Debdeep Mukhopadhyay
Debdeep Mukhopadhyay
Professor, Dept of Computer Science and Engineering, IIT Kharagpur, India
Verified email at - Homepage
Cited by
Cited by
Cryptography & network security
BA Forouzan
McGraw-Hill, Inc., 2007
A survey on adversarial attacks and defences
A Chakraborty, M Alam, V Dey, A Chattopadhyay, D Mukhopadhyay
CAAI Transactions on Intelligence Technology 6 (1), 25-45, 2021
Differential fault analysis of the advanced encryption standard using a single fault
M Tunstall, D Mukhopadhyay, S Ali
Information Security Theory and Practice. Security and Privacy of Mobile …, 2011
Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database
U Chatterjee, V Govindan, R Sadhukhan, D Mukhopadhyay, ...
IEEE transactions on dependable and secure computing 16 (3), 424-437, 2018
A PUF-based secure communication protocol for IoT
U Chatterjee, RS Chakraborty, D Mukhopadhyay
ACM Transactions on Embedded Computing Systems (TECS) 16 (3), 1-25, 2017
An improved fault based attack of the advanced encryption standard
D Mukhopadhyay
International Conference on Cryptology in Africa, 421-434, 2009
Result pattern hiding searchable encryption for conjunctive queries
S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Secured flipped scan-chain model for crypto-architecture
G Sengar, D Mukhopadhyay, DR Chowdhury
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2007
A multiplexer-based arbiter PUF composition with enhanced reliability and security
DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen
IEEE Transactions on Computers 67 (3), 403-417, 2017
A diagonal fault attack on the advanced encryption standard
D Saha, D Mukhopadhyay, D RoyChowdhury
Cryptology ePrint Archive, 2009
Improved test pattern generation for hardware trojan detection using genetic algorithm and boolean satisfiability
S Saha, RS Chakraborty, SS Nuthakki, Anshul, D Mukhopadhyay
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
Curious case of rowhammer: flipping secret exponent bits using timing analysis
S Bhattacharya, D Mukhopadhyay
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks
DP Sahoo, PH Nguyen, D Mukhopadhyay, RS Chakraborty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
PUFs as promising tools for security in internet of things
D Mukhopadhyay
IEEE Design & Test 33 (3), 103-115, 2016
A PUF-enabled secure architecture for FPGA-based IoT applications
AP Johnson, RS Chakraborty, D Mukhopadhyay
IEEE Transactions on Multi-Scale Computing Systems 1 (2), 110-122, 2015
Destroying fault invariant with randomization: A countermeasure for aes against differential fault attacks
H Tupsamudre, S Bisht, D Mukhopadhyay
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
Security analysis of concurrent error detection against differential fault analysis
X Guo, D Mukhopadhyay, C Jin, R Karri
Journal of Cryptographic Engineering 5, 153-169, 2015
Hardware security: design, threats, and safeguards
D Mukhopadhyay, RS Chakraborty
CRC Press, 2014
Differential fault analysis on the families of SIMON and SPECK ciphers
H Tupsamudre, S Bisht, D Mukhopadhyay
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 40-48, 2014
Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks
M Alam, S Bhattacharya, D Mukhopadhyay, S Bhattacharya
Cryptology ePrint Archive, 2017
The system can't perform the operation now. Try again later.
Articles 1–20