default search action
Rajendra S. Katti
Person information
- affiliation: University of Washington Tacoma, USA
- affiliation (former): North Dakota State University, Fargo, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j25]Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Wing-Sea Poon, Stacey Truex:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation. IEEE Trans. Dependable Secur. Comput. 16(2): 217-230 (2019) - 2016
- [i2]Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Stacey C. Newman, Wing-Sea Poon:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation. IACR Cryptol. ePrint Arch. 2016: 736 (2016) - 2015
- [c34]Bernardo Machado David, Rafael Dowsley, Raj S. Katti, Anderson C. A. Nascimento:
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols. ProvSec 2015: 354-367 - 2014
- [c33]Amruta Khot, Abdeltawab M. Hendawi, Anderson C. A. Nascimento, Raj S. Katti, Ankur Teredesai, Mohamed H. Ali:
Road network compression techniques in spatiotemporal embedded systems: a survey. IWGS 2014: 33-36 - 2013
- [c32]Rajendra S. Katti, Rucha Sule:
MISRs for Fast Authentication of Long Messages. DSD 2013: 653-657 - [c31]Raj S. Katti, Rucha Sule, Rajesh G. Kavasseri:
Multicast authentication in the smart grid with one-time signatures from sigma-protocols. ICCPS 2013: 239 - 2012
- [j24]Rajendra S. Katti, Aida Vosoughi:
On the Security of Key-Based Interval Splitting Arithmetic Coding With Respect to Message Indistinguishability. IEEE Trans. Inf. Forensics Secur. 7(3): 895-903 (2012) - [c30]Raj S. Katti, Sarjan Shrestha:
Novel asynchronous registers for sequential circuits with quantum-dot cellular automata. ISCAS 2012: 1351-1354 - [c29]Akshaya Mohan, Rajendra S. Katti:
Provable Data Possession Using Sigma-protocols. TrustCom 2012: 565-572 - [i1]Rajendra S. Katti, Cristinel Ababei:
Secure Comparison Without Explicit XOR. CoRR abs/1204.2854 (2012) - 2011
- [j23]Raj S. Katti, Sudarshan K. Srinivasan, Aida Vosoughi:
On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks. IEEE Trans. Inf. Forensics Secur. 6(1): 19-27 (2011) - [c28]Sudarshan K. Srinivasan, Raj S. Katti:
Desynchronization: design for verification. FMCAD 2011: 215-222 - 2010
- [j22]Rajendra S. Katti, Rajesh G. Kavasseri:
Nonce Generation For The Digital Signature Standard. Int. J. Netw. Secur. 11(1): 23-32 (2010) - [j21]Raj S. Katti, Rajesh G. Kavasseri, Vyasa Sai:
Pseudorandom Bit Generation Using Coupled Congruential Generators. IEEE Trans. Circuits Syst. II Express Briefs 57-II(3): 203-207 (2010) - [c27]Aida Vosoughi, Rajendra S. Katti:
Fast Message Authentication Code for Multiple Messages with Provable Security. GLOBECOM 2010: 1-5
2000 – 2009
- 2009
- [j20]Sudarshan K. Srinivasan, Koushik Sarker, Rajendra S. Katti:
Verification of Synchronous Elastic Processors. IEEE Embed. Syst. Lett. 1(1): 14-18 (2009) - [j19]Sudarshan K. Srinivasan, Koushik Sarker, Rajendra S. Katti:
Token-Aware Completion Functions for Elastic Processor Verification. J. Electr. Comput. Eng. 2009: 480740:1-480740:5 (2009) - [j18]Joseph P. Brennan, Rajendra S. Katti:
Montgomery multiplication over rings. J. Frankl. Inst. 346(1): 10-16 (2009) - [c26]Cristinel Ababei, Rajendra S. Katti:
Achieving network on chip fault tolerance by adaptive remapping. IPDPS 2009: 1-4 - [c25]John Vreugdenhil, Kane Iverson, Rajendra S. Katti:
Image Encyption using Dynamic Shuffling and XORing Processes. ISCAS 2009: 734-737 - [c24]Raj S. Katti, Sudarshan K. Srinivasan:
Efficient Hardware Implementation of a New Pseudo-random Bit Sequence Generator. ISCAS 2009: 1393-1396 - [c23]Sudarshan K. Srinivasan, Raj S. Katti:
Verification of Desynchronized Circuits. ISCAS 2009: 1509-1512 - [c22]Rajendra S. Katti, Ahana Ghosh:
Security using Shannon-Fano-Elias Codes. ISCAS 2009: 2689-2692 - 2008
- [c21]Rajendra S. Katti, Rajesh G. Kavasseri:
Secure pseudo-random bit sequence generation using coupled linear congruential generators. ISCAS 2008: 2929-2932 - 2007
- [j17]Xiaoyu Ruan, Rajendra S. Katti:
Data-Independent Pattern Run-Length Compression for Testing Embedded Cores in SoCs. IEEE Trans. Computers 56(4): 545-556 (2007) - 2006
- [j16]Kumar V. Mangipudi, Rajendra S. Katti:
A Secure Identification and Key agreement protocol with user Anonymity (SIKA). Comput. Secur. 25(6): 420-425 (2006) - [j15]Kumar V. Mangipudi, Rajendra S. Katti:
A Hash-based Strong Password Authentication Protocol with User Anonymity. Int. J. Netw. Secur. 2(3): 205-209 (2006) - [j14]Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu:
Authentication and Key Agreement Protocols Preserving Anonymity. Int. J. Netw. Secur. 3(3): 259-270 (2006) - [j13]Xiaoyu Ruan, Rajendra S. Katti:
A New Source Coding Scheme with Small Expected Length and Its Application to Simple Data Encryption. IEEE Trans. Computers 55(10): 1300-1305 (2006) - [j12]Rajendra S. Katti, Xiaoyu Ruan, Hareesh Khattri:
Multiple-output low-power linear feedback shift register design. IEEE Trans. Circuits Syst. I Regul. Pap. 53-I(7): 1487-1495 (2006) - [c20]Xiaoyu Ruan, Rajendra S. Katti, David Hinkemeyer:
Algorithm and implementation of signed-binary recoding with asymmetric digit sets for elliptic curve cryptosystems. ISCAS 2006 - [c19]Xiaoyu Ruan, Rajendra S. Katti:
Using Improved Shannon-Fano-Elias Codes for Data Encryption. ISIT 2006: 1249-1252 - [c18]Xiaoyu Ruan, Rajendra S. Katti:
An Efficient Data-Independent Technique for Compressing Test Vectors in Systems-on-a-Chip. ISVLSI 2006: 153-158 - 2005
- [j11]Xiaoyu Ruan, Rajendra S. Katti:
Left-to-Right Optimal Signed-Binary Representation of a Pair of Integers. IEEE Trans. Computers 54(2): 124-131 (2005) - [j10]Clemens Heuberger, Rajendra S. Katti, Helmut Prodinger, Xiaoyu Ruan:
The alternating greedy expansion and applications to computing digit expansions from left-to-right in cryptography. Theor. Comput. Sci. 341(1-3): 55-72 (2005) - [c17]Deepak Rautela, Rajendra S. Katti:
Efficient utilization of heterogeneous routing resources for FPGAs (abstract only). FPGA 2005: 264 - [c16]Raj S. Katti, Xiaoyu Ruan:
S-Code: new MDS array codes with optimal encoding. ICASSP (3) 2005: 1105-1108 - [c15]Rajendra S. Katti, Xiaoyu Ruan:
S-code: new distance-3 MDS array codes. ISCAS (1) 2005: 348-351 - [c14]Xiaoyu Ruan, Rajendra S. Katti:
On the signed-binary window method [cryptosystem applications]. ISCAS (5) 2005: 4501-4504 - [c13]Rajendra S. Katti, Xiaoyu Ruan:
Cryptanalysis of Shannon-Fano-Elias codes. ISIT 2005: 1231-1235 - [c12]Deepak Rautela, Rajendra S. Katti:
Design and Implementation of FPGA Router for Efficient Utilization of Heterogeneous Routing Resources. ISVLSI 2005: 232-237 - [c11]Hareesh Khattri, Rajendra S. Katti:
Implementation and performance analysis of IEEE 802.11i standard using the IXP425 network processor. PE-WASUN 2005: 275-276 - 2004
- [c10]Kumar V. Mangipudi, Nagaraja Malneedi, Rajendra S. Katti, Huirong Fu:
Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol. GLOBECOM 2004: 2229-2234 - [c9]Abdullah Mamun, Rajendra S. Katti:
A new parallel architecture for low power linear feedback shift registers. ISCAS (2) 2004: 333-336 - [c8]Rajendra S. Katti, Xiaoyu Ruan:
Left-to-right binary signed-digit recoding for elliptic curve cryptography. ISCAS (2) 2004: 365-368 - [c7]Xiaoyu Ruan, Rajendra S. Katti:
Low-weight left-to-right binary signed-digit representation of N integers. ISIT 2004: 547 - 2003
- [j9]Rajendra S. Katti, Joseph Brennan:
Low Complexity Multiplication in a Finite Field Using Ring Representation. IEEE Trans. Computers 52(4): 418-427 (2003) - 2002
- [c6]Rajendra S. Katti:
Speeding up Elliptic Cryptosystems Using a New Signed Binary Representation for Integers. DSD 2002: 380-384 - [c5]Raj S. Katti, V. V. Bapeswara Rao:
An array based technique for routing messages in distributed double loop networks. ISCAS (5) 2002: 9-12
1990 – 1999
- 1998
- [j8]Rajendra S. Katti, Mark L. Manwaring:
Performance based design of high-level language-directed computer architectures. IEEE Trans. Syst. Man Cybern. Part B 28(2): 219-227 (1998) - 1997
- [j7]Rajendra S. Katti:
Nonprime Memory Systems and Error Correction in Address Translation. IEEE Trans. Computers 46(1): 75-79 (1997) - [c4]Rajendra S. Katti, Longfei Hu:
A Parallel Algorithm to Solve Continuous Time Markov Processes that Model the Performance of Parallel Computers. PP 1997 - [c3]Rajendra S. Katti, Huaan Zhang:
An Iterative Algorithm Using Probabilistic Automata for Predicting the Performance of Parallel Computers. PP 1997 - 1996
- [j6]Rajendra S. Katti:
A New Residue Arithmetic Error Correction Scheme. IEEE Trans. Computers 45(1): 13-19 (1996) - [j5]Rajendra S. Katti:
A Note on SEC/AUED Codes. IEEE Trans. Computers 45(2): 244-246 (1996) - [j4]Rajendra S. Katti, Mario Blaum:
An Improvement on Constructions of t-EC/AUED Codes. IEEE Trans. Computers 45(5): 607-608 (1996) - 1995
- [j3]Rajendra S. Katti:
Comments on "A Systematic (16, 8) Code for Correcting Double Errors and Detecting Triple-Adjacent Errors". IEEE Trans. Computers 44(12): 1472-1473 (1995) - [c2]J. L. Rawson, Rajendra S. Katti:
The Iterative Solution of Lyapunov Equations. PP 1995: 287-288 - 1994
- [j2]Rajendra S. Katti:
Comments on "Decomposition of Complex Multipliers Using Polynomial Encoding". IEEE Trans. Computers 43(3): 381-383 (1994) - [j1]Raj S. Katti:
A modified Booth algorithm for high radix fixed-point multiplication. IEEE Trans. Very Large Scale Integr. Syst. 2(4): 522-524 (1994)
1980 – 1989
- 1989
- [c1]Raj S. Katti, L. Manwaring:
Information structures in language directed architectures. MICRO 1989: 122-126
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-04 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint