​
Login / Signup
Megha Agrawal
ORCID
Publication Activity (10 Years)
Years Active: 2012-2023
Publications (10 Years): 10
Top Topics
Hash Functions
Ciphertext
Comparative Study
Invited Paper
Top Venues
ICST
INDOCRYPT (2)
IACR Cryptol. ePrint Arch.
Int. J. Appl. Cryptogr.
</>
Publications
</>
Rathin K. Joshi
,
Varun Kumar M.
,
Megha Agrawal
,
Avinash Rao
,
Latika Mohan
,
M. Jayachandra
,
Hardik J. Pandya
Spatiotemporal analysis of interictal EEG for automated seizure detection and classification.
Biomed. Signal Process. Control.
79 (Part) (2023)
Anila Puthoor
,
Megha Agrawal
,
Varshini K. M.
,
Koushik K. Rao
Enhancement of Glass micromachining using selective copper electroplating.
ICST
(2023)
Rahul Achar R.
,
Megha Agrawal
,
Anila Puthoor
Enhancing Fusion Bonding of Fused Silica through Surface Treatments: A Comparative Study.
ICST
(2023)
Megha Agrawal
,
Kumar Duraisamy
,
Karthikeyan Sabari Ganesan
,
Shivam Gupta
,
Suyash Kandele
,
Sai Sandilya Konduru
,
Harika Chowdary Maddipati
,
K. Raghavendra
,
Rajeev Anand Sahu
,
Vishal Saraswat
Secure Boot in Post-Quantum Era - (Invited Paper).
INDOCRYPT (2)
(2023)
Megha Agrawal
,
Kumar Duraisamy
,
Karthikeyan Sabari Ganesan
,
Shivam Gupta
,
Suyash Kandele
,
Sai Sandilya Konduru
,
Harika Chowdary Maddipati
,
K. Raghavendra
,
Rajeev Anand Sahu
,
Vishal Saraswat
Patent Landscape in the field of Hash-Based Post-Quantum Signatures - (Invited Paper).
INDOCRYPT (2)
(2023)
Megha Agrawal
,
Donghoon Chang
,
Jinkeon Kang
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices.
Cryptogr.
2 (4) (2018)
Megha Agrawal
,
Tianxiang Huang
,
Jianying Zhou
,
Donghoon Chang
CAN-FD-Sec: Improving Security of CAN-FD Protocol.
ISSA/CSITS@ESORICS
(2018)
Megha Agrawal
,
Tarun Kumar Bansal
,
Donghoon Chang
,
Amit Kumar Chauhan
,
Seokhie Hong
,
Jinkeon Kang
,
Somitra Kumar Sanadhya
RCB: leakage-resilient authenticated encryption via re-keying.
J. Supercomput.
74 (9) (2018)
Megha Agrawal
,
Donghoon Chang
,
Somitra Kumar Sanadhya
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices.
Int. J. Appl. Cryptogr.
3 (3) (2017)
H. Andrew Schwartz
,
Maarten Sap
,
Margaret L. Kern
,
Johannes C. Eichstaedt
,
Adam Kapelner
,
Megha Agrawal
,
Eduardo Blanco
,
Lukasz Dziurzynski
,
Gregory J. Park
,
David Stillwell
,
Michal Kosinski
,
Martin E. P. Seligman
,
Lyle H. Ungar
Predicting Individual Well-Being Through the Language of Social Media.
PSB
(2016)
Megha Agrawal
,
Donghoon Chang
,
Mohona Ghosh
,
Somitra Kumar Sanadhya
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique.
IACR Cryptol. ePrint Arch.
2015 (2015)
Megha Agrawal
,
Donghoon Chang
,
Somitra Kumar Sanadhya
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices.
IACR Cryptol. ePrint Arch.
2015 (2015)
Megha Agrawal
,
Donghoon Chang
,
Somitra Sanadhya
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices.
ACISP
(2015)
Megha Agrawal
,
Donghoon Chang
,
Mohona Ghosh
,
Somitra Kumar Sanadhya
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique.
Inscrypt
(2014)
H. Andrew Schwartz
,
Johannes C. Eichstaedt
,
Margaret L. Kern
,
Lukasz Dziurzynski
,
Richard E. Lucas
,
Megha Agrawal
,
Gregory J. Park
,
Shrinidhi K. Lakshmikanth
,
Sneha Jha
,
Martin E. P. Seligman
,
Lyle H. Ungar
Characterizing Geographic Variation in Well-Being Using Tweets.
ICWSM
(2013)
Megha Agrawal
,
Mugdha Gadgil
Meta analysis of gene expression changes upon treatment of A549 cells with anti-cancer drugs to identify universal responses.
Comput. Biol. Medicine
42 (11) (2012)