An efficient certificateless signature scheme M Gorantla, A Saxena Computational Intelligence and Security, 110-116, 2005 | 212 | 2005 |
Modeling key compromise impersonation attacks on group key exchange protocols MC Gorantla, C Boyd, JMG Nieto, M Manulis ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-24, 2008 | 88 | 2008 |
Attribute-based authenticated key exchange MC Gorantla, C Boyd, JM González Nieto Australasian Conference on Information Security and Privacy, 300-317, 2010 | 75 | 2010 |
A survey on id-based cryptographic primitives MC Gorantla, R Gangishetti, A Saxena Cryptology ePrint Archive, 2005 | 60 | 2005 |
ID-based one-pass authenticated key establishment C Gorantla, C Boyd, J Gonzalez Nieto Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008 | 44 | 2008 |
Generic one round group key exchange in the standard model MC Gorantla, C Boyd, JM González Nieto, M Manulis Information, Security and Cryptology–ICISC 2009: 12th International …, 2010 | 40 | 2010 |
An efficient secure key issuing protocol in ID-based cryptosystems R Gangishetti, MC Gorantla, ML Das, A Saxena, VP Gulati International Conference on Information Technology: Coding and Computing …, 2005 | 39 | 2005 |
Threshold key issuing in identity-based cryptosystems R Gangishetti, MC Gorantla, ML Das, A Saxena Computer Standards & Interfaces 29 (2), 260-264, 2007 | 37 | 2007 |
Verifiably encrypted signature scheme without random oracles MC Gorantla, A Saxena Distributed Computing and Internet Technology: Second International …, 2005 | 33 | 2005 |
On the connection between signcryption and one-pass key establishment MC Gorantla, C Boyd, JM González Nieto Cryptography and Coding: 11th IMA International Conference, Cirencester, UK …, 2007 | 28 | 2007 |
Identity based multisignatures R Gangishetti, MC Gorantla, ML Das, A Saxena Informatica 17 (2), 177-186, 2006 | 25 | 2006 |
Stronger security model of group key agreement J Zhao, D Gu, MC Gorantla Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 24 | 2011 |
System and method to anonymize data transmitted to a destination computing device P Kothari, M Gorantla US Patent 9,432,342, 2016 | 23 | 2016 |
System and method to anonymize data transmitted to a destination computing device P Kothari, D Dash, M Gorantla US Patent 9,413,526, 2016 | 16 | 2016 |
Universally composable contributory group key exchange MC Gorantla, C Boyd, JMG Nieto Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 16 | 2009 |
An effective certificateless signature scheme based on bilinear pairings M Gorantla, R Gangishetti, M Das, A Saxena Proc. 3rd Int. Workshop on Security in Information Systems, 31-39, 2005 | 11 | 2005 |
Methods for format preserving and data masking and devices thereof A Saxena, MC Gorantla, RS Veerubhotla, S Gupta, I Jain US Patent App. 13/938,380, 2014 | 9 | 2014 |
One round group key exchange with forward security in the standard model MC Gorantla, C Boyd, JMG Nieto Cryptology ePrint Archive, 2010 | 9 | 2010 |
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems R Gangishetti, MC Gorantla, ML Das, A Saxena arXiv preprint cs/0506015, 2005 | 9 | 2005 |
System and method to anonymize data transmitted to a destination computing device P Kothari, M Gorantla US Patent 9,613,227, 2017 | 8 | 2017 |