default search action
Debdeep Mukhopadhyay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j113]Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay:
Compact Key Function Secret Sharing with Non-linear Decoder. IACR Commun. Cryptol. 1(2): 8 (2024) - [j112]Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay:
Stealing the Invisible: Unveiling Pre-Trained CNN Models Through Adversarial Examples and Timing Side-Channels. IEEE J. Emerg. Sel. Topics Circuits Syst. 14(4): 634-646 (2024) - [j111]Shubhajit Datta, Manaar Alam, Arijit Mondal, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti:
Decision Guided Robust DL Classification of Adversarial Images Combining Weaker Defenses. IEEE J. Emerg. Sel. Topics Circuits Syst. 14(4): 758-772 (2024) - [j110]Rajat Sadhukhan, Sayandeep Saha, Sudipta Paria, Swarup Bhunia, Debdeep Mukhopadhyay:
VALIANT: An EDA Flow for Side-Channel Leakage Evaluation and Tailored Protection. IEEE Trans. Computers 73(2): 436-450 (2024) - [j109]Kuheli Pratihar, Soumi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Enhancing SRAM-Based PUF Reliability Through Machine Learning-Aided Calibration Techniques. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(11): 3491-3502 (2024) - [j108]Kuheli Pratihar, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Latent RAGE: Randomness Assessment Using Generative Entropy Models. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(11): 3503-3514 (2024) - [j107]Suvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay:
EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 336-374 (2024) - [j106]Nimish Mishra, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair, Debdeep Mukhopadhyay:
CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 501-526 (2024) - [j105]Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede:
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 844-869 (2024) - [j104]Gang Qu, Debdeep Mukhopadhyay, Nele Mentens, Weiqiang Liu:
Special Section on Emerging Topics in Hardware Computing Systems Security. IEEE Trans. Emerg. Top. Comput. 12(2): 482 (2024) - [j103]Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay:
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 19: 514-528 (2024) - [j102]Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay:
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs. IEEE Trans. Inf. Forensics Secur. 19: 1126-1141 (2024) - [c204]Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay:
Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum World. ACNS (2) 2024: 47-78 - [c203]Soumyadyuti Ghosh, Manaar Alam, Soumyajit Dey, Debdeep Mukhopadhyay:
"Hello? Is There Anybody in There?" Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure. ACNS (3) 2024: 163-189 - [c202]Navajit Singh Baban, Jiarui Zhou, Sarani Bhattacharya, Urbi Chatterjee, Sukanta Bhattacharjee, Sanjairaj Vijayavenkataraman, Yong-Ak Song, Debdeep Mukhopadhyay, Krishnendu Chakrabarty, Ramesh Karri:
Physically Unclonable Fingerprints for Authentication. ACNS Workshops (2) 2024: 235-239 - [c201]Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy. AsiaCCS 2024 - [c200]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
On the Security of Privacy-Preserving Machine Learning Against Model Stealing Attacks. CANS (2) 2024: 96-117 - [c199]Tishya Sarma Sarkar, Shuvodip Maitra, Abhishek Chakraborty, Akashdeep Saha, Joydeep Chowdhury, Debdeep Mukhopadhyay:
X-Factor: Deep Learning-based PCB Counterfeit Detection using X-Ray CT Techniques for Hardware Assurance. CF (Companion) 2024 - [c198]Nimish Mishra, Rahul Arvind Mool, Anirban Chakraborty, Debdeep Mukhopadhyay:
Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks. DAC 2024: 282:1-282:6 - [c197]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
"Ask and Thou Shall Receive": Reaction-Based Full Key Recovery Attacks on FHE. ESORICS (4) 2024: 457-477 - [c196]Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. EuroS&P 2024: 841-859 - [c195]Kuheli Pratihar, Soumi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Breaching the Gap: Modelling SRAM-PUFs via Side-Channel Signatures. ACM Great Lakes Symposium on VLSI 2024: 574-578 - [c194]Upasana Mandal, Sarani Bhattacharya, Debdeep Mukhopadhyay:
Cache Wars: A Comparative Study of UMWAIT, UMONITOR, and Prime-Probe Attacks. HOST 2024: 86-89 - [c193]Nimish Mishra, Tridib Lochan Dutta, Shubhi Shukla, Anirban Chakraborty, Debdeep Mukhopadhyay:
Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors. HOST 2024: 378-382 - [c192]Nimish Mishra, Anirban Chakraborty, Debdeep Mukhopadhyay:
Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZone. NDSS 2024 - [c191]Upasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya, Debdeep Mukhopadhyay:
"There's Always Another Counter": Detecting Micro-Architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting. SPACE 2024: 201-220 - [c190]Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay:
Shesha : Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors. USENIX Security Symposium 2024 - [i131]Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede:
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. CoRR abs/2401.14098 (2024) - [i130]Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay:
Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels. CoRR abs/2402.11953 (2024) - [i129]Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay:
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors. CoRR abs/2406.06034 (2024) - [i128]Prithwish Basu Roy, Johann Knechtel, Akashdeep Saha, Saideep Sreekumar, Likhitha Mankali, Mohammed Thari Nabeel, Debdeep Mukhopadhyay, Ramesh Karri, Ozgur Sinanoglu:
NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack. IACR Cryptol. ePrint Arch. 2024: 309 (2024) - [i127]Wolfgang Stefani, Fynn Kappelhoff, Martin Gruber, Yu-Neng Wang, Sara Achour, Debdeep Mukhopadhyay, Ulrich Rührmair:
Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips. IACR Cryptol. ePrint Arch. 2024: 378 (2024) - [i126]Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, Shivam Bhasin:
Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives. IACR Cryptol. ePrint Arch. 2024: 484 (2024) - [i125]Nimish Mishra, Debdeep Mukhopadhyay:
Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2024: 551 (2024) - [i124]Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2024: 573 (2024) - [i123]Animesh Singh, Sikhar Patranabis, Debdeep Mukhopadhyay:
Threshold OPRF from Threshold Additive HE. IACR Cryptol. ePrint Arch. 2024: 1032 (2024) - [i122]Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay:
Compact Key Function Secret Sharing with Non-linear Decoder. IACR Cryptol. ePrint Arch. 2024: 1062 (2024) - [i121]Suvadeep Hajra, Debdeep Mukhopadhyay:
HierNet: A Hierarchical Deep Learning Model for SCA on Long Traces. IACR Cryptol. ePrint Arch. 2024: 1437 (2024) - [i120]Amit Jana, Smita Das, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Related-Key Cryptanalysis of FUTURE. IACR Cryptol. ePrint Arch. 2024: 1614 (2024) - [i119]Upasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya, Debdeep Mukhopadhyay:
"There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting. IACR Cryptol. ePrint Arch. 2024: 1856 (2024) - [i118]Upasana Mandal, Shubhi Shukla, Ayushi Rastogi, Sarani Bhattacharya, Debdeep Mukhopadhyay:
µLAM: A LLM-Powered Assistant for Real-Time Micro-architectural Attack Detection and Mitigation. IACR Cryptol. ePrint Arch. 2024: 1978 (2024) - 2023
- [j101]Chip-Hong Chang, Stefan Katzenbeisser, Debdeep Mukhopadhyay, Ulrich Rührmair:
The ASHES 2021 special issue at JCEN. J. Cryptogr. Eng. 13(4): 389-390 (2023) - [j100]Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta:
Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning. J. Cryptol. 36(3): 19 (2023) - [j99]Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay:
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries. Proc. Priv. Enhancing Technol. 2023(1): 115-139 (2023) - [j98]Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Birds of the Same Feather Flock Together: A Dual-Mode Circuit Candidate for Strong PUF-TRNG Functionalities. IEEE Trans. Computers 72(6): 1636-1651 (2023) - [j97]Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
CAMiSE: Content Addressable Memory-Integrated Searchable Encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 70(8): 3254-3267 (2023) - [j96]Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Pabitra Mitra, Debdeep Mukhopadhyay:
"Whispering MLaaS" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 587-613 (2023) - [j95]Ipsita Koley, Soumyajit Dey, Debdeep Mukhopadhyay, Sachin Kumar Singh, Lavanya Lokesh, Shantaram Vishwanath Ghotgalkar:
CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software. ACM Trans. Cyber Phys. Syst. 7(1): 7:1-7:26 (2023) - [j94]Anupam Mondal, Shreya Gangopadhyay, Durba Chatterjee, Harishma Boyapally, Debdeep Mukhopadhyay:
PReFeR : Physically Related Function based Remote Attestation Protocol. ACM Trans. Embed. Comput. Syst. 22(5s): 109:1-109:23 (2023) - [j93]Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay:
Commitments via Physically Related Functions. IEEE Trans. Inf. Forensics Secur. 18: 1497-1508 (2023) - [c189]Harishma Boyapally, Chandan Kumar Chaudhary, Debdeep Mukhopadhyay:
Invited Paper: Oblivious Transfer Protocol without Physical Transfer of Hardware Root-of-Trust. ApPLIED@PODC 2023: 6:1-6:9 - [c188]Madhav Nair, Rajat Sadhukhan, Hammond Pearce, Debdeep Mukhopadhyay, Ramesh Karri:
Netlist Whisperer: AI and NLP Fight Circuit Leakage! ASHES@CCS 2023: 83-92 - [c187]Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay:
How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs. CSCML 2023: 320-336 - [c186]Hao Guo, Sayandeep Saha, Vasudev Gohil, Satwik Patnaik, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran:
ExploreFault: Identifying Exploitable Fault Models in Block Ciphers with Reinforcement Learning. DAC 2023: 1-6 - [c185]Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay:
Conjunctive Searchable Symmetric Encryption from Hard Lattices. EuroS&P 2023: 958-978 - [c184]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
Are Randomized Caches Truly Random? Formal Analysis of Randomized-Partitioned Caches. HPCA 2023: 233-246 - [i117]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
A short note on the paper 'Are Randomized Caches Really Random?'. CoRR abs/2304.00955 (2023) - [i116]Anirban Chakraborty, Nimish Mishra, Sayandeep Saha, Sarani Bhattacharya, Debdeep Mukhopadhyay:
On the Amplification of Cache Occupancy Attacks in Randomized Cache Architectures. CoRR abs/2310.05172 (2023) - [i115]Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay:
Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation. IACR Cryptol. ePrint Arch. 2023: 135 (2023) - [i114]Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay:
Generating Secure Hardware using ChatGPT Resistant to CWEs. IACR Cryptol. ePrint Arch. 2023: 212 (2023) - [i113]Nimish Mishra, Kuheli Pratihar, Anirban Chakraborty, Debdeep Mukhopadhyay:
Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization. IACR Cryptol. ePrint Arch. 2023: 287 (2023) - [i112]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
vr2FHE- Securing FHE from Reaction-based Key Recovery Attacks. IACR Cryptol. ePrint Arch. 2023: 561 (2023) - [i111]Debadrita Talapatra, Nimish Mishra, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
SEC: Fast Private Boolean Circuit Evaluation from Encrypted Look-ups. IACR Cryptol. ePrint Arch. 2023: 628 (2023) - [i110]Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay:
Conjunctive Searchable Symmetric Encryption from Hard Lattices. IACR Cryptol. ePrint Arch. 2023: 872 (2023) - [i109]Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. IACR Cryptol. ePrint Arch. 2023: 1310 (2023) - [i108]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples. IACR Cryptol. ePrint Arch. 2023: 1665 (2023) - [i107]Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede:
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. IACR Cryptol. ePrint Arch. 2023: 1674 (2023) - [i106]Nimish Mishra, Rahul Arvind Mool, Anirban Chakraborty, Debdeep Mukhopadhyay:
Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks. IACR Cryptol. ePrint Arch. 2023: 1679 (2023) - [i105]Suvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay:
EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1860 (2023) - 2022
- [j92]Debdeep Mukhopadhyay:
Cybersecurity in India. Commun. ACM 65(11): 98-102 (2022) - [j91]Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu:
NN-Lock: A Lightweight Authorization to Prevent IP Threats of Deep Learning Models. ACM J. Emerg. Technol. Comput. Syst. 18(3): 51:1-51:19 (2022) - [j90]Swapnil Gade, Urbi Chatterjee, Debdeep Mukhopadhyay:
PAKAMAC: A PUF-based Keyless Automotive Entry System with Mutual Authentication. J. Hardw. Syst. Secur. 6(3-4): 67-78 (2022) - [j89]Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay:
FlexiPair: An Automated Programmable Framework for Pairing Cryptosystems. IEEE Trans. Computers 71(3): 506-519 (2022) - [j88]Soumik Sinha, Sayandeep Saha, Manaar Alam, Varun Agarwal, Ayantika Chatterjee, Anoop Mishra, Deepak Khazanchi, Debdeep Mukhopadhyay:
Exploring Bitslicing Architectures for Enabling FHE-Assisted Machine Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4004-4015 (2022) - [j87]Harishma Boyapally, Paulson Mathew, Sikhar Patranabis, Urbi Chatterjee, Umang Agarwal, Manu Maheshwari, Soumyajit Dey, Debdeep Mukhopadhyay:
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. IEEE Trans. Dependable Secur. Comput. 19(1): 663-680 (2022) - [j86]Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay:
Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange. IEEE Trans. Inf. Forensics Secur. 17: 3847-3862 (2022) - [c183]Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay:
TransNet: Shift Invariant Transformer Network for Side Channel Analysis. AFRICACRYPT 2022: 371-396 - [c182]Akashdeep Saha, Hrivu Banerjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Revisiting Logic Obfuscation Using Cellular Automata. ASCAT 2022: 27-41 - [c181]Rajat Sadhukhan, Anirban Chakraborty, Debdeep Mukhopadhyay:
FUNDAE: Fault Template Attack on SUNDAE-GIFT AEAD Scheme. AsianHOST 2022: 1-6 - [c180]Nimish Mishra, Anirban Chakraborty, Urbi Chatterjee, Debdeep Mukhopadhyay:
Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels. CARDIS 2022: 3-24 - [c179]Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Work-in-Progress: CAMiSE: Content Addressable Memory-integrated Searchable Encryption. CASES 2022: 21-22 - [c178]Chip-Hong Chang, Domenic Forte, Debdeep Mukhopadhyay, Ulrich Rührmair:
ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware Security. CCS 2022: 3545-3547 - [c177]Anirban Chakraborty, Nikhilesh Singh, Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures. DAC 2022: 553-558 - [c176]Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
DIP Learning on CAS-Lock: Using Distinguishing Input Patterns for Attacking Logic Locking. DATE 2022: 688-693 - [c175]Piyush Beegala, Debapriya Basu Roy, Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
Efficient Loop Abort Fault Attacks on Supersingular Isogeny based Key Exchange (SIKE). DFT 2022: 1-6 - [c174]Soumyadyuti Ghosh, Urbi Chatterjee, Soumyajit Dey, Debdeep Mukhopadhyay:
Is the Whole lesser than its Parts? Breaking an Aggregation based Privacy aware Metering Algorithm. DSD 2022: 921-929 - [c173]Rajat Sadhukhan, Sayandeep Saha, Debdeep Mukhopadhyay:
AntiSIFA-CAD: A Framework to Thwart SIFA at the Layout Level. ICCAD 2022: 63:1-63:9 - [c172]Fynn Kappelhoff, Rasmus Rasche, Debdeep Mukhopadhyay, Ulrich Rührmair:
Strong PUF Security Metrics: Response Sensitivity to Small Challenge Perturbations. ISQED 2022: 1-10 - [c171]Arshdeep Kaur, Sayandeep Saha, Chandan Karfa, Debdeep Mukhopadhyay:
Corruption Exposes You: Statistical Key Recovery from Compound Logic Locking. ISQED 2022: 1-6 - [c170]Rajat Sadhukhan, Anirban Chakraborty, Nilanjan Datta, Sikhar Patranabis, Debdeep Mukhopadhyay:
Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers. SPACE 2022: 28-49 - [c169]Soumyadyuti Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay:
SMarT: A SMT Based Privacy Preserving Smart Meter Streaming Methodology. SPACE 2022: 267-286 - [c168]Gang Qu, Benjamin Tan, Kuheli Pratihar, Debdeep Mukhopadhyay, Ramesh Karri:
Innovation Practices Track: Security in Test and Test for Security. VTS 2022: 1 - [e5]Chip-Hong Chang, Ulrich Rührmair, Debdeep Mukhopadhyay, Domenic Forte:
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, ASHES 2022, Los Angeles, CA, USA, 11 November 2022. ACM 2022, ISBN 978-1-4503-9884-8 [contents] - [i104]Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra:
On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel. CoRR abs/2208.01113 (2022) - [i103]Manaar Alam, Shubhajit Datta, Debdeep Mukhopadhyay, Arijit Mondal, Partha Pratim Chakrabarti:
Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries. CoRR abs/2208.08697 (2022) - [i102]Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
PAC Learnability of iPUF Variants. IACR Cryptol. ePrint Arch. 2022: 165 (2022) - [i101]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library. IACR Cryptol. ePrint Arch. 2022: 685 (2022) - [i100]Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay:
XOR Compositions of Physically Related Functions. IACR Cryptol. ePrint Arch. 2022: 954 (2022) - [i99]Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay:
PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement. IACR Cryptol. ePrint Arch. 2022: 1005 (2022) - [i98]Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay:
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries. IACR Cryptol. ePrint Arch. 2022: 1096 (2022) - [i97]Hao Guo, Sayandeep Saha, Satwik Patnaik, Vasudev Gohil, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran:
Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning. IACR Cryptol. ePrint Arch. 2022: 1468 (2022) - [i96]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors. IACR Cryptol. ePrint Arch. 2022: 1563 (2022) - [i95]Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Efficient Threshold FHE with Application to Real-Time Systems. IACR Cryptol. ePrint Arch. 2022: 1625 (2022) - [i94]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Demystifying the comments made on "A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors". IACR Cryptol. ePrint Arch. 2022: 1741 (2022) - [i93]Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay:
Systematically Quantifying Cryptanalytic Non-Linearities in Strong PUFs. IACR Cryptol. ePrint Arch. 2022: 1766 (2022) - 2021
- [j85]Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
A survey on adversarial attacks and defences. CAAI Trans. Intell. Technol. 6(1): 25-45 (2021) - [j84]Nimesh Shah, Durba Chatterjee, Brojogopal Sapui, Debdeep Mukhopadhyay, Arindam Basu:
Introducing Recurrence in Strong PUFs for Enhanced Machine Learning Attack Resistance. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(2): 319-332 (2021) - [j83]Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay:
Victims Can Be Saviors: A Machine Learning-based Detection for Micro-Architectural Side-Channel Attacks. ACM J. Emerg. Technol. Comput. Syst. 17(2): 14:1-14:31 (2021) - [j82]Domenic Forte, Debdeep Mukhopadhyay, Ilia Polian, Yunsi Fei, Rosario Cammarota:
Introduction to the Special Issue on Emerging Challenges and Solutions in Hardware Security. ACM J. Emerg. Technol. Comput. Syst. 17(3): 29:1-29:4 (2021) - [j81]Chester Rebeiro, Debdeep Mukhopadhyay:
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers. J. Cryptol. 34(3): 21 (2021) - [j80]Akashdeep Saha, Hrivu Banerjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
ORACALL: An Oracle-Based Attack on Cellular Automata Guided Logic Locking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(12): 2445-2454 (2021) - [j79]Anirban Chakraborty, Sarani Bhattacharya, Manaar Alam, Sikhar Patranabis, Debdeep Mukhopadhyay:
RASSLE: Return Address Stack based Side-channel LEakage. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2): 275-303 (2021) - [j78]Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
3PAA: A Private PUF Protocol for Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 16: 756-769 (2021) - [c167]Anirban Chakraborty, Manaar Alam, Debdeep Mukhopadhyay:
A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep Learning. ACNS Workshops 2021: 59-77 - [c166]Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey:
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain. ACNS Workshops 2021: 252-275 - [c165]Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin:
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks. ASIACRYPT (2) 2021: 62-94 - [c164]Chandan Kumar Chaudhary, Urbi Chatterjee, Debdeep Mukhopadhyay:
Auto-PUFChain: An Automated Interaction Tool for PUFs and Blockchain in Electronic Supply Chain. AsianHOST 2021: 1-4 - [c163]Sayandeep Saha, Debdeep Mukhopadhyay:
Transform Without Encode is not Sufficient for SIFA and FTA Security: A Case Study. COSADE 2021: 85-104 - [c162]Durba Chatterjee, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
SACReD: An Attack Framework on SAC Resistant Delay-PUFs leveraging Bias and Reliability Factors. DAC 2021: 85-90 - [c161]Rajat Sadhukhan, Sayandeep Saha, Debdeep Mukhopadhyay:
Shortest Path to Secured Hardware: Domain Oriented Masking with High-Level-Synthesis. DAC 2021: 223-228 - [c160]Dhruv Thapar, Manaar Alam, Debdeep Mukhopadhyay:
Deep Learning assisted Cross-Family Profiled Side-Channel Attacks using Transfer Learning. ISQED 2021: 178-185 - [c159]Sikhar Patranabis, Debdeep Mukhopadhyay:
Forward and Backward Private Conjunctive Searchable Symmetric Encryption. NDSS 2021 - [c158]Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Formal Analysis of Physically Unclonable Functions. VLSI-SoC 2021: 1-2 - [c157]Akashdeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Design and Analysis of Logic Locking Techniques. VLSI-SoC 2021: 1-2 - [e4]Chip-Hong Chang, Ulrich Rührmair, Stefan Katzenbeisser, Debdeep Mukhopadhyay:
ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8662-3 [contents] - [i92]Manaar Alam, Shubhajit Datta, Debdeep Mukhopadhyay, Arijit Mondal, Partha Pratim Chakrabarti:
PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function. CoRR abs/2112.04948 (2021) - [i91]Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange. IACR Cryptol. ePrint Arch. 2021: 389 (2021) - [i90]Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay:
On the Validity of Spoofing Attack Against Safe is the New Smart. IACR Cryptol. ePrint Arch. 2021: 395 (2021) - [i89]Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Learnability of Multiplexer PUF and SN-PUF : A Fourier-based Approach. IACR Cryptol. ePrint Arch. 2021: 681 (2021) - [i88]Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Open Sesame: A Novel Non-SAT-Attack against CAS-Lock. IACR Cryptol. ePrint Arch. 2021: 791 (2021) - [i87]Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay:
TransNet: Shift Invariant Transformer Network for Power Attack. IACR Cryptol. ePrint Arch. 2021: 827 (2021) - [i86]Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs. IACR Cryptol. ePrint Arch. 2021: 1067 (2021) - 2020
- [j77]Manaar Alam, Debdeep Mukhopadhyay, Sai Praveen Kadiyala, Siew-Kei Lam, Thambipillai Srikanthan:
Improving accuracy of HPC-based malware classification for embedded platforms using gradient descent optimization. J. Cryptogr. Eng. 10(4): 289-303 (2020) - [j76]Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks. ACM J. Emerg. Technol. Comput. Syst. 17(1): 3:1-3:30 (2020) - [j75]Navid Vafaei, Sayandeep Saha, Nasour Bagheri, Debdeep Mukhopadhyay:
Fault Attack on SKINNY Cipher. J. Hardw. Syst. Secur. 4(4): 277-296 (2020) - [j74]Sarani Bhattacharya, Clémentine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay:
Branch Prediction Attack on Blinded Scalar Multiplication. IEEE Trans. Computers 69(5): 633-648 (2020) - [j73]Sai Praveen Kadiyala, Manaar Alam, Yash Shrivastava, Sikhar Patranabis, Muhamed Fauzi Bin Abbas, Arnab Kumar Biswas, Debdeep Mukhopadhyay, Thambipillai Srikanthan:
LAMBDA: Lightweight Assessment of Malware for emBeddeD Architectures. ACM Trans. Embed. Comput. Syst. 19(4): 23:1-23:31 (2020) - [j72]Sayandeep Saha, Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborty, Shivam Bhasin, Debdeep Mukhopadhyay:
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction. IEEE Trans. Inf. Forensics Secur. 15: 1905-1919 (2020) - [j71]Urbi Chatterjee, Soumi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT. ACM Trans. Design Autom. Electr. Syst. 25(4): 32:1-32:21 (2020) - [c156]Sudarshan Sharma, Arnab Bag, Debdeep Mukhopadhyay:
Compact and Secure Generic Discrete Gaussian Sampler based on HW/SW Co-design. AsianHOST 2020: 1-6 - [c155]Sunandan Adhikary, Ipsita Koley, Saurav Kumar Ghosh, Sumana Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay:
Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions. CPSIOTSEC@CCS 2020: 81-86 - [c154]Akashdeep Saha, Sayandeep Saha, Siddhartha Chowdhury, Debdeep Mukhopadhyay, Bhargab B. Bhattacharya:
LoPher: SAT-Hardened Logic Embedding on Block Ciphers. DAC 2020: 1-6 - [c153]Ipsita Koley, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay, Amogh Kashyap K. N., Sachin Kumar Singh, Lavanya Lokesh, Jithin Nalu Purakkal, Nishant Sinha:
Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations. DATE 2020: 314-317 - [c152]Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian:
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. DATE 2020: 508-513 - [c151]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
ExplFrame: Exploiting Page Frame Cache for Fault Analysis of Block Ciphers. DATE 2020: 1303-1306 - [c150]Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay:
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation. EUROCRYPT (1) 2020: 612-643 - [c149]Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
PUF-G: A CAD Framework for Automated Assessment of Provable Learnability from Formal PUF Representations. ICCAD 2020: 48:1-48:9 - [c148]Debdeep Mukhopadhyay:
Faultless to a Fault? The Case of Threshold Implementations of Crypto-systems vs Fault Template Attacks. ICCAD 2020: 66:1-66:9 - [c147]Sai Praveen Kadiyala, Mohit Garg, Manaar Alam, Hau T. Ngo, Debdeep Mukhopadhyay, Thambipillai Srikanthan:
HARDY: Hardware based Analysis for malwaRe Detection in embedded sYstems. SoCC 2020: 1-6 - [c146]Arnab Bag, Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Cryptographically Secure Multi-tenant Provisioning of FPGAs. SPACE 2020: 208-225 - [c145]Siddhartha Chowdhury, Debapriya Basu Roy, Debdeep Mukhopadhyay:
A Minimalistic Perspective on Koblitz Curve Scalar Multiplication for FPGA Platforms. VLSI-SOC 2020: 70-75 - [c144]Rajat Sadhukhan, Debdeep Mukhopadhyay:
Design Automation for Side Channel Resistant Lightweight Cryptography. VLSI-SOC 2020: 202-203 - [c143]Urbi Chatterjee, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions. WWW (Companion Volume) 2020: 217-221 - [i85]Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian:
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. CoRR abs/2001.09672 (2020) - [i84]Ipsita Koley, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay, Amogh Kashyap K. N., Sachin Kumar Singh, Lavanya Lokesh, Jithin Nalu Purakkal, Nishant Sinha:
Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations. CoRR abs/2002.12412 (2020) - [i83]Manaar Alam, Sayan Sinha, Sarani Bhattacharya, Swastika Dutta, Debdeep Mukhopadhyay, Anupam Chattopadhyay:
RAPPER: Ransomware Prevention via Performance Counters. CoRR abs/2004.01712 (2020) - [i82]Sunandan Adhikary, Ipsita Koley, Sumana Ghosh, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay:
Skip to Secure: Securing Cyber-physical Control Loops with Intentionally Skipped Executions. CoRR abs/2007.08121 (2020) - [i81]Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu:
Deep-Lock: Secure Authorization for Deep Neural Networks. CoRR abs/2008.05966 (2020) - [i80]Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta:
Leakage Assessment in Fault Attacks: A Deep Learning Perspective. IACR Cryptol. ePrint Arch. 2020: 306 (2020) - [i79]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory. IACR Cryptol. ePrint Arch. 2020: 380 (2020) - [i78]Debdeep Mukhopadhyay:
Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations. IACR Cryptol. ePrint Arch. 2020: 459 (2020) - [i77]Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Interpose PUF can be PAC Learned. IACR Cryptol. ePrint Arch. 2020: 471 (2020) - [i76]Sayandeep Saha, Arnab Bag, Debdeep Mukhopadhyay:
Pushing the Limits of Fault Template Attacks: The Role of Side-Channels. IACR Cryptol. ePrint Arch. 2020: 892 (2020) - [i75]Dhruv Thapar, Manaar Alam, Debdeep Mukhopadhyay:
TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks. IACR Cryptol. ePrint Arch. 2020: 1258 (2020) - [i74]Sikhar Patranabis, Debdeep Mukhopadhyay:
Forward and Backward Private Conjunctive Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2020: 1342 (2020)
2010 – 2019
- 2019
- [j70]Sikhar Patranabis, Debdeep Mukhopadhyay:
Identity-based key aggregate cryptosystem from multilinear maps. Adv. Math. Commun. 13(4): 759-778 (2019) - [j69]Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay:
Performance, Security Tradeoffs in Secure Control. IEEE Embed. Syst. Lett. 11(4): 102-105 (2019) - [j68]Rajat Sadhukhan, Paulson Mathew, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Count Your Toggles: a New Leakage Model for Pre-Silicon Power Analysis of Crypto Designs. J. Electron. Test. 35(5): 605-619 (2019) - [j67]Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta:
An automated framework for exploitable fault identification in block ciphers. J. Cryptogr. Eng. 9(3): 203-219 (2019) - [j66]Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands. J. Cryptogr. Eng. 9(3): 263-275 (2019) - [j65]Sk Subidh Ali, Debdeep Mukhopadhyay:
Guest Editorial SPACE 2017 Special Issue in the Journal of Hardware and Systems Security (HaSS). J. Hardw. Syst. Secur. 3(1): 1-2 (2019) - [j64]Manaar Alam, Sarani Bhattacharya, Sayan Sinha, Chester Rebeiro, Debdeep Mukhopadhyay:
IPA: an Instruction Profiling-Based Micro-architectural Side-Channel Attack on Block Ciphers. J. Hardw. Syst. Secur. 3(1): 26-44 (2019) - [j63]Sikhar Patranabis, Debapriya Basu Roy, Anirban Chakraborty, Naveen Nagar, Astikey Singh, Debdeep Mukhopadhyay, Santosh Ghosh:
Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications. J. Hardw. Syst. Secur. 3(2): 103-131 (2019) - [j62]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay:
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Trans. Computers 68(3): 347-361 (2019) - [j61]Sikhar Patranabis, Nilanjan Datta, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations. IEEE Trans. Computers 68(10): 1498-1510 (2019) - [j60]Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database. IEEE Trans. Dependable Secur. Comput. 16(3): 424-437 (2019) - [j59]Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay:
Combining PUF with RLUTs: A Two-party Pay-per-device IP Licensing Scheme on FPGAs. ACM Trans. Embed. Comput. Syst. 18(2): 12:1-12:22 (2019) - [j58]Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IEEE Trans. Inf. Forensics Secur. 14(4): 954-968 (2019) - [j57]Debapriya Basu Roy, Debdeep Mukhopadhyay:
High-Speed Implementation of ECC Scalar Multiplication in GF(p) for Generic Montgomery Curves. IEEE Trans. Very Large Scale Integr. Syst. 27(7): 1587-1600 (2019) - [j56]Anupam Chattopadhyay, Swaroop Ghosh, Wayne P. Burleson, Debdeep Mukhopadhyay:
Guest Editorial Special Section on Security Challenges and Solutions With Emerging Computing Technologies. IEEE Trans. Very Large Scale Integr. Syst. 27(11): 2469-2472 (2019) - [j55]Prabhat Mishra, Debdeep Mukhopadhyay, Swarup Bhunia:
Guest Editorial: Special Section on Autonomous Intelligence for Security and Privacy Analytics. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2703-2705 (2019) - [j54]Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay:
Power Efficiency of S-Boxes: From a Machine-Learning-Based Tool to a Deterministic Model. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2829-2841 (2019) - [c142]Nimesh Shah, Manaar Alam, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Arindam Basu:
A 0.16pJ/bit recurrent neural network based PUF for enhanced machine learning attack resistance. ASP-DAC 2019: 627-632 - [c141]Anirban Chakraborty, Manaar Alam, Debdeep Mukhopadhyay:
Deep Learning Based Diagnostics for Rowhammer Protection of DRAM Chips. ATS 2019: 86-91 - [c140]Manaar Alam, Astikey Singh, Sarani Bhattacharya, Kuheli Pratihar, Debdeep Mukhopadhyay:
In-situ Extraction of Randomness from Computer Architecture Through Hardware Performance Counters. CARDIS 2019: 3-19 - [c139]Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
Number "Not Used" Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates. COSADE 2019: 232-250 - [c138]Sayandeep Saha, S. Nishok Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay, Pallab Dasgupta:
ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures. DAC 2019: 136 - [c137]Urbi Chatterjee, Pranesh Santikellur, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs. DAC 2019: 224 - [c136]Manaar Alam, Debdeep Mukhopadhyay:
How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering? DAC 2019: 226 - [c135]Manaar Alam, Sarani Bhattacharya, Swastika Dutta, Sayan Sinha, Debdeep Mukhopadhyay, Anupam Chattopadhyay:
RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders. HOST 2019: 218-227 - [c134]Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna:
Function Private Predicate Encryption for Low Min-Entropy Predicates. Public Key Cryptography (2) 2019: 189-219 - [c133]Durba Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay:
Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions. SPACE 2019: 142-158 - [c132]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. SPACE 2019: 214-230 - [c131]Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay:
A Machine Learning Based Approach to Predict Power Efficiency of S-Boxes. VLSID 2019: 531-532 - [p1]Durga Prasad Sahoo, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Fault-Tolerant Implementations of Physically Unclonable Functions on FPGA. Security and Fault Tolerance in Internet of Things 2019: 129-153 - [i73]Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications. CoRR abs/1902.04560 (2019) - [i72]Anirban Chakraborty, Sarani Bhattacharya, Debdeep Mukhopadhyay:
Using Memory Allocation Schemes in Linux to Exploit DRAM Vulnerability: with Rowhammer as a Case Study. CoRR abs/1905.12974 (2019) - [i71]Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay:
Modeling Power Efficiency of S-boxes Using Machine Learning. IACR Cryptol. ePrint Arch. 2019: 144 (2019) - [i70]Debapriya Basu Roy, Debdeep Mukhopadhyay:
Post Quantum ECC on FPGA Platform. IACR Cryptol. ePrint Arch. 2019: 568 (2019) - [i69]Sayandeep Saha, Debapriya Basu Roy, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2019: 937 (2019) - 2018
- [j53]Debapriya Basu Roy, Manaar Alam, Sarani Bhattacharya, Vidya Govindan, Francesco Regazzoni, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Customized Instructions for Protection Against Memory Integrity Attacks. IEEE Embed. Syst. Lett. 10(3): 91-94 (2018) - [j52]Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He, Debdeep Mukhopadhyay, Zakaria Najm, Xuan Thuy Ngo:
The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. J. Hardw. Syst. Secur. 2(2): 162-178 (2018) - [j51]Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen:
A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security. IEEE Trans. Computers 67(3): 403-417 (2018) - [j50]Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta:
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 242-276 (2018) - [j49]Sarani Bhattacharya, Debdeep Mukhopadhyay:
Utilizing Performance Counters for Compromising Public Key Ciphers. ACM Trans. Priv. Secur. 21(1): 5:1-5:31 (2018) - [j48]Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay:
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules. IACR Trans. Symmetric Cryptol. 2018(3): 311-334 (2018) - [c130]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. CCS 2018: 745-762 - [c129]Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay:
POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS. AsiaCCS 2018: 849-851 - [c128]Arnab Bag, Sikhar Patranabis, L. Tribhuvan, Debdeep Mukhopadhyay:
Hardware Acceleration of Searchable Encryption. CCS 2018: 2201-2203 - [c127]Manaar Alam, Debdeep Mukhopadhyay, Sai Praveen Kadiyala, Siew Kei Lam, Thambipillai Srikanthan:
Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms. PROOFS 2018: 1-15 - [c126]Mustafa Khairallah, Rajat Sadhukhan, Radhamanjari Samanta, Jakub Breier, Shivam Bhasin, Rajat Subhra Chakraborty, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
DFARPA: Differential fault attack resistant physical design automation. DATE 2018: 1171-1174 - [c125]Urbi Chatterjee, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Trustworthy proofs for sensor data using FPGA based physically unclonable functions. DATE 2018: 1504-1507 - [c124]Manish Kesarwani, Akshar Kaul, Prasad Naldurg, Sikhar Patranabis, Gagandeep Singh, Sameep Mehta, Debdeep Mukhopadhyay:
Efficient Secure k-Nearest Neighbours over Encrypted Data. EDBT 2018: 564-575 - [c123]Sayandeep Saha, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay, Pallab Dasgupta:
Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel. FDTC 2018: 15-22 - [c122]Debdeep Mukhopadhyay, Debapriya Basu Roy:
Revisiting FPGA Implementation of Montgomery Multiplier in Redundant Number System for Efficient ECC Application in GF(p). FPL 2018: 323-326 - [c121]Urbi Chatterjee, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Sweta Pati, Debashis Mahata, Mukesh M. Prabhu:
PUFSSL: An OpenSSL Extension for PUF based Authentication. DSP 2018: 1-5 - [c120]Saru Vig, Siew-Kei Lam, Sarani Bhattacharya, Debdeep Mukhopadhyay:
Rapid detection of rowhammer attacks using dynamic skewed hash tree. HASP@ISCA 2018: 7:1-7:8 - [c119]Debapriya Basu Roy, Debdeep Mukhopadhyay:
Minimalistic Perspective to Public Key Implementations on FPGA. ISVLSI 2018: 381-386 - [c118]Sumanta Bose, Mayank Raikwar, Debdeep Mukhopadhyay, Anupam Chattopadhyay, Kwok-Yan Lam:
BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS. iThings/GreenCom/CPSCom/SmartData 2018: 1326-1335 - [c117]Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay:
Template-Based Fault Injection Analysis of Block Ciphers. SPACE 2018: 21-36 - [c116]Navid Vafaei, Nasour Bagheri, Sayandeep Saha, Debdeep Mukhopadhyay:
Differential Fault Attack on SKINNY Block Cipher. SPACE 2018: 177-197 - [c115]Sarani Bhattacharya, Shivam Bhasin, Debdeep Mukhopadhyay:
Online Detection and Reactive Countermeasure for Leakage from BPU Using TVLA. VLSID 2018: 155-160 - [i68]Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Anupam Chattopadhyay:
RAPPER: Ransomware Prevention via Performance Counters. CoRR abs/1802.03909 (2018) - [i67]Arnab Bag, Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Cryptographically Secure Multi-Tenant Provisioning of FPGAs. CoRR abs/1802.04136 (2018) - [i66]Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
Adversarial Attacks and Defences: A Survey. CoRR abs/1810.00069 (2018) - [i65]Durba Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay:
Testability Analysis of PUFs Leveraging Correlation-Spectra in Boolean Functions. CoRR abs/1810.08821 (2018) - [i64]Manaar Alam, Debdeep Mukhopadhyay:
How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering? CoRR abs/1811.05259 (2018) - [i63]Nimesh Shah, Manaar Alam, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Arindam Basu:
A 0.16pJ/bit Recurrent Neural Network Based PUF for Enhanced Machine Learning Atack Resistance. CoRR abs/1812.05347 (2018) - [i62]Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay:
Template-based Fault Injection Analysis of Block Ciphers. IACR Cryptol. ePrint Arch. 2018: 72 (2018) - [i61]Sikhar Patranabis, Debdeep Mukhopadhyay:
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption. IACR Cryptol. ePrint Arch. 2018: 190 (2018) - [i60]Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta:
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers. IACR Cryptol. ePrint Arch. 2018: 295 (2018) - [i59]Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay:
Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules. IACR Cryptol. ePrint Arch. 2018: 832 (2018) - [i58]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2018: 1168 (2018) - [i57]Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna:
Function Private Predicate Encryption for Low Min-Entropy Predicates. IACR Cryptol. ePrint Arch. 2018: 1250 (2018) - 2017
- [j47]Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff:
Redefining the transparency order. Des. Codes Cryptogr. 82(1-2): 95-115 (2017) - [j46]Sarani Bhattacharya, Debdeep Mukhopadhyay:
Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers. J. Cryptogr. Eng. 7(4): 299-310 (2017) - [j45]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. J. Hardw. Syst. Secur. 1(1): 3-17 (2017) - [j44]Debdeep Mukhopadhyay, Vishal Saraswat:
Editorial for the Special Issue in Journal of Hardware and Systems Security (HaSS) Based on Selected Papers from 6th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016). J. Hardw. Syst. Secur. 1(3): 201-202 (2017) - [j43]Rajat Sadhukhan, Sikhar Patranabis, Ashrujit Ghoshal, Debdeep Mukhopadhyay, Vishal Saraswat, Santosh Ghosh:
An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security. J. Hardw. Syst. Secur. 1(3): 203-218 (2017) - [j42]Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:
Two Efficient Fault-Based Attacks on CLOC and SILC. J. Hardw. Syst. Secur. 1(3): 252-268 (2017) - [j41]Anju P. Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications. Microprocess. Microsystems 52: 131-144 (2017) - [j40]Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
Construction of Rotation Symmetric S-Boxes with High Nonlinearity and Improved DPA Resistivity. IEEE Trans. Computers 66(1): 59-72 (2017) - [j39]Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud. IEEE Trans. Computers 66(5): 891-904 (2017) - [j38]Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
A Combined Power and Fault Analysis Attack on Protected Grain Family of Stream Ciphers. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(12): 1968-1977 (2017) - [j37]Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
An Improved DCM-Based Tunable True Random Number Generator for Xilinx FPGA. IEEE Trans. Circuits Syst. II Express Briefs 64-II(4): 452-456 (2017) - [j36]Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-Based Secure Communication Protocol for IoT. ACM Trans. Embed. Comput. Syst. 16(3): 67:1-67:25 (2017) - [j35]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti:
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers. IEEE Trans. Inf. Forensics Secur. 12(5): 1092-1102 (2017) - [j34]Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test. ACM Trans. Design Autom. Electr. Syst. 22(2): 20:1-20:28 (2017) - [c114]Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks To Design Fault Resistant Ciphers (Full Version). Conf. Computing Frontiers 2017: 402-408 - [c113]Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands. PROOFS 2017: 33-49 - [c112]Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta:
An Automated Framework for Exploitable Fault Identification in Block Ciphers - A Data Mining Approach. PROOFS 2017: 50-67 - [c111]Durga Prasad Sahoo, Phuong Ha Nguyen, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Side Channel Evaluation of PUF-Based Pseudorandom Permutation. DSD 2017: 237-243 - [c110]Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin:
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers. FDTC 2017: 25-32 - [c109]S. V. Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi:
A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20. FDTC 2017: 33-40 - [c108]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. HOST 2017: 167 - [c107]Sumanta Sarkar, Habeeb Syed, Rajat Sadhukhan, Debdeep Mukhopadhyay:
Lightweight Design Choices for LED-like Block Ciphers. INDOCRYPT 2017: 267-281 - [c106]Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay:
Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security. IVSW 2017: 134-139 - [c105]Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay:
Tackling the Time-Defence: An Instruction Count Based Micro-architectural Side-Channel Attack on Block Ciphers. SPACE 2017: 30-52 - [i56]Sikhar Patranabis, Debdeep Mukhopadhyay:
Encrypt-Augment-Recover: Computationally Function Private Predicate Encryption in the Public-Key Setting. IACR Cryptol. ePrint Arch. 2017: 319 (2017) - [i55]Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs. IACR Cryptol. ePrint Arch. 2017: 422 (2017) - [i54]Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test. IACR Cryptol. ePrint Arch. 2017: 459 (2017) - [i53]Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan:
Leakage-Resilient Tweakable Encryption from One-Way Functions. IACR Cryptol. ePrint Arch. 2017: 462 (2017) - [i52]Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Sourangshu Bhattacharya:
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks. IACR Cryptol. ePrint Arch. 2017: 564 (2017) - [i51]Sikhar Patranabis, Debdeep Mukhopadhyay:
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs. IACR Cryptol. ePrint Arch. 2017: 668 (2017) - [i50]Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta:
Differential Fault Analysis Automation. IACR Cryptol. ePrint Arch. 2017: 673 (2017) - [i49]Sikhar Patranabis, Debdeep Mukhopadhyay:
Lightweight Symmetric-Key Hidden Vector Encryption without Pairings. IACR Cryptol. ePrint Arch. 2017: 796 (2017) - [i48]Sarani Bhattacharya, Clémentine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay:
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls. IACR Cryptol. ePrint Arch. 2017: 968 (2017) - [i47]Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IACR Cryptol. ePrint Arch. 2017: 1008 (2017) - [i46]Sumanta Sarkar, Habeeb Syed, Rajat Sadhukhan, Debdeep Mukhopadhyay:
Lightweight Design Choices for LED-like Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 1031 (2017) - [i45]Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin:
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 1073 (2017) - [i44]S. V. Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi:
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20. IACR Cryptol. ePrint Arch. 2017: 1074 (2017) - 2016
- [j33]Debdeep Mukhopadhyay:
PUFs as Promising Tools for Security in Internet of Things. IEEE Des. Test 33(3): 103-115 (2016) - [j32]Abhishek Chakraborty, Sarani Bhattacharya, Tanu Hari Dixit, Chester Rebeiro, Debdeep Mukhopadhyay:
Template attack on SPA and FA resistant implementation of Montgomery ladder. IET Inf. Secur. 10(5): 245-251 (2016) - [j31]Sanjay Burman, Seetal Potluri, Debdeep Mukhopadhyay, Kamakoti Veezhinathan:
Power Consumption versus Hardware Security: Feasibility Study of Differential Power Attack on Linear Feedback Shift Register Based Stream Ciphers and Its Countermeasures. J. Low Power Electron. 12(2): 99-106 (2016) - [j30]Urbi Chatterjee, Rajat Subhra Chakraborty, Hitesh Kapoor, Debdeep Mukhopadhyay:
Theory and Application of Delay Constraints in Arbiter PUF. ACM Trans. Embed. Comput. Syst. 15(1): 10:1-10:20 (2016) - [c104]Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Improved Atomicity to Prevent HCCA on NIST Curves. AsiaPKC@AsiaCCS 2016: 21-30 - [c103]Sarani Bhattacharya, Debdeep Mukhopadhyay:
Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis. CHES 2016: 602-624 - [c102]Anju P. Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Remote Dynamic Clock Reconfiguration Based Attacks on Internet of Things Applications. DSD 2016: 431-438 - [c101]Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Testability Based Metric for Hardware Trojan Vulnerability Assessment. DSD 2016: 503-510 - [c100]Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Fault Tolerant Implementations of Delay-Based Physically Unclonable Functions on FPGA. FDTC 2016: 87-101 - [c99]Poulami Das, Debapriya Basu Roy, Harishma Boyapally, Debdeep Mukhopadhyay:
Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves. AsianHOST 2016: 1-6 - [c98]Sikhar Patranabis, Debapriya Basu Roy, Yash Shrivastava, Debdeep Mukhopadhyay, Santosh Ghosh:
Parsimonious design strategy for linear layers with high diffusion in block ciphers. HOST 2016: 31-36 - [c97]Sikhar Patranabis, Debapriya Basu Roy, Praveen Kumar Vadnala, Debdeep Mukhopadhyay, Santosh Ghosh:
Shuffling across rounds: A lightweight strategy to counter side-channel attacks. ICCD 2016: 440-443 - [c96]Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks. HASP@ISCA 2016: 6:1-6:8 - [c95]Debapriya Basu Roy, Shubham Agrawal, Chester Rebeiro, Debdeep Mukhopadhyay:
Accelerating OpenSSL's ECC with low cost reconfigurable hardware. ISIC 2016: 1-4 - [c94]Manaar Alam, Debapriya Basu Roy, Sarani Bhattacharya, Vidya Govindan, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC. MEMOCODE 2016: 1-4 - [c93]Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Secure public key hardware for IoT applications. MWSCAS 2016: 1-4 - [c92]Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:
Fault Based Almost Universal Forgeries on CLOC and SILC. SPACE 2016: 66-86 - [c91]Shivam Bhasin, Debdeep Mukhopadhyay:
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms - A Tutorial. SPACE 2016: 415-418 - [c90]Ingrid Verbauwhede, Debdeep Mukhopadhyay, Sujoy Sinha Roy:
Embedded Security. VLSID 2016: 23 - [c89]Abhishek Chakraborty, Debdeep Mukhopadhyay:
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM. VLSID 2016: 529-534 - [c88]Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks to Design Fault Resistant Ciphers. VLSID 2016: 585-586 - [i43]Abhishek Chakraborty, Debdeep Mukhopadhyay:
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM. IACR Cryptol. ePrint Arch. 2016: 26 (2016) - [i42]Durga Prasad Sahoo, Phuong Ha Nguyen, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants. IACR Cryptol. ePrint Arch. 2016: 57 (2016) - [i41]Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems. IACR Cryptol. ePrint Arch. 2016: 182 (2016) - [i40]Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA. IACR Cryptol. ePrint Arch. 2016: 441 (2016) - [i39]Sarani Bhattacharya, Debdeep Mukhopadhyay:
Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis. IACR Cryptol. ePrint Arch. 2016: 618 (2016) - [i38]Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-based Secure Communication Protocol for IoT. IACR Cryptol. ePrint Arch. 2016: 674 (2016) - [i37]Sikhar Patranabis, Debdeep Mukhopadhyay:
Identity-Based Key Aggregate Cryptosystem from Multilinear Maps. IACR Cryptol. ePrint Arch. 2016: 693 (2016) - [i36]Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen:
A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security. IACR Cryptol. ePrint Arch. 2016: 1031 (2016) - [i35]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse. IACR Cryptol. ePrint Arch. 2016: 1149 (2016) - [i34]Debapriya Basu Roy, Shivam Bhasin, Sikhar Patranabis, Debdeep Mukhopadhyay, Sylvain Guilley:
What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate. IACR Cryptol. ePrint Arch. 2016: 1152 (2016) - 2015
- [j29]Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:
Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers. Cryptogr. Commun. 7(1): 35-69 (2015) - [j28]Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri:
Security analysis of concurrent error detection against differential fault analysis. J. Cryptogr. Eng. 5(3): 153-169 (2015) - [j27]Chester Rebeiro, Debdeep Mukhopadhyay:
Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation. IEEE Trans. Computers 64(3): 778-790 (2015) - [j26]Suvadeep Hajra, Debdeep Mukhopadhyay:
Reaching the Limit of Nonprofiling DPA. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 915-927 (2015) - [j25]Durga Prasad Sahoo, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8): 1334-1343 (2015) - [j24]Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-Enabled Secure Architecture for FPGA-Based IoT Applications. IEEE Trans. Multi Scale Comput. Syst. 1(2): 110-122 (2015) - [c87]Sarani Bhattacharya, Debdeep Mukhopadhyay:
Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms. CHES 2015: 248-266 - [c86]Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay:
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability. CHES 2015: 577-596 - [c85]Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen, Debdeep Mukhopadhyay:
A Biased Fault Attack on the Time Redundancy Countermeasure for AES. COSADE 2015: 189-203 - [c84]Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay:
Improved practical differential fault analysis of grain-128. DATE 2015: 459-464 - [c83]Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. DATE 2015: 641-646 - [c82]Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Towards Ideal Arbiter PUF Design on Xilinx FPGA: A Practitioner's Perspective. DSD 2015: 559-562 - [c81]Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A Novel Attack on a FPGA based True Random Number Generator. WESS 2015: 6 - [c80]Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
A practical DPA on Grain v1 using LS-SVM. HOST 2015: 44-47 - [c79]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
From theory to practice of private circuit: A cautionary note. ICCD 2015: 296-303 - [c78]Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:
Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing. INDOCRYPT 2015: 25-44 - [c77]Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay:
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p). SAC 2015: 161-177 - [c76]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. SPACE 2015: 190-209 - [c75]Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina:
Modified Transparency Order Property: Solution or Just Another Attempt. SPACE 2015: 210-227 - [c74]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm:
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications. SPACE 2015: 248-268 - [c73]Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen, Durga Prasad Sahoo:
Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things. VLSID 2015: 14-15 - [i33]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
Reconfigurable LUT: Boon or Bane for Secure Applications. IACR Cryptol. ePrint Arch. 2015: 120 (2015) - [i32]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. IACR Cryptol. ePrint Arch. 2015: 493 (2015) - [i31]Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers. IACR Cryptol. ePrint Arch. 2015: 602 (2015) - [i30]Sarani Bhattacharya, Debdeep Mukhopadhyay:
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms. IACR Cryptol. ePrint Arch. 2015: 621 (2015) - [i29]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti:
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures. IACR Cryptol. ePrint Arch. 2015: 806 (2015) - [i28]Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:
Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing. IACR Cryptol. ePrint Arch. 2015: 923 (2015) - [i27]Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance. IACR Cryptol. ePrint Arch. 2015: 925 (2015) - [i26]Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks To Design Fault Resistant Ciphers. IACR Cryptol. ePrint Arch. 2015: 932 (2015) - [i25]Chester Rebeiro, Debdeep Mukhopadhyay:
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2015: 1191 (2015) - [i24]Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay:
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p). IACR Cryptol. ePrint Arch. 2015: 1225 (2015) - [i23]Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay:
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability. IACR Cryptol. ePrint Arch. 2015: 1252 (2015) - 2014
- [b1]Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Hardware Security - Design, Threats, and Safeguards. CRC Press 2014, ISBN 978-1-439-89583-2, pp. I-XXXIII, 1-556 - [c72]Ayan Palchaudhuri, Rajat Subhra Chakraborty, Mohammad Salman, Sreemukh Kardas, Debdeep Mukhopadhyay:
Highly Compact Automated Implementation of Linear CA on FPGAs. ACRI 2014: 388-397 - [c71]Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, Debdeep Mukhopadhyay:
DRECON: DPA Resistant Encryption by Construction. AFRICACRYPT 2014: 420-439 - [c70]Anju P. Johnson, Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Sezer Gören:
Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. WESS 2014: 1:1-1:8 - [c69]Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay:
Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks. CHES 2014: 93-111 - [c68]Suvadeep Hajra, Debdeep Mukhopadhyay:
On the Optimal Pre-processing for Non-profiling Differential Power Analysis. COSADE 2014: 161-178 - [c67]Debapriya Basu Roy, Debdeep Mukhopadhyay, Masami Izumi, Junko Takahashi:
Tile Before Multiplication: An Efficient Strategy to Optimize DSP Multiplier for Accelerating Prime Field ECC for NIST Curves. DAC 2014: 177:1-177:6 - [c66]Partha De, Kunal Banerjee, Chittaranjan A. Mandal, Debdeep Mukhopadhyay:
Circuits and Synthesis Mechanism for Hardware Design to Counter Power Analysis Attacks. DSD 2014: 520-527 - [c65]Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay:
Differential Fault Analysis on the Families of SIMON and SPECK Ciphers. FDTC 2014: 40-48 - [c64]Durga Prasad Sahoo, Sayandeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Hitesh Kapoor:
Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA. HOST 2014: 50-55 - [c63]Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri:
NREPO: Normal basis Recomputing with Permuted Operands. HOST 2014: 118-123 - [c62]Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks? SPACE 2014: 14-27 - [c61]Souvik Kolay, Debdeep Mukhopadhyay:
Khudra: A New Lightweight Block Cipher for FPGAs. SPACE 2014: 126-145 - [c60]Phuong Ha Nguyen, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Cryptanalysis of Composite PUFs (Extended abstract-invited talk). VDAT 2014: 1-2 - [e3]Willi Meier, Debdeep Mukhopadhyay:
Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings. Lecture Notes in Computer Science 8885, Springer 2014, ISBN 978-3-319-13038-5 [contents] - [i22]Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay:
Differential Fault Analysis on the families of SIMON and SPECK ciphers. IACR Cryptol. ePrint Arch. 2014: 267 (2014) - [i21]Kaushik Chakraborty, Subhamoy Maitra, Sumanta Sarkar, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
Redefining the Transparency Order. IACR Cryptol. ePrint Arch. 2014: 367 (2014) - [i20]Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri:
NREPO: Normal Basis Recomputing with Permuted Operands. IACR Cryptol. ePrint Arch. 2014: 497 (2014) - [i19]Souvik Kolay, Debdeep Mukhopadhyay:
Lightweight Diffusion Layer from the kth root of the MDS Matrix. IACR Cryptol. ePrint Arch. 2014: 498 (2014) - [i18]Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay:
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions. IACR Cryptol. ePrint Arch. 2014: 654 (2014) - [i17]Sarani Bhattacharya, Debdeep Mukhopadhyay:
Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses. IACR Cryptol. ePrint Arch. 2014: 790 (2014) - 2013
- [j23]Sezer Gören, Ozgur Ozkurt, Abdullah Yildiz, H. Fatih Ugurdag, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Partial bitstream protection for low-cost FPGAs with physical unclonable function, obfuscation, and dynamic partial self reconfiguration. Comput. Electr. Eng. 39(2): 386-397 (2013) - [j22]Sk Subidh Ali, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
A Fault Analysis Perspective for Testing of Secured SoC Cores. IEEE Des. Test 30(5): 63-73 (2013) - [j21]Jaydeb Bhaumik, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Rain: Reversible Addition with Increased Nonlinearity. Int. J. Netw. Secur. 15(4): 298-306 (2013) - [j20]Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential fault analysis of AES: towards reaching its limits. J. Cryptogr. Eng. 3(2): 73-97 (2013) - [j19]Chester Rebeiro, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Axel Poschmann:
Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks. IEEE Trans. Inf. Forensics Secur. 8(8): 1274-1279 (2013) - [j18]Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:
Constrained Search for a Class of Good Bijective S-Boxes With Improved DPA Resistivity. IEEE Trans. Inf. Forensics Secur. 8(12): 2154-2163 (2013) - [j17]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform. IEEE Trans. Very Large Scale Integr. Syst. 21(3): 434-442 (2013) - [j16]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay:
Theoretical Modeling of Elliptic Curve Scalar Multiplier on LUT-Based FPGAs for Area and Speed. IEEE Trans. Very Large Scale Integr. Syst. 21(5): 901-909 (2013) - [c59]Suvadeep Hajra, Debdeep Mukhopadhyay:
Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces. Inscrypt 2013: 325-342 - [c58]Xinmu Wang, Wen Yueh, Debapriya Basu Roy, Seetharam Narasimhan, Yu Zheng, Saibal Mukhopadhyay, Debdeep Mukhopadhyay, Swarup Bhunia:
Role of power grid in side channel attack and power-grid-aware secure design. DAC 2013: 78:1-78:9 - [c57]Partha De, Kunal Banerjee, Chittaranjan A. Mandal, Debdeep Mukhopadhyay:
Designing DPA Resistant Circuits Using BDD Architecture and Bottom Pre-charge Logic. DSD 2013: 641-644 - [c56]Souvik Kolay, Sagar Khurana, Anupam Sadhukhan, Chester Rebeiro, Debdeep Mukhopadhyay:
PERMS: A Bit Permutation Instruction for Accelerating Software Cryptography. DSD 2013: 963-968 - [c55]Sagar Khurana, Souvik Kolay, Chester Rebeiro, Debdeep Mukhopadhyay:
Lightweight cipher implementations on embedded processors. DTIS 2013: 82-87 - [c54]Subidh Ali, Debdeep Mukhopadhyay:
Improved Differential Fault Analysis of CLEFIA. FDTC 2013: 60-70 - [c53]Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:
Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience. HOST 2013: 87-92 - [c52]Debdeep Mukhopadhyay:
On-line testing for differential fault attacks in cryptographic circuits. IOLTS 2013: 226-227 - [c51]Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
Unraveling timewarp: what all the fuzz is about? HASP@ISCA 2013: 8 - [c50]Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Design of low area-overhead ring oscillator PUF with large challenge space. ReConFig 2013: 1-6 - [e2]Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay:
Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings. Lecture Notes in Computer Science 8204, Springer 2013, ISBN 978-3-642-41223-3 [contents] - [i16]Suvadeep Hajra, Debdeep Mukhopadhyay:
Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model. IACR Cryptol. ePrint Arch. 2013: 849 (2013) - [i15]Suvadeep Hajra, Debdeep Mukhopadhyay:
SNR to Success Rate: Reaching the Limit of Non-Profiling DPA. IACR Cryptol. ePrint Arch. 2013: 865 (2013) - 2012
- [j15]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay:
Generalized high speed Itoh-Tsujii multiplicative inversion architecture for FPGAs. Integr. 45(3): 307-315 (2012) - [j14]Sandip Karmakar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata. J. Cell. Autom. 7(2): 179-197 (2012) - [j13]Chester Rebeiro, Debdeep Mukhopadhyay:
Boosting Profiled Cache Timing Attacks With A Priori Analysis. IEEE Trans. Inf. Forensics Secur. 7(6): 1900-1905 (2012) - [c49]Debdeep Mukhopadhyay:
Generating Expander Graphs Using Cellular Automata. ACRI 2012: 52-62 - [c48]Chester Rebeiro, Sujoy Sinha Roy, Debdeep Mukhopadhyay:
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs. CHES 2012: 494-511 - [c47]Subidh Ali, Debdeep Mukhopadhyay:
Differential Fault Analysis of Twofish. Inscrypt 2012: 10-28 - [c46]Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, Huaxiong Wang:
Improved Differential Cache Attacks on SMS4. Inscrypt 2012: 29-45 - [c45]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay:
A Parallel Architecture for Koblitz Curve Scalar Multiplications on FPGA Platforms. DSD 2012: 553-559 - [c44]Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
Hardware Prefetchers Leak: A Revisit of SVF for Cache-Timing Attacks. MICRO Workshops 2012: 17-23 - [c43]Debapriya Basu Roy, Debdeep Mukhopadhyay:
An Efficient High Speed Implementation of Flexible Characteristic-2 Multipliers on FPGAs. VDAT 2012: 99-110 - [c42]Sanjay Burman, Ayan Palchaudhuri, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Pranav Singh:
Effect of Malicious Hardware Logic on Circuit Reliability. VDAT 2012: 190-197 - [c41]Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:
Design for Security of Block Cipher S-Boxes to Resist Differential Power Attacks. VLSI Design 2012: 113-118 - [i14]Subidh Ali, Debdeep Mukhopadhyay:
Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis. IACR Cryptol. ePrint Arch. 2012: 286 (2012) - [i13]Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential Fault Analysis of AES: Towards Reaching its Limits. IACR Cryptol. ePrint Arch. 2012: 446 (2012) - [i12]Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:
Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity. IACR Cryptol. ePrint Arch. 2012: 547 (2012) - [i11]Xiaofei Guo, Debdeep Mukhopadhyay, Ramesh Karri:
Provably Secure Concurrent Error Detection Against Differential Fault Analysis. IACR Cryptol. ePrint Arch. 2012: 552 (2012) - 2011
- [j12]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Fault Attack, Countermeasures on Pairing Based Cryptography. Int. J. Netw. Secur. 12(1): 21-28 (2011) - [j11]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Parallel Efficient Architecture for Large Cryptographically Robust n × k (k>n/2) Mappings. IEEE Trans. Computers 60(3): 375-385 (2011) - [j10]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Petrel: Power and Timing Attack Resistant Elliptic Curve Scalar Multiplier Based on Programmable GF(p) Arithmetic Unit. IEEE Trans. Circuits Syst. I Regul. Pap. 58-I(8): 1798-1812 (2011) - [j9]Chester Rebeiro, Sujoy Sinha Roy, Sankara Reddy, Debdeep Mukhopadhyay:
Revisiting the Itoh-Tsujii Inversion Algorithm for FPGA Platforms. IEEE Trans. Very Large Scale Integr. Syst. 19(8): 1508-1512 (2011) - [c40]Subidh Ali, Debdeep Mukhopadhyay:
An Improved Differential Fault Analysis on AES-256. AFRICACRYPT 2011: 332-347 - [c39]Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Testability of Cryptographic Hardware and Detection of Hardware Trojans. Asian Test Symposium 2011: 517-524 - [c38]Subidh Ali, Debdeep Mukhopadhyay:
Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault. CARDIS 2011: 50-64 - [c37]Chester Rebeiro, Debdeep Mukhopadhyay:
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns. CT-RSA 2011: 89-103 - [c36]Subidh Ali, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Swarup Bhunia:
Multi-level attacks: An emerging security concern for cryptographic hardware. DATE 2011: 1176-1179 - [c35]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay:
Theoretical modeling of the Itoh-Tsujii Inversion algorithm for enhanced performance on k-LUT based FPGAs. DATE 2011: 1231-1236 - [c34]Subidh Ali, Debdeep Mukhopadhyay:
A Differential Fault Analysis on AES Key Schedule Using Single Fault. FDTC 2011: 35-42 - [c33]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay:
Accelerating Itoh-Tsujii multiplicative inversion algorithm for FPGAs. ACM Great Lakes Symposium on VLSI 2011: 67-72 - [c32]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. INDOCRYPT 2011: 3-21 - [c31]Chester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay:
An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines. INDOCRYPT 2011: 58-75 - [c30]Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali:
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. WISTP 2011: 224-233 - [e1]Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall:
Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings. Lecture Notes in Computer Science 7011, Springer 2011, ISBN 978-3-642-24585-5 [contents] - [i10]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack. IACR Cryptol. ePrint Arch. 2011: 181 (2011) - [i9]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga:
Scalar Multiplication on Koblitz Curves using tau2-NAF. IACR Cryptol. ePrint Arch. 2011: 318 (2011) - [i8]Mainack Mondal, Avik Chakraborti, Nilanjan Datta, Debdeep Mukhopadhyay:
TweLEX: A Tweaked Version of the LEX Stream Cipher. IACR Cryptol. ePrint Arch. 2011: 586 (2011) - 2010
- [j8]Debdeep Mukhopadhyay:
Group Properties of Non-linear Cellular Automata. J. Cell. Autom. 5(1-2): 139-155 (2010) - [c29]Sandip Karmakar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design. ACRI 2010: 261-270 - [c28]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
High speed Fp multipliers and adders on FPGA platform. DASIP 2010: 21-26 - [c27]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
High Speed Flexible Pairing Cryptoprocessor on FPGA Platform. Pairing 2010: 450-466 - [c26]Dibyendu Mallik, Debdeep Mukhopadhyay:
New Pseudo Near Collision Attack on Tiger. SECRYPT 2010: 427-430 - [c25]Chester Rebeiro, Mainack Mondal, Debdeep Mukhopadhyay:
Pinpointing Cache Timing Attacks on AES. VLSI Design 2010: 306-311 - [i7]Chester Rebeiro, Debdeep Mukhopadhyay:
Differential Cache Trace Attack Against CLEFIA. IACR Cryptol. ePrint Arch. 2010: 12 (2010) - [i6]Subidh Ali, Debdeep Mukhopadhyay:
Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault. IACR Cryptol. ePrint Arch. 2010: 451 (2010) - [i5]Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential Fault Analysis of AES using a Single Multiple-Byte Fault. IACR Cryptol. ePrint Arch. 2010: 636 (2010)
2000 – 2009
- 2009
- [j7]Monjur Alam, Santosh Ghosh, M. J. Mohan, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Indranil Sengupta:
Effect of glitches against masked AES S-box implementation and countermeasure. IET Inf. Secur. 3(1): 34-44 (2009) - [c24]Debdeep Mukhopadhyay:
An Improved Fault Based Attack of the Advanced Encryption Standard. AFRICACRYPT 2009: 421-434 - [c23]Debdeep Mukhopadhyay:
A new fault attack on the advanced encryption standard hardware. ECCTD 2009: 387-390 - [c22]Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga:
Cache Timing Attacks on Clefia. INDOCRYPT 2009: 104-118 - [i4]Michael Tunstall, Debdeep Mukhopadhyay:
Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault. IACR Cryptol. ePrint Arch. 2009: 575 (2009) - [i3]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Diagonal Fault Attack on the Advanced Encryption Standard. IACR Cryptol. ePrint Arch. 2009: 581 (2009) - 2008
- [j6]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Customizing Cellular Message Encryption Algorithm. Int. J. Netw. Secur. 7(2): 193-201 (2008) - [j5]Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury:
VLSI Architecture of a Cellular Automata based One-Way Function. J. Comput. 3(5): 46-53 (2008) - [c21]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Chester Rebeiro:
Theory of Composing Non-linear Machines with Predictable Cyclic Structures. ACRI 2008: 210-219 - [c20]Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay:
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures. INDOCRYPT 2008: 226-238 - [c19]Chester Rebeiro, Debdeep Mukhopadhyay:
High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms. INDOCRYPT 2008: 376-388 - [c18]Chester Rebeiro, Debdeep Mukhopadhyay:
Power Attack Resistant Efficient FPGA Architecture for Karatsuba Multiplier. VLSI Design 2008: 706-711 - 2007
- [j4]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Theory of a Class of Complemented Group Cellular Automata and Its Application to Cryptography. J. Cell. Autom. 2(3): 243-271 (2007) - [j3]Debdeep Mukhopadhyay, Gaurav Sengar, Dipanwita Roy Chowdhury:
Hierarchical Verification of Galois Field Circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(10): 1893-1898 (2007) - [j2]Gaurav Sengar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Secured Flipped Scan-Chain Model for Crypto-Architecture. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(11): 2080-2084 (2007) - [c17]Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury:
Strengthening NLS Against Crossword Puzzle Attack. ACISP 2007: 29-44 - [c16]Monjur Alam, Sonai Ray, Debdeep Mukhopadhyay, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:
An area optimized reconfigurable encryptor for AES-Rijndael. DATE 2007: 1116-1121 - [c15]Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design of a Differential Power Analysis Resistant Masked AES S-Box. INDOCRYPT 2007: 373-383 - [c14]Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan:
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. INDOCRYPT 2007: 384-392 - [c13]Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury:
An Efficient Design of Cellular Automata Based Cryptographically Robust One-Way Function. VLSI Design 2007: 842-853 - 2006
- [j1]Shibaji Banerjee, Debdeep Mukhopadhyay, C. V. G. Rao, Dipanwita Roy Chowdhury:
An integrated DFT solution for mixed-signal SOCs. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 25(7): 1368-1377 (2006) - [c12]Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and Its Application to RS-Coded MPSK Modulation. ACRI 2006: 204-214 - [c11]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Generation of Expander Graphs Using Cellular Automata and Its Applications to Cryptography. ACRI 2006: 636-645 - [c10]Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata. AINA (2) 2006: 67-71 - [c9]Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Programmable Parallel Structure to perform Galois Field Exponentiation. ICIT 2006: 277-280 - 2005
- [c8]Debdeep Mukhopadhyay, Shibaji Banerjee, Dipanwita Roy Chowdhury, Bhargab B. Bhattacharya:
CryptoScan: A Secured Scan Chain Architecture. Asian Test Symposium 2005: 348-353 - [c7]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Cellular automata based key agreement. ICETE 2005: 262-267 - [c6]Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita Roy Chowdhury:
CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks. ICISS 2005: 217-227 - [c5]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
An Efficient End to End Design of Rijndael Cryptosystem in 0.18 ? CMOS. VLSI Design 2005: 405-410 - [c4]Shibaji Banerjee, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Computer Aided Test (CAT) Tool for Mixed Signal SOCs. VLSI Design 2005: 787-790 - [i2]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Key Mixing in Block Ciphers through Addition modulo 2n. IACR Cryptol. ePrint Arch. 2005: 383 (2005) - [i1]Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata. IACR Cryptol. ePrint Arch. 2005: 396 (2005) - 2004
- [c3]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Characterization of a Class of Complemented Group Cellular Automata. ACRI 2004: 775-784 - [c2]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Cellular Automata : An Ideal Candidate for a Block Cipher. ICDCIT 2004: 452-457 - 2002
- [c1]Subhayu Basu, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Indranil Sengupta, Sudipta Bhawmik:
Reformatting Test Patterns for Testing Embedded Core Based System Using Test Access Mechanism (TAM) Switch. ASP-DAC/VLSI Design 2002: 598-603
Coauthor Index
aka: Sk Subidh Ali
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint