Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Josyula R. Rao is active.

Publication


Featured researches published by Josyula R. Rao.


international cryptology conference | 1999

Towards Sound Approaches to Counteract Power-Analysis Attacks

Suresh Chari; Charanjit S. Jutla; Josyula R. Rao; Pankaj Rohatgi

Side channel cryptanalysis techniques, such as the analysis of instantaneous power consumption, have been extremely effective in attacking implementations on simple hardware platforms. There are several proposed solutions to resist these attacks, most of which are ad-hoc and can easily be rendered ineffective. A scientific approach is to create a model for the physical characteristics of the device, and then design implementations provably secure in that model, i.e, they resist generic attacks with an a priori bound on the number of experiments. We propose an abstract model which approximates power consumption in most devices and in particular small single-chip devices. Using this, we propose a generic technique to create provably resistant implementations for devices where the power model has reasonable properties, and a source of randomness exists. We prove a lower bound on the number of experiments required to mount statistical attacks on devices whose physical characteristics satisfy reasonable properties.


principles of distributed computing | 1989

A predicate transformer approach to semantics of parallel programs

Charanjit S. Jutla; Edgar Knapp; Josyula R. Rao

We present an extensional semantics for parallel programs based on predicate transformers. We identify the meaning of a parallel program with three concepts: a set of initial conditions, a predicate transformer, called wlt, characterizing progress properties of the program, and a predicate transformer wsafe concerned with safety aspects. For a given program, these predicate transformers are defined in terms of fixpoints of recursive equations. The basis for our semantics are two completeness results: the first one states that the fixpoint characterization of wlt completely captures the notion of progress under weak fairness, with programs modelled as infinite directed computation trees. Similarly, the second completeness theorem relates wsafe and safety prop erties. In addition, we show that Chandy and Misra’s theory of UNITY has the same expressive power as our approach. We apply the results obtained to derive new, shorter and more direct proofs of a number of UNITY theorems and prove that for UNITY, wlt does not enjoy a number of junctivity properties such as or-continuity. Finally, we draw some connections to Temporal Logics of programs. *Supported in part by NSF-CCR-851-1354 tsupported in part by ONR contract N00014-87-K-0510 Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission.


principles of distributed computing | 1990

Reasoning about probabilistic algorithms

Josyula R. Rao

The field of probabilistic algorithms holds out promise for simple and efficient algorithms to problems which may not have a deterministic solution. For the gain in simplicity, efficiency and tractability one has to trade the notion of absolute correctness of algorithms for a probabilistic notion of correctness. In this paper, we address the problem of specifying and deriving properties of probabilistic parallel programs that either hold deterministically or with probability one. We present a proof methodology based on existing proof systems for probabilistic algorithms, the theory of the weak predicate transformer and the theory of UNITY. Although the proofs of probabilistic programs are tortuous at best, we show that such programs can be derived with the same rigor and elegance that we have seen in the derivation of sequential and parallel programs.


cryptographic hardware and embedded systems | 2002

Template Attacks

Suresh Chari; Josyula R. Rao; Pankaj Rohatgi


IACR Cryptology ePrint Archive | 2001

EMpowering Side-Channel Attacks.

Josyula R. Rao; Pankaj Rohatgi


network and distributed system security symposium | 2000

An IPSec-based Host Architecture for Secure Internet Multicast.

Ran Canetti; Pau-Chen Cheng; Frederique Giraud; Dimitrios Pendarakis; Josyula R. Rao; Pankaj Rohatgi; Debanjan Saha


Archive | 1988

Extensional Semantics of Parallel Programs

Charanjit S. Jutla; Edgar Knapp; Josyula R. Rao


cryptographic hardware and embedded systems | 2002

Pankaj Rohatgi: Template attacks

Suresh N. Chari; Josyula R. Rao


usenix security symposium | 2000

Can Pseudonymity Really Guarantee Privacy? 9th USENIX Security Symposium

Josyula R. Rao; Pankaj Rohatgi


Lecture Notes in Computer Science | 2005

Templates as master keys

Dakshi Agrawal; Josyula R. Rao; Pankaj Rohatgi; Kai Schramm

Collaboration


Dive into the Josyula R. Rao's collaboration.

Top Co-Authors

Avatar

Charanjit S. Jutla

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Edgar Knapp

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Charanjit S. Jutla

University of Texas at Austin

View shared research outputs
Researchain Logo
Decentralizing Knowledge