M Choudary Gorantla
M Choudary Gorantla
Finastra
Verified email at finastra.com
Title
Cited by
Cited by
Year
An efficient certificateless signature scheme
M Gorantla, A Saxena
Computational Intelligence and Security, 110-116, 2005
2092005
Attribute-based authenticated key exchange
MC Gorantla, C Boyd, JMG Nieto
Australasian Conference on Information Security and Privacy, 300-317, 2010
622010
Modeling key compromise impersonation attacks on group key exchange protocols
MC Gorantla, C Boyd, JMG Nieto
International Workshop on Public Key Cryptography, 105-123, 2009
582009
A Survey on ID-Based Cryptographic Primitives.
MC Gorantla, R Gangishetti, A Saxena
IACR Cryptol. ePrint Arch. 2005, 94, 2005
572005
ID-based one-pass authenticated key establishment
C Gorantla, C Boyd, J Gonzalez Nieto
Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008
442008
An efficient secure key issuing protocol in ID-based cryptosystems
R Gangishetti, MC Gorantla, ML Das, A Saxena, VP Gulati
International Conference on Information Technology: Coding and Computing …, 2005
382005
Threshold key issuing in identity-based cryptosystems
R Gangishetti, MC Gorantla, ML Das, A Saxena
Computer Standards & Interfaces 29 (2), 260-264, 2007
362007
Generic one round group key exchange in the standard model
MC Gorantla, C Boyd, JMG Nieto, M Manulis
International Conference on Information Security and Cryptology, 1-15, 2009
342009
Verifiably encrypted signature scheme without random oracles
MC Gorantla, A Saxena
International Conference on Distributed Computing and Internet Technology …, 2005
332005
On the connection between signcryption and one-pass key establishment
MC Gorantla, C Boyd, JMG Nieto
IMA International Conference on Cryptography and Coding, 277-301, 2007
262007
Stronger security model of group key agreement
J Zhao, D Gu, MC Gorantla
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
212011
Modeling key compromise impersonation attacks on group key exchange protocols
MC Gorantla, C Boyd, JMG Nieto, M Manulis
ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-24, 2008
202008
Identity based multisignatures
R Gangishetti, MC Gorantla, ML Das, A Saxena
Informatica 17 (2), 177-186, 2006
182006
System and method to anonymize data transmitted to a destination computing device
P Kothari, M Gorantla
US Patent 9,432,342, 2016
142016
Universally composable contributory group key exchange
MC Gorantla, C Boyd, JMG Nieto
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
142009
System and method to anonymize data transmitted to a destination computing device
P Kothari, D Dash, M Gorantla
US Patent 9,413,526, 2016
132016
An effective certificateless signature scheme based on bilinear pairings
M Gorantla, R Gangishetti, M Das, A Saxena
Proc. 3rd Int. Workshop on Security in Information Systems, 31-39, 2005
102005
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems
R Gangishetti, MC Gorantla, ML Das, A Saxena
arXiv preprint cs/0506015, 2005
92005
System and method to anonymize data transmitted to a destination computing device
P Kothari, M Gorantla
US Patent 9,613,227, 2017
72017
One Round Group Key Exchange with Forward Security in the Standard Model.
MC Gorantla, C Boyd, JMG Nieto
IACR Cryptol. ePrint Arch. 2010, 83, 2010
72010
The system can't perform the operation now. Try again later.
Articles 1–20