JR Rao, W Teiken
US Patent 8,560,722, 2013
Space-efficient, side-channel attack resistant table lookups
SN Chari, JR Rao, P Rohatgi, H Scherzer
US Patent 7,142,670, 2006
The system can't perform the operation now. Try again later.
Articles 1–20