default search action
Debapriya Basu Roy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Felix Oberhansl, Tim Fritzmann, Thomas Pöppelmann, Debapriya Basu Roy, Georg Sigl:
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography. J. Cryptogr. Eng. 14(1): 1-18 (2024) - [j15]Jiafeng Xie, Wenfeng Zhao, Hanho Lee, Debapriya Basu Roy, Xinmiao Zhang:
Hardware Circuits and Systems Design for Post-Quantum Cryptography - A Tutorial Brief. IEEE Trans. Circuits Syst. II Express Briefs 71(3): 1670-1676 (2024) - [c34]Levent Aksoy, Debapriya Basu Roy, Malik Imran, Samuel Pagliarini:
Multiplierless Design of High-Speed Very Large Constant Multiplications. ASPDAC 2024: 957-962 - [c33]Suraj Mandal, Debapriya Basu Roy:
Design of a Lightweight Fast Fourier Transformation for FALCON using Hardware-Software Co-Design. ACM Great Lakes Symposium on VLSI 2024: 228-232 - [c32]Suraj Mandal, Debapriya Basu Roy:
KiD: A Hardware Design Framework Targeting Unified NTT Multiplication for CRYSTALS-Kyber and CRYSTALS-Dilithium on FPGA. VLSID 2024: 455-460 - 2023
- [c31]Harish Prasad Allam, Suraj Mandal, Debapriya Basu Roy:
A Comparative Analysis between Karatsuba, Toom-Cook and NTT Multiplier for Polynomial Multiplication in NTRU on FPGA. AsianHOST 2023: 1-6 - [i15]Levent Aksoy, Debapriya Basu Roy, Malik Imran, Samuel Pagliarini:
Multiplierless Design of High-Speed Very Large Constant Multiplications. CoRR abs/2309.05550 (2023) - [i14]Suraj Mandal, Debapriya Basu Roy:
KiD: A Hardware Design Framework Targeting Unified NTT Multiplication for CRYSTALS-Kyber and CRYSTALS-Dilithium on FPGA. CoRR abs/2311.04581 (2023) - 2022
- [j14]Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay:
FlexiPair: An Automated Programmable Framework for Pairing Cryptosystems. IEEE Trans. Computers 71(3): 506-519 (2022) - [j13]Levent Aksoy, Debapriya Basu Roy, Malik Imran, Patrick Karl, Samuel Pagliarini:
Multiplierless Design of Very Large Constant Multiplications in Cryptography. IEEE Trans. Circuits Syst. II Express Briefs 69(11): 4503-4507 (2022) - [j12]Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl:
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 414-460 (2022) - [c30]Piyush Beegala, Debapriya Basu Roy, Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
Efficient Loop Abort Fault Attacks on Supersingular Isogeny based Key Exchange (SIKE). DFT 2022: 1-6 - [i13]Levent Aksoy, Debapriya Basu Roy, Malik Imran, Patrick Karl, Samuel Pagliarini:
Multiplierless Design of Very Large Constant Multiplications in Cryptography. CoRR abs/2205.10591 (2022) - 2021
- [i12]Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl:
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2021: 479 (2021) - 2020
- [j11]Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks. ACM J. Emerg. Technol. Comput. Syst. 17(1): 3:1-3:30 (2020) - [j10]Sayandeep Saha, Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborty, Shivam Bhasin, Debdeep Mukhopadhyay:
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction. IEEE Trans. Inf. Forensics Secur. 15: 1905-1919 (2020) - [c29]Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay:
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation. EUROCRYPT (1) 2020: 612-643 - [c28]Debapriya Basu Roy, Tim Fritzmann, Georg Sigl:
Efficient Hardware/Software Co-Design for Post-Quantum Crypto Algorithm SIKE on ARM and RISC-V based Microcontrollers. ICCAD 2020: 35:1-35:9 - [c27]Arnab Bag, Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Cryptographically Secure Multi-tenant Provisioning of FPGAs. SPACE 2020: 208-225 - [c26]Siddhartha Chowdhury, Debapriya Basu Roy, Debdeep Mukhopadhyay:
A Minimalistic Perspective on Koblitz Curve Scalar Multiplication for FPGA Platforms. VLSI-SOC 2020: 70-75
2010 – 2019
- 2019
- [j9]Rajat Sadhukhan, Paulson Mathew, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Count Your Toggles: a New Leakage Model for Pre-Silicon Power Analysis of Crypto Designs. J. Electron. Test. 35(5): 605-619 (2019) - [j8]Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands. J. Cryptogr. Eng. 9(3): 263-275 (2019) - [j7]Sikhar Patranabis, Debapriya Basu Roy, Anirban Chakraborty, Naveen Nagar, Astikey Singh, Debdeep Mukhopadhyay, Santosh Ghosh:
Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications. J. Hardw. Syst. Secur. 3(2): 103-131 (2019) - [j6]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay:
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Trans. Computers 68(3): 347-361 (2019) - [j5]Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay:
Combining PUF with RLUTs: A Two-party Pay-per-device IP Licensing Scheme on FPGAs. ACM Trans. Embed. Comput. Syst. 18(2): 12:1-12:22 (2019) - [j4]Debapriya Basu Roy, Debdeep Mukhopadhyay:
High-Speed Implementation of ECC Scalar Multiplication in GF(p) for Generic Montgomery Curves. IEEE Trans. Very Large Scale Integr. Syst. 27(7): 1587-1600 (2019) - [c25]Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
Number "Not Used" Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates. COSADE 2019: 232-250 - [c24]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. SPACE 2019: 214-230 - [i11]Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications. CoRR abs/1902.04560 (2019) - [i10]Debapriya Basu Roy, Debdeep Mukhopadhyay:
Post Quantum ECC on FPGA Platform. IACR Cryptol. ePrint Arch. 2019: 568 (2019) - [i9]Sayandeep Saha, Debapriya Basu Roy, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2019: 937 (2019) - 2018
- [j3]Debapriya Basu Roy, Manaar Alam, Sarani Bhattacharya, Vidya Govindan, Francesco Regazzoni, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Customized Instructions for Protection Against Memory Integrity Attacks. IEEE Embed. Syst. Lett. 10(3): 91-94 (2018) - [j2]Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He, Debdeep Mukhopadhyay, Zakaria Najm, Xuan Thuy Ngo:
The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. J. Hardw. Syst. Secur. 2(2): 162-178 (2018) - [c23]Debdeep Mukhopadhyay, Debapriya Basu Roy:
Revisiting FPGA Implementation of Montgomery Multiplier in Redundant Number System for Efficient ECC Application in GF(p). FPL 2018: 323-326 - [c22]Debapriya Basu Roy, Debdeep Mukhopadhyay:
Minimalistic Perspective to Public Key Implementations on FPGA. ISVLSI 2018: 381-386 - [i8]Arnab Bag, Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Cryptographically Secure Multi-Tenant Provisioning of FPGAs. CoRR abs/1802.04136 (2018) - 2017
- [j1]Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:
Two Efficient Fault-Based Attacks on CLOC and SILC. J. Hardw. Syst. Secur. 1(3): 252-268 (2017) - [c21]Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks To Design Fault Resistant Ciphers (Full Version). Conf. Computing Frontiers 2017: 402-408 - [c20]Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands. PROOFS 2017: 33-49 - [c19]Durga Prasad Sahoo, Phuong Ha Nguyen, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Side Channel Evaluation of PUF-Based Pseudorandom Permutation. DSD 2017: 237-243 - [c18]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. HOST 2017: 167 - [c17]Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay:
Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security. IVSW 2017: 134-139 - 2016
- [c16]Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Improved Atomicity to Prevent HCCA on NIST Curves. AsiaPKC@AsiaCCS 2016: 21-30 - [c15]Poulami Das, Debapriya Basu Roy, Harishma Boyapally, Debdeep Mukhopadhyay:
Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves. AsianHOST 2016: 1-6 - [c14]Sikhar Patranabis, Debapriya Basu Roy, Yash Shrivastava, Debdeep Mukhopadhyay, Santosh Ghosh:
Parsimonious design strategy for linear layers with high diffusion in block ciphers. HOST 2016: 31-36 - [c13]Sikhar Patranabis, Debapriya Basu Roy, Praveen Kumar Vadnala, Debdeep Mukhopadhyay, Santosh Ghosh:
Shuffling across rounds: A lightweight strategy to counter side-channel attacks. ICCD 2016: 440-443 - [c12]Debapriya Basu Roy, Shubham Agrawal, Chester Rebeiro, Debdeep Mukhopadhyay:
Accelerating OpenSSL's ECC with low cost reconfigurable hardware. ISIC 2016: 1-4 - [c11]Manaar Alam, Debapriya Basu Roy, Sarani Bhattacharya, Vidya Govindan, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC. MEMOCODE 2016: 1-4 - [c10]Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Secure public key hardware for IoT applications. MWSCAS 2016: 1-4 - [c9]Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:
Fault Based Almost Universal Forgeries on CLOC and SILC. SPACE 2016: 66-86 - [c8]Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks to Design Fault Resistant Ciphers. VLSID 2016: 585-586 - [i7]Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems. IACR Cryptol. ePrint Arch. 2016: 182 (2016) - [i6]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse. IACR Cryptol. ePrint Arch. 2016: 1149 (2016) - [i5]Debapriya Basu Roy, Shivam Bhasin, Sikhar Patranabis, Debdeep Mukhopadhyay, Sylvain Guilley:
What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate. IACR Cryptol. ePrint Arch. 2016: 1152 (2016) - 2015
- [c7]Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Debapriya Basu Roy, Jean-Luc Danger, Sylvain Guilley:
Integrated Sensor: A Backdoor for Hardware Trojan Insertions? DSD 2015: 415-422 - [c6]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
From theory to practice of private circuit: A cautionary note. ICCD 2015: 296-303 - [c5]Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay:
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p). SAC 2015: 161-177 - [c4]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm:
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications. SPACE 2015: 248-268 - [i4]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
Reconfigurable LUT: Boon or Bane for Secure Applications. IACR Cryptol. ePrint Arch. 2015: 120 (2015) - [i3]Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance. IACR Cryptol. ePrint Arch. 2015: 925 (2015) - [i2]Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks To Design Fault Resistant Ciphers. IACR Cryptol. ePrint Arch. 2015: 932 (2015) - [i1]Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay:
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p). IACR Cryptol. ePrint Arch. 2015: 1225 (2015) - 2014
- [c3]Debapriya Basu Roy, Debdeep Mukhopadhyay, Masami Izumi, Junko Takahashi:
Tile Before Multiplication: An Efficient Strategy to Optimize DSP Multiplier for Accelerating Prime Field ECC for NIST Curves. DAC 2014: 177:1-177:6 - 2013
- [c2]Xinmu Wang, Wen Yueh, Debapriya Basu Roy, Seetharam Narasimhan, Yu Zheng, Saibal Mukhopadhyay, Debdeep Mukhopadhyay, Swarup Bhunia:
Role of power grid in side channel attack and power-grid-aware secure design. DAC 2013: 78:1-78:9 - 2012
- [c1]Debapriya Basu Roy, Debdeep Mukhopadhyay:
An Efficient High Speed Implementation of Flexible Characteristic-2 Multipliers on FPGAs. VDAT 2012: 99-110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint