Folgen
Debdeep Mukhopadhyay
Debdeep Mukhopadhyay
Professor, Dept of Computer Science and Engineering, IIT Kharagpur, India
Bestätigte E-Mail-Adresse bei cse.iitkgp.ac.in - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Cryptography & network security
BA Forouzan
McGraw-Hill, Inc., 2007
14602007
A survey on adversarial attacks and defences
A Chakraborty, M Alam, V Dey, A Chattopadhyay, D Mukhopadhyay
CAAI Transactions on Intelligence Technology 6 (1), 25-45, 2021
941*2021
Differential fault analysis of the advanced encryption standard using a single fault
M Tunstall, D Mukhopadhyay, S Ali
Information Security Theory and Practice. Security and Privacy of Mobile …, 2011
4352011
Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database
U Chatterjee, V Govindan, R Sadhukhan, D Mukhopadhyay, ...
IEEE transactions on dependable and secure computing 16 (3), 424-437, 2018
2392018
A PUF-based secure communication protocol for IoT
U Chatterjee, RS Chakraborty, D Mukhopadhyay
ACM Transactions on Embedded Computing Systems (TECS) 16 (3), 1-25, 2017
1972017
An improved fault based attack of the advanced encryption standard
D Mukhopadhyay
International Conference on Cryptology in Africa, 421-434, 2009
1962009
Result pattern hiding searchable encryption for conjunctive queries
S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1752018
Secured flipped scan-chain model for crypto-architecture
G Sengar, D Mukhopadhyay, DR Chowdhury
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2007
1632007
A multiplexer-based arbiter PUF composition with enhanced reliability and security
DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen
IEEE Transactions on Computers 67 (3), 403-417, 2017
1452017
A diagonal fault attack on the advanced encryption standard
D Saha, D Mukhopadhyay, D RoyChowdhury
Cryptology ePrint Archive, 2009
1432009
Improved test pattern generation for hardware trojan detection using genetic algorithm and boolean satisfiability
S Saha, RS Chakraborty, SS Nuthakki, Anshul, D Mukhopadhyay
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
1212015
Curious case of rowhammer: flipping secret exponent bits using timing analysis
S Bhattacharya, D Mukhopadhyay
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
1152016
A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks
DP Sahoo, PH Nguyen, D Mukhopadhyay, RS Chakraborty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
952015
PUFs as promising tools for security in internet of things
D Mukhopadhyay
IEEE Design & Test 33 (3), 103-115, 2016
932016
A PUF-enabled secure architecture for FPGA-based IoT applications
AP Johnson, RS Chakraborty, D Mukhopadhyay
IEEE Transactions on Multi-Scale Computing Systems 1 (2), 110-122, 2015
922015
Hardware security: design, threats, and safeguards
D Mukhopadhyay, RS Chakraborty
CRC Press, 2014
892014
Differential fault analysis on the families of SIMON and SPECK ciphers
H Tupsamudre, S Bisht, D Mukhopadhyay
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 40-48, 2014
892014
Destroying fault invariant with randomization: A countermeasure for aes against differential fault attacks
H Tupsamudre, S Bisht, D Mukhopadhyay
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
882014
Security analysis of concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, C Jin, R Karri
Journal of Cryptographic Engineering 5, 153-169, 2015
872015
Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks
M Alam, S Bhattacharya, D Mukhopadhyay, S Bhattacharya
Cryptology ePrint Archive, 2017
852017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20