default search action
Praveen Gauravaram
Person information
- affiliation: Tata Consultancy Services, Brisbane, Australia
- affiliation: Queensland University of Technology, Brisbane, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Khondokar Fida Hasan, Leonie Simpson, Mir Ali Rezazadeh Baee, Chadni Islam, Ziaur Rahman, Warren Armstrong, Praveen Gauravaram, Matthew McKague:
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies. IEEE Access 12: 23427-23450 (2024) - [j17]Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, Yansong Gao, Nazatul Haque Sultan, Aufeef Chauhan, Mohammad Zavid Parvez, Michael Bewong, Rafiqul Islam, Zahidul Islam, Seyit Ahmet Çamtepe, Praveen Gauravaram, Dineshkumar Singh, Muhammad Ali Babar, Shihao Yan:
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems. Comput. Secur. 140: 103754 (2024) - [j16]Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao, Zung Le:
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. Cryptogr. 8(1): 5 (2024) - [j15]Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Jiaojiao Jiang, Sanjay K. Jha:
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis. IEEE Trans. Inf. Forensics Secur. 19: 9173-9187 (2024) - [c32]Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Divyans Mahansaria, Debi Prasad Pati, Praveen Gauravaram, Lei Pan, Keshav Sood:
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments. ARES 2024: 145:1-145:11 - [c31]Jongkil Jay Jeong, Lu-Xing Yang, Robin Doss, Praveen Gauravaram, Zoe Wang, Mohamed Abdelrazek, Ashish Nanda, Keerthivasan Viswanathan:
POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets. AsiaCCS 2024 - [c30]Yinhao Jiang, Michael Bewong, Arash Mahboubi, Sajal Halder, Md. Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Praveen Gauravaram, Jason Xue:
A Graph-Based Approach for Software Functionality Classification on the Web. WISE (5) 2024: 58-73 - 2023
- [j14]Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:
Software Vulnerability Detection Using Informed Code Graph Pruning. IEEE Access 11: 135626-135644 (2023) - [j13]Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. IEEE Trans. Inf. Forensics Secur. 18: 2160-2174 (2023) - [j12]Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports. IEEE Trans. Intell. Transp. Syst. 24(2): 2368-2381 (2023) - [i13]Khondokar Fida Hasan, Leonie Simpson, Mir Ali Rezazadeh Baee, Chadni Islam, Ziaur Rahman, Warren Armstrong, Praveen Gauravaram, Matthew McKague:
Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis. CoRR abs/2307.06520 (2023) - 2022
- [j11]Geeta Yadav, Praveen Gauravaram, Arun Kumar Jindal, Kolin Paul:
SmartPatch: A patch prioritization framework. Comput. Ind. 137: 103595 (2022) - [c29]Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Sanjay Jha:
BloomXNOR-Net: privacy-preserving machine learning in IoT. S3@MobiCom 2022: 1-3 - [c28]Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:
SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery. TrustCom 2022: 1522-1527 - [i12]Yinhao Jiang, Ba Dung Le, Tanveer A. Zia, Praveen Gauravaram:
Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures. CoRR abs/2202.04313 (2022) - [i11]Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. CoRR abs/2204.13885 (2022) - 2021
- [c27]Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. TrustCom 2021: 887-894 - [i10]Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. CoRR abs/2109.09259 (2021) - 2020
- [j10]Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports. IEEE Access 8: 209802-209834 (2020) - [c26]Mark Nerwich, Praveen Gauravaram, Hye-young Paik, Surya Nepal:
Vulnerability Database as a Service for IoT. ATIS 2020: 95-107 - [c25]Geeta Yadav, Praveen Gauravaram, Arun Kumar Jindal:
SmartPatch: a patch prioritization framework for SCADA chain in smart grid. MobiCom 2020: 83:1-83:3
2010 – 2019
- 2019
- [j9]Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gauravaram:
LSB: A Lightweight Scalable Blockchain for IoT security and anonymity. J. Parallel Distributed Comput. 134: 180-197 (2019) - 2018
- [c24]Harika Narumanchi, Dishant Goyal, Nitesh Emmadi, Praveen Gauravaram:
Search over Compute: Solving Multiplication-Intensive Computational Problems over FHE Data. SmartCloud 2018: 40-45 - [c23]Chris Drake, Praveen Gauravaram:
Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution. SSCC 2018: 183-210 - 2017
- [c22]Harika Narumanchi, Dishant Goyal, Nitesh Emmadi, Praveen Gauravaram:
Performance Analysis of Sorting of FHE Data: Integer-Wise Comparison vs Bit-Wise Comparison. AINA 2017: 902-908 - [c21]Praveen Gauravaram, Shoichi Hirose, Douglas Stebila:
Security Analysis of a Design Variant of Randomized Hashing. ATIS 2017: 14-22 - [c20]Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gauravaram:
Blockchain for IoT security and privacy: The case study of a smart home. PerCom Workshops 2017: 618-623 - [i9]Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gauravaram:
LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy. CoRR abs/1712.02969 (2017) - 2016
- [j8]Praveen Gauravaram, Nasour Bagheri, Lars R. Knudsen:
Building indifferentiable compression functions from the PGV compression functions. Des. Codes Cryptogr. 78(2): 547-581 (2016) - 2015
- [c19]Nitesh Emmadi, Praveen Gauravaram, Harika Narumanchi, Habeeb Syed:
Updates on Sorting of Fully Homomorphic Encrypted Data. ICCCRI 2015: 19-24 - [c18]Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram:
Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48. INDOCRYPT 2015: 153-179 - [i8]Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram:
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48. IACR Cryptol. ePrint Arch. 2015: 988 (2015) - [i7]Nitesh Emmadi, Praveen Gauravaram, Harika Narumanchi, Habeeb Syed:
Updates on Sorting of Fully Homomorphic Encrypted Data. IACR Cryptol. ePrint Arch. 2015: 995 (2015) - 2014
- [c17]Lakshmi Kuppusamy, Jothi Rangasamy, Praveen Gauravaram:
On secure outsourcing of cryptographic computations to cloud. SCC@ASIACCS 2014: 63-68 - [c16]Praveen Gauravaram, Harika Narumanchi, Nitesh Emmadi:
Analytical study of implementation issues of NTRU. ICACCI 2014: 700-707 - [c15]Javad Alizadeh, Hoda Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Martin M. Lauridsen, Somitra Kumar Sanadhya:
Cryptanalysis of SIMON Variants with Connections. RFIDSec 2014: 90-107 - [i6]Javad Alizadeh, Hoda Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Martin M. Lauridsen:
Improved Linear Cryptanalysis of Round Reduced SIMON. IACR Cryptol. ePrint Arch. 2014: 681 (2014) - 2013
- [c14]Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya:
Desynchronization and Traceability Attacks on RIPTA-DA Protocol. RFIDSec 2013: 57-68 - [c13]Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya:
On the Security of Two RFID Mutual Authentication Protocols. RFIDSec 2013: 86-99 - [i5]Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Somitra Kumar Sanadhya:
Linear Cryptanalysis of Round Reduced SIMON. IACR Cryptol. ePrint Arch. 2013: 663 (2013) - 2012
- [j7]Nasour Bagheri, Praveen Gauravaram, Lars R. Knudsen, Erik Zenner:
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. Int. J. Inf. Sec. 11(6): 419-434 (2012) - [j6]Praveen Gauravaram, Lars R. Knudsen:
Security Analysis of Randomize-Hash-then-Sign Digital Signatures. J. Cryptol. 25(4): 748-779 (2012) - 2011
- [c12]Praveen Gauravaram, Lars R. Knudsen, Nasour Bagheri, Lei Wei:
Improved Security Analysis of Fugue-256 (Poster). ACISP 2011: 428-432 - [r1]Praveen Gauravaram, Lars R. Knudsen:
Cryptographic Hash Functions. Encyclopedia of Information Assurance 2011 - 2010
- [j5]Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Babak Sadeghiyan:
EPC: A Provably Secure Permutation Based Compression Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(10): 1833-1836 (2010) - [j4]Praveen Gauravaram, John Kelsey, Lars R. Knudsen, Søren S. Thomsen:
On hash functions using checksums. Int. J. Inf. Sec. 9(2): 137-151 (2010) - [c11]Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. AFRICACRYPT 2010: 419-436 - [c10]Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen:
On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. CANS 2010: 96-105 - [c9]Ashish Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Masoumeh Safkhani, Majid Naderi:
Cryptanalysis of Tav-128 Hash Function. INDOCRYPT 2010: 118-130 - [p1]Praveen Gauravaram, Lars R. Knudsen:
Cryptographic Hash Functions. Handbook of Information and Communication Security 2010: 59-79
2000 – 2009
- 2009
- [c8]Praveen Gauravaram, Lars R. Knudsen:
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. EUROCRYPT 2009: 88-105 - [c7]Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. FSE 2009: 156-179 - [i4]Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Grøstl - a SHA-3 candidate. Symmetric Cryptography 2009 - 2008
- [j3]Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai:
An Update on the Analysis and Design of NMAC and HMAC Functions. Int. J. Netw. Secur. 7(1): 49-60 (2008) - [c6]Praveen Gauravaram, John Kelsey:
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. CT-RSA 2008: 36-51 - [c5]Praveen Gauravaram, Katsuyuki Okeya:
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. ICICS 2008: 111-127 - 2007
- [c4]Praveen Gauravaram, Katsuyuki Okeya:
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. INDOCRYPT 2007: 393-403 - [i3]Praveen Gauravaram, John Kelsey:
Cryptanalysis of a class of cryptographic hash functions. IACR Cryptol. ePrint Arch. 2007: 277 (2007) - 2006
- [j2]Praveen Gauravaram, Adrian McCullagh, Ed Dawson:
The legal and practical implications of recent attacks on 128-bit cryptographic hash functions. First Monday 11(1) (2006) - [c3]Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan:
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. ACISP 2006: 407-420 - 2005
- [i2]Praveen Gauravaram, William Millan, Juanma González Nieto, Ed Dawson:
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function. IACR Cryptol. ePrint Arch. 2005: 390 (2005) - [i1]Praveen Gauravaram, William Millan, Juanma González Nieto:
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1. IACR Cryptol. ePrint Arch. 2005: 391 (2005) - 2004
- [j1]William Millan, Praveen Gauravaram:
Cryptanalysis of the cellular authentication and voice encryption algorithm. IEICE Electron. Express 1(15): 453-459 (2004) - [c2]Praveen Gauravaram, William Millan:
Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). Cryptographic Algorithms and their Uses 2004: 1-13 - [c1]Praveen Gauravaram, William Millan, Lauren May:
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique. Cryptographic Algorithms and their Uses 2004: 28-39
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint