


Остановите войну!
for scientists:
Dipanwita Roy Chowdhury
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [i14]Md Rasid Ali, Debranjan Pal, Abhijit Das, Dipanwita Roy Chowdhury:
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest. IACR Cryptol. ePrint Arch. 2022: 519 (2022) - 2021
- [j44]Swapan Maiti
, Dipanwita Roy Chowdhury:
Design of fault-resilient S-boxes for AES-like block ciphers. Cryptogr. Commun. 13(1): 71-100 (2021) - [j43]Bijoy Das
, Amit Sardar, Swapan Maiti, Abhijit Das, Dipanwita Roy Chowdhury:
An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures. J. Hardw. Syst. Secur. 5(3): 191-207 (2021) - [c110]Souvik Sur, Abhijit Das, Dipanwita Roy Chowdhury:
CArrency: An Energy-Efficient Proof-of-Work Scheme for Crypto-Currencies. ICMC 2021: 23-38 - [c109]Shramona Chakraborty, Soma Kundu, Dipanwita Roy Chowdhury:
Image Encryption with Parallel Evolution of 2-D Cellular Automata. ICMC 2021: 63-78 - 2020
- [c108]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
EnCash: an Authenticated Encryption scheme using Cellular Automata. ACRI 2020: 67-79 - [c107]Anindya Ganguly, Abhijit Das, Dipanwita Roy Chowdhury, Deval Mehta:
A Family of Subfield Hyperelliptic Curves for Use in Cryptography. ICICS 2020: 543-561 - [c106]Swapan Maiti, Dipanwita Roy Chowdhury:
Preventing Differential Fault Analysis Attack on AEGIS Family of Ciphers. ICMC 2020: 1-14
2010 – 2019
- 2019
- [j42]Dhiman Saha
, Sourya Kakarla
, Dipanwita Roy Chowdhury:
Dinamite: internal differential match-in-the-end attack on eight-round PAEQ. IET Inf. Secur. 13(4): 378-388 (2019) - [j41]Dhiman Saha
, Dipanwita Roy Chowdhury:
Internal differential fault analysis of parallelizable ciphers in the counter-mode. J. Cryptogr. Eng. 9(1): 53-67 (2019) - [c105]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
On the Security of the Double-Block-Length Hash Function NCASH. ATIS 2019: 266-278 - [c104]Amit Sardar, Bijoy Das, Dipanwita Roy Chowdhury:
An Efficient Hardware Design for Combined AES and AEGIS. EST 2019: 1-6 - [c103]Tapadyoti Banerjee, Bijoy Das, Deval Mehta, Dipanwita Roy Chowdhury:
RACE: Randomized Counter Mode of Authenticated Encryption using Cellular Automata. ICETE (2) 2019: 504-509 - [c102]Tanushree Haldar, Dipanwita Roy Chowdhury:
Design of Hash Function Using Two Dimensional Cellular Automata. ICMC 2019: 33-45 - [c101]Swapan Maiti, Dipanwita Roy Chowdhury:
Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction. ICMC 2019: 67-80 - [c100]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
NCASH: Nonlinear Cellular Automata-based Hash function. ICMC 2019: 111-123 - [c99]Debranjan Pal, Dishank Agrawal, Abhijit Das, Dipanwita Roy Chowdhury:
An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128. SPACE 2019: 106-122 - 2018
- [j40]Sandip Karmakar, Dipanwita Roy Chowdhury:
Design and Analysis of Some Cryptographically Robust Non-uniform Nonlinear Cellular Automata. J. Cell. Autom. 13(1-2): 145-158 (2018) - [j39]Sandip Karmakar, Dipanwita Roy Chowdhury:
Scan-based side channel attack on stream ciphers and its prevention. J. Cryptogr. Eng. 8(4): 327-340 (2018) - [c98]Swapan Maiti
, Dipanwita Roy Chowdhury:
Achieving Better Security Using Nonlinear Cellular Automata as a Cryptographic Primitive. ICMC 2018: 3-15 - 2017
- [j38]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing fault attacks using fault randomisation with a case study on AES. Int. J. Appl. Cryptogr. 3(3): 225-235 (2017) - [j37]Dhiman Saha
, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ. J. Hardw. Syst. Secur. 1(3): 282-296 (2017) - [j36]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. IACR Trans. Symmetric Cryptol. 2017(1): 240-258 (2017) - [c97]Swapan Maiti, Shamit Ghosh, Dipanwita Roy Chowdhury:
On the Security of Designing a Cellular Automata Based Stream Cipher. ACISP (2) 2017: 406-413 - [c96]Sourya Kakarla
, Srinath Mandava, Dhiman Saha, Dipanwita Roy Chowdhury:
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES. ATIS 2017: 58-72 - [c95]Swapan Maiti, Dipanwita Roy Chowdhury:
Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesis. ICMC 2017: 68-83 - [i13]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. IACR Cryptol. ePrint Arch. 2017: 165 (2017) - [i12]Anindya Shankar Bhandari, Dipanwita Roy Chowdhury:
ZETA: Towards Tagless Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 205 (2017) - 2016
- [j35]Jimmy Jose, Sourav Das, Dipanwita Roy Chowdhury:
Prevention of Fault Attacks in Cellular Automata Based Stream Ciphers. J. Cell. Autom. 12(1-2): 141-157 (2016) - [c94]Jimmy Jose
, Dipanwita Roy Chowdhury:
FResCA: A Fault-Resistant Cellular Automata Based Stream Cipher. ACRI 2016: 24-33 - [c93]Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. CHES 2016: 581-601 - [c92]Anindya Shankar Bhandari, Dipanwita Roy Chowdhury:
SCARAB: A continuous authentication scheme for biomedical application. PST 2016: 361-367 - [c91]Dhiman Saha, Sourya Kakarla
, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ. SPACE 2016: 194-210 - [i11]Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. IACR Cryptol. ePrint Arch. 2016: 623 (2016) - 2015
- [c90]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. ACISP 2015: 343-355 - [c89]Shamit Ghosh, Dipanwita Roy Chowdhury:
Preventing fault attack on stream cipher using randomization. HOST 2015: 88-91 - [c88]Dhiman Saha, Dipanwita Roy Chowdhury:
Diagonal fault analysis of Gr⊘stl in dedicated MAC mode. HOST 2015: 100-105 - [c87]Dhiman Saha, Dipanwita Roy Chowdhury:
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts. SAC 2015: 417-438 - [i10]Jimmy Jose, Dipanwita Roy Chowdhury:
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2015: 700 (2015) - 2014
- [j34]Sourav Das, Dipanwita Roy Chowdhury:
CASTREAM: A High-speed, Secure Stream Cipher Suitable for Both Hardware and Software. J. Cell. Autom. 9(2-3): 153-166 (2014) - [j33]Sandip Karmakar, Dipanwita Roy Chowdhury:
Leakage Squeezing Using Cellular Automata and Its Application to Scan Attack. J. Cell. Autom. 9(5-6): 417-436 (2014) - [j32]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
New algorithms for batch verification of standard ECDSA signatures. J. Cryptogr. Eng. 4(4): 237-258 (2014) - [c86]Shamit Ghosh, Abhrajit Sengupta, Dhiman Saha, Dipanwita Roy Chowdhury:
A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n - 1. ACRI 2014: 65-74 - [c85]Jimmy Jose
, Sourav Das, Dipanwita Roy Chowdhury:
Inapplicability of Fault Attacks against Trivium on a Cellular Automata Based Stream Cipher. ACRI 2014: 427-436 - [c84]Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry. AFRICACRYPT 2014: 88-108 - [c83]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
EscApe: Diagonal Fault Analysis of APE. INDOCRYPT 2014: 197-216 - [c82]Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
CASH: Cellular Automata Based Parameterized Hash. SPACE 2014: 59-75 - [c81]Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury:
AEC: A Practical Scheme for Authentication with Error Correction. SPACE 2014: 155-170 - [c80]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:
Randomized Batch Verification of Standard ECDSA Signatures. SPACE 2014: 237-255 - [i9]Sandip Karmakar, Dipanwita Roy Chowdhury:
Fault Analysis of Grain Family of Stream Ciphers. IACR Cryptol. ePrint Arch. 2014: 261 (2014) - [i8]Sandip Karmakar, Dipanwita Roy Chowdhury:
Differential Fault Analysis of MICKEY Family of Stream Ciphers. IACR Cryptol. ePrint Arch. 2014: 262 (2014) - [i7]Sandip Karmakar, Dipanwita Roy Chowdhury:
A Generic Scan Attack on Hardware based eStream Winners. IACR Cryptol. ePrint Arch. 2014: 263 (2014) - 2013
- [j31]Sourav Das, Dipanwita Roy Chowdhury:
CAR30: A new scalable stream cipher with rule 30. Cryptogr. Commun. 5(2): 137-162 (2013) - [j30]Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:
First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off. Int. J. Netw. Secur. 15(3): 219-230 (2013) - [j29]Jaydeb Bhaumik, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Rain: Reversible Addition with Increased Nonlinearity. Int. J. Netw. Secur. 15(4): 298-306 (2013) - [j28]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform. IEEE Trans. Very Large Scale Integr. Syst. 21(3): 434-442 (2013) - [c79]Sandip Karmakar, Dipanwita Roy Chowdhury:
Leakage Squeezing Using Cellular Automata. Automata 2013: 98-109 - [c78]Sandip Karmakar, Dipanwita Roy Chowdhury:
Differential Fault Analysis of MICKEY-128 2.0. FDTC 2013: 52-59 - 2012
- [j27]Sandip Karmakar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata. J. Cell. Autom. 7(2): 179-197 (2012) - [c77]Kaushik Chakraborty, Dipanwita Roy Chowdhury:
CSHR: Selection of Cryptographically Suitable Hybrid Cellular Automata Rule. ACRI 2012: 591-600 - [c76]Sourav Das, Dipanwita Roy Chowdhury:
CASTREAM: A New Stream Cipher Suitable for Both Hardware and Software. ACRI 2012: 601-610 - [c75]Sandip Karmakar, Dipanwita Roy Chowdhury:
Countermeasures of Side Channel Attacks on Symmetric Key Ciphers Using Cellular Automata. ACRI 2012: 623-632 - [c74]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
Batch Verification of ECDSA Signatures. AFRICACRYPT 2012: 1-18 - [c73]Anup Kumar Bhattacharya, Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer:
Use of SIMD Features to Speed up Eta Pairing. ICETE (Selected Papers) 2012: 137-154 - [c72]Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Aravind Iyer, Debojyoti Bhattacharya:
Autonomous Certification with List-Based Revocation for Secure V2V Communication. ICISS 2012: 208-222 - [c71]Santosh Ghosh, Ingrid Verbauwhede
, Dipanwita Roy Chowdhury:
Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform. Pairing 2012: 141-159 - [c70]Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer:
SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics. SECRYPT 2012: 94-101 - [c69]Arpan Mondal, Santosh Ghosh, Abhijit Das, Dipanwita Roy Chowdhury:
Efficient FPGA Implementation of Montgomery Multiplier Using DSP Blocks. VDAT 2012: 370-372 - [i6]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:
Using Randomizers for Batch Verification of ECDSA Signatures. IACR Cryptol. ePrint Arch. 2012: 582 (2012) - 2011
- [j26]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Fault Attack, Countermeasures on Pairing Based Cryptography. Int. J. Netw. Secur. 12(1): 21-28 (2011) - [j25]Sourav Das, Dipanwita Roy Chowdhury:
Cryptographically Suitable Maximum Length Cellular Automata. J. Cell. Autom. 6(6): 439-459 (2011) - [j24]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Parallel Efficient Architecture for Large Cryptographically Robust n × k (k>n/2) Mappings. IEEE Trans. Computers 60(3): 375-385 (2011) - [j23]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Petrel: Power and Timing Attack Resistant Elliptic Curve Scalar Multiplier Based on Programmable GF(p) Arithmetic Unit. IEEE Trans. Circuits Syst. I Regul. Pap. 58-I(8): 1798-1812 (2011) - [c68]Sandip Karmakar, Dipanwita Roy Chowdhury:
Fault Analysis of Grain-128 by Targeting NFSR. AFRICACRYPT 2011: 298-315 - [c67]Sandip Karmakar, Dipanwita Roy Chowdhury:
NOCAS : A Nonlinear Cellular Automata Based Stream Cipher. Automata 2011: 135-146 - [c66]Santosh Ghosh, Dipanwita Roy Chowdhury, Abhijit Das:
High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields. CHES 2011: 442-458 - [c65]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. INDOCRYPT 2011: 3-21 - [c64]Santosh Ghosh, Dipanwita Roy Chowdhury:
Security of Prime Field Pairing Cryptoprocessor against Differential Power Attack. InfoSecHiComNet 2011: 16-29 - [c63]Praloy Kr. Biswas, Dipanwita Roy Chowdhury, Kankar S. Dasgupta:
Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream Cipher. SECRYPT 2011: 414-417 - [i5]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack. IACR Cryptol. ePrint Arch. 2011: 181 (2011) - 2010
- [j22]Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
New Architectural Design of CA-Based Codec. IEEE Trans. Very Large Scale Integr. Syst. 18(7): 1139-1144 (2010) - [c62]Jaydeb Bhaumik, Dipanwita Roy Chowdhury, Indrajit Chakrabarti:
Null Boundary 90/150 Cellular Automata for Multi-byte Error Correcting Code. ACRI 2010: 231-240 - [c61]Sourav Das, Dipanwita Roy Chowdhury:
Generating Cryptographically Suitable Non-linear Maximum Length Cellular Automata. ACRI 2010: 241-250 - [c60]Sandip Karmakar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design. ACRI 2010: 261-270 - [c59]Sourav Das, Dipanwita Roy Chowdhury:
An Efficient, Parameterized and Scalable S-box for Stream Ciphers. Inscrypt 2010: 77-94 - [c58]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
High speed Fp multipliers and adders on FPGA platform. DASIP 2010: 21-26 - [c57]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
High Speed Flexible Pairing Cryptoprocessor on FPGA Platform. Pairing 2010: 450-466
2000 – 2009
- 2009
- [j21]Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta:
Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks. Comput. Electr. Eng. 35(2): 329-338 (2009) - [j20]Monjur Alam, Santosh Ghosh, M. J. Mohan, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Indranil Sengupta:
Effect of glitches against masked AES S-box implementation and countermeasure. IET Inf. Secur. 3(1): 34-44 (2009) - [j19]Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
An Integrated ECC-MAC Based on RS Code. Trans. Comput. Sci. 4: 117-135 (2009) - [c56]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
A Novel Seed Selection Algorithm for Test Time Reduction in BIST. Asian Test Symposium 2009: 15-20 - [c55]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
A hierarchical approach towards system level static timing verification of SoCs. ICCD 2009: 201-206 - [c54]Mounita Saha, Dipanwita Roy Chowdhury:
An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networks. ICETE (Selected Papers) 2009: 212-223 - [c53]Mounita Saha, Dipanwita Roy Chowdhury:
An Efficient Group Key Agreement Protocol for Heterogeneous Environment. SECRYPT 2009: 182-189 - [c52]Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
Nmix: An Ideal Candidate for Key Mixing. SECRYPT 2009: 285-288 - [c51]Mayank Varshney, Dipanwita Roy Chowdhury:
A New Image Encryption Algorithm using Cellular Automata. SECRYPT 2009: 289-292 - [i4]Mounita Saha, Dipanwita Roy Chowdhury:
A Secure and Efficient Protocol for Group Key agreement in Heterogeneous Environment. CoRR abs/0908.2509 (2009) - [i3]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Diagonal Fault Attack on the Advanced Encryption Standard. IACR Cryptol. ePrint Arch. 2009: 581 (2009) - 2008
- [j18]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Customizing Cellular Message Encryption Algorithm. Int. J. Netw. Secur. 7(2): 193-201 (2008) - [j17]Shiladitya Munshi, Nirmalya Sundar Maiti, Deepan Ray, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
An Analytical Framework for Characterizing Restricted Two Dimensional Cellular Automata Evolution. J. Cell. Autom. 3(4): 313-335 (2008) - [j16]Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury:
VLSI Architecture of a Cellular Automata based One-Way Function. J. Comput. 3(5): 46-53 (2008) - [c50]Sourav Das, Dipanwita Roy Chowdhury:
An Efficient n×nBoolean Mapping Using Additive Cellular Automata. ACRI 2008: 168-173 - [c49]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Chester Rebeiro
:
Theory of Composing Non-linear Machines with Predictable Cyclic Structures. ACRI 2008: 210-219 - [c48]Jaydeb Bhaumik, Dipanwita Roy Chowdhury, Indrajit Chakrabarti:
An Improved Double Byte Error Correcting Code Using Cellular Automata. ACRI 2008: 463-470 - [c47]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
coreBIST: A Cellular Automata Based Core for Self Testing System-on-Chips. ACRI 2008: 506-511 - [c46]Mounita Saha, Dipanwita Roy Chowdhury, Indranil Sengupta:
A secure verifiable key agreement protocol for mobile conferencing. COMSWARE 2008: 219-222 - [c45]Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta:
A GF(p) elliptic curve group operator resistant against side channel attacks. ACM Great Lakes Symposium on VLSI 2008: 53-58 - [c44]Jaydeb Bhaumik, Balaji Janakiram, Dipanwita Roy Chowdhury:
Architectural Design of CA-Based Double Byte Error Correcting Codec. ICIIS 2008: 1-6 - [c43]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
Raising the Level of Abstraction for the Timing Verification of System-on-Chips. ISVLSI 2008: 459-462 - [c42]Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:
Single Chip Encryptor/Decryptor Core Implementation of AES Algorithm. VLSI Design 2008: 693-698 - [e1]Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das:
Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings. Lecture Notes in Computer Science 5365, Springer 2008, ISBN 978-3-540-89753-8 [contents] - 2007
- [j15]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Theory of a Class of Complemented Group Cellular Automata and Its Application to Cryptography. J. Cell. Autom. 2(3): 243-271 (2007) - [j14]Shibaji Banerjee, Dipanwita Roy Chowdhury, Bhargab B. Bhattacharya:
An Efficient Scan Tree Design for Compact Test Pattern Set. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(7): 1331-1339 (2007) - [j13]Debdeep Mukhopadhyay, Gaurav Sengar, Dipanwita Roy Chowdhury:
Hierarchical Verification of Galois Field Circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(10): 1893-1898 (2007) - [j12]Gaurav Sengar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Secured Flipped Scan-Chain Model for Crypto-Architecture. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(11): 2080-2084 (2007) - [c41]Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury:
Strengthening NLS Against Crossword Puzzle Attack. ACISP 2007: 29-44 - [c40]Monjur Alam, Sonai Ray, Debdeep Mukhopadhyay, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:
An area optimized reconfigurable encryptor for AES-Rijndael. DATE 2007: 1116-1121 - [c39]Santosh Ghosh, Monjur Alam, Indranil Sengupta, Dipanwita Roy Chowdhury:
A Robust GF(p) Parallel Arithmetic Unit for Public Key Cryptography. DSD 2007: 109-115 - [c38]Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury:
A Near Optimal S-Box Design. ICISS 2007: 77-90 - [c37]Shiladitya Munshi, Nirmalya Sundar Maiti, Deepan Ray, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
An Analytical Framework for Characterizing Restricted Two Dimensional Cellular Automata Evolution. IICAI 2007: 1383-1402 - [c36]Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design of a Differential Power Analysis Resistant Masked AES S-Box. INDOCRYPT 2007: 373-383 - [c35]