Nachiketh Potlapally
Nachiketh Potlapally
Oracle (ex-AWS, ex-Intel)
Verified email at
Cited by
Cited by
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
NR Potlapally, S Ravi, A Raghunathan, NK Jha
IEEE Transactions on mobile computing 5 (2), 128-143, 2005
Analyzing the energy consumption of security protocols
NR Potlapally, S Ravi, A Raghunathan, NK Jha
Proceedings of the 2003 international symposium on Low power electronics and …, 2003
Optimizing public-key encryption for wireless clients
NR Potlapally, S Ravi, A Raghunathan, G Lakshminarayana
2002 IEEE International Conference on Communications. Conference Proceedings …, 2002
Securing wireless data: System architecture challenges
S Ravi, A Raghunathan, N Potlapally
Proceedings of the 15th international symposium on System Synthesis, 195-200, 2002
Hardware mechanisms for memory authentication: A survey of existing techniques and engines
R Elbaz, D Champagne, C Gebotys, RB Lee, N Potlapally, L Torres
Transactions on Computational Science IV, 1-22, 2009
Techniques for efficient security processing
A Raghunathan, S Ravi, N Potlapally, S Chakradhar, M Sankaradas
US Patent App. 10/259,569, 2003
System design methodologies for a wireless security processing platform
S Ravi, A Raghunathan, N Potlapally, M Sankaradass
Proceedings of the 39th annual Design Automation Conference, 777-782, 2002
Threat detection and mitigation through run-time introspection and instrumentation
H Sultan, J Schweitzer, DL BAILEY, GB Roth, NR Potlapally
US Patent 9,876,815, 2018
Power mode based macro-models for power estimation of electronic circuits
A Raghunathan, G Lakshminarayana, N Potlapally, MS Hsiao, ...
US Patent 6,735,744, 2004
Detecting unauthorized websites
BL Speegle, NR Potlapally
US Patent 8,943,588, 2015
Hardware-based mechanisms for updating computer systems
MD Marr, NR Potlapally
US Patent 9,176,752, 2015
Accurate power macro-modeling techniques for complex RTL circuits
NR Potlapally, A Raghunathan, G Lakshminarayana, MS Hsiao, ...
VLSI Design 2001. Fourteenth International Conference on VLSI Design, 235-241, 2001
Remote attestation of host devices
NR Potlapally, R Chawla, JR Volkman, MD Marr
US Patent 9,619,238, 2017
Allocating processor resources based on a service-level agreement
RG Patel, NR Potlapally, WJ Earl
US Patent 9,864,636, 2018
Hardware security in practice: Challenges and opportunities
N Potlapally
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 93-98, 2011
Allocating processor resources based on a task identifier
RG Patel, WJ Earl, NR Potlapally
US Patent 9,491,112, 2016
Adjustable vehicle top rack assembly
CK Wang
US Patent 6,622,898, 2003
Securing client-specified credentials at cryptographically attested resources
NR Potlapally, AJ Doane, EJ Brandwine, RE Fitzgerald
US Patent 10,389,709, 2019
Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
NR Potlapally, A Raghunathan, S Ravi, NK Jha, RB Lee
IEEE transactions on very large scale integration (VLSI) systems 15 (4), 465-470, 2007
Trusted computing host
NR Potlapally, MD Marr, EJ Brandwine, DL BAILEY
US Patent 9,147,086, 2015
The system can't perform the operation now. Try again later.
Articles 1–20