Here you may find some of my selected publications. Please note that this list does not reflect my opinion about the quality of the conferences or journals. But rather it is a short list of my favorite research works, till date. The papers are arranged in reverse chronological order.

Journals

  1. Subidh Ali, Bodhisatwa Majumdar, Debdeep Mukhopadhyay, A Fault Analysis Perspective for Testing of Secured SoC Cores, Accepted for IEEE Design & Test.

  2. Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall, Differential fault analysis of AES: towards reaching its limits, Journal of Cryptographic Engineering, issn: 2190-8508, Springer, pp 1-25, 2012.

  3. Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury, ”Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform”, IEEE Transactions on VLSI Systems. 21(3): 434-442 (2013)

  4. Sezer Goren, Ozgur Ozkurt, Abdullah Yildiz, H. Fatih Ugurdag, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay, Partial Bitstream Protection for Low-cost FPGAs with PUFs, Obfuscation & DPSR-LD, accepted for publication in Computers and Electrical Engineering (Elsevier).

  5. Chester Rebeiro, Debdeep Mukhopadhyay, "Boosting Profiled Cache Timing Attacks With Apriori Analysis", IEEE TIFS, 7(6): 1900-1905 (2012).

  6. Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, "Theoretical Modeling of Elliptic Curve Scalar Multiplier on LUT Based FPGAs for Area & Speed", To appear in IEEE TVLSI, http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06213145

  7. Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay: Generalized high speed Itoh-Tsujii multiplicative inversion architecture for FPGAs. Integration 45(3): 307-315 (2012)

  8. Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury: Fault Attack, Countermeasures on Pairing Based Cryptography. I. J. Network Security 12(1): 21-28 (2011)

  9. Jaydeb Bhaumik, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury, "Rain: Reversible Addition with Increased Nonlinearity", Accepted in International Journal of Network Security.

  10. Sandip Karmakar, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury, "CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata", Journal of Cellular Automata 7(2): 179-197 (2012) (extended version of paper in Automata 2010).

  11. Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury: Petrel: Power and Timing Attack Resistant Elliptic Curve Scalar Multiplier Based on Programmable GF(p) Arithmetic Unit. IEEE Trans. on Circuits and Systems 58-I(8): 1798-1812 (2011)

  12. Chester Rebeiro, Sujoy Sinha Roy, Sankara Reddy and Debdeep Mukhopadhyay, "Revisiting the Itoh-Tsujii Inversion Algorithm for FPGA Platforms", IEEE Transactions on VLSI Systems, 19(8): 1508-1512 (2011).

  13. Debdeep Muhopadhyay and Dipanwita RoyChowdhury, "A Parallel Efficient Architecture for Large Cryptographically Robust n x k (k>n/2) Mappings", IEEE Transactions on Computers, 60(3): 375-385 (2011).

  14. Debdeep Mukhopadhyay, "Group Properties of Non-linear Cellular Automata", Journal of Cellular Automata (JCA), October, Vol. 5 issue 1, 2009, pp 139-155.

  15. M. Alam, S. Ghosh, M.J. Mohan, D. Mukhopadhyay, D.R. Chowdhury, and I.S. Gupta, "Effect of glitches against masked AES S-box implementation and countermeasure", IET Information Security, 3(1), 34-44 (2009)

  16. Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury: VLSI Architecture of a Cellular Automata based One-Way Function. Journal of Computers, 3(5): 46-53 (2008).

  17. G. Sengar, D. Mukhopadhyay and D.RoyChowdhury, "Secured Flipped Scan Chain Model for Crypto-architecture", IEEE Transactions on CAD, Nov 2007, Volume 26, Issue: 11 pp 2080-2084.

  18. D. Mukhopadhyay, G. Sengar and D.RoyChowdhury, "Hierarchical Verification of Galois Field Circuits", IEEE Transactions on CAD, Oct 2007, Volume 26, Issue 10, pp 1893-1898.

  19. D. Mukhopadhyay and D. RoyChowdhury, "Fault Based Attack on the Rijndael Cryptosystem", Journal of Discrete Mathematical Sciences & Cryptography, April 2007, Volume 10, Number 2, pp 267-290.

  20. D. Mukhopadhyay and D. RoyChowdhury, "Theory of a Class of Complemented Group Cellular Automata and its Application to Cryptography", Journal of Cellular Automata, Volume 2, Number 3, 2007, pp 243-271.

  21. S. Banerjee, D. Mukhopadhyay and D. RoyChowdhury, "A DFT Solution for Mixed Signal SOCs", IEEE Transactions on CAD, Volume 25, Issue 7, pp: 1368-1377, July 2006.

  22. D. Mukhopadhyay and D. RoyChowdhury, "Customizing Cellular Message Encryption Algorithm", International Journal of Network Security, Volume 7, No. 2, 2008, pp. 194-202.

Conferences

  1. Bodhisattwa Majumdar, Debdeep Mukhopadhyay, Indranil Sengupta: Design and Im- plementation of Rotation Symmetric S-boxes with High Nonlinearity and High DPA Resilience, to be published HOST 2013.

  2. Xinmu Wang, Debapriya Basu Roy, Saibal Mukhopadhyay, Debdeep Mukhopadhyay, and Swarup Bhunia, Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design, to appear in Design Automation Conference (DAC), 2013.

  3. Sagar Khurana, Souvik Kolay, Chester Rebeiro and Debdeep Mukhopadhyay, ”Lightweight Cipher Implementations on Embedded Processors”’, to be published in DTIS 2013.

  4. Sarani Bhattacharya, Chester Rebeiro and Debdeep Mukhopadhyay, Hardware Prefetch- ers Leak: A Revisit of SVF for Cache-Timing Attacks, Proceedings of Hardware and Architectural Support for Security and Privacy, Co-held with MICRO’12.

  5. Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay and Huaxiong Wang, Improved Differential Cache Trace Attacks on SMS4, Proceedings of Inscrypt 2012.

  6. Sk Subidh Ali and Debdeep Mukhopadhyay, Differential Fault Analysis of Twofish, Proceedings of Inscrypt 2012.

  7. Debdeep Mukhopadhyay: Generating Expander Graphs using Cellular Automata, Accepted in ACRI 2012.

  8. Sujoy Sinha Roy, Chester Rebeiro and Debdeep Mukhopadhyay: A Parallel Architecture for Koblitz Curve Scalar Multiplications on FPGA Platforms. Accepted in DSD 2012.

  9. Chester Rebeiro, Sujoy Sinha Roy, Debdeep Mukhopadhyay: Pushing the Limits of High-Speed GF(2^m) Elliptic Curve Scalar Multiplication on FPGAs. Lecture Notes in Computer Science 7428, 494-511, CHES 2012.

  10. Sanjay Burman, Ayan Palchaudhuri, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Pranav Singh: Effect of Malicious Hardware Logic on Circuit Reliability. VDAT 2012: 190-197.

  11. Bodhisattwa Majumdar, Debdeep Mukhopadhyay, Indranil Sengupta: Design for Security of Block Cipher S-Boxes to Resist Differential Power Attacks. VLSID 2012, Hyderabad (best students paper award).

  12. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, "Testability of Cryptographic Hardware and Detection of Hardware Trojans", IEEE Asian Test Symposium (ATS), Nov. 2011, New Delhi, India (Invited Paper).

  13. Chester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay: An enhanced differential cache attack on CLEFIA for large cache lines, To appear in INDOCRYPT 2011.

  14. Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury: PKDPA: an enhanced probabilistic differential power attack methodology, To appear in INDOCRYPT 2011.

  15. Sk. Subidh Ali, and Debdeep Mukhopadhyay, " A Differential Fault Analysis on AES Key Schedule using Single Muli-Byte Fault", In the proceeding of CARDIS 2011, Leuven, Belgium, September 14-16, 2011 LNCS.

  16. Sk. Subidh Ali, and Debdeep Mukhopadhyay, " A Differential Fault Analysis on AES Key Schedule using Single Fault", In the proceeding of FDTC 2011, Nara, Japan, September 28, 2011 IEEE Computer Society 2011.

  17. Subidh Ali, Debdeep Mukhopadhyay: An Improved Differential Fault Analysis on AES-256. AFRICACRYPT 2011: , , LNCS 6737, 332-347, Senegal.

  18. Michael Tunstall, Debdeep Mukhopadhyay, and Sk. Subidh Ali, "Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault", Proceedings of WISTP 2011, LNCS 6633, Greece.

  19. Sujoy Roy, Chester Rebeiro and Debdeep Mukhopadhyay, "Accelerating Itoh-Tsujii Multiplicative Inversion Algorithm for FPGAs", Proceedings of GLS-VLSI 2011, EPFL, Lausanne, Switzerland.

  20. Sujoy Roy, Chester Rebeiro and Debdeep Mukhopadhyay, "Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-LUT based FPGAs", Proceedings of DATE 2011, Grenoble, France.

  21. Subidh Ali, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay and Swarup Bhunia, "Multi-level Attack: an Emerging Threat Model for Cryptographic Hardware", Proceedings of DATE 2011, Grenoble, France.

  22. Chester Rebeiro and Debdeep Mukhopadhyay, "Cryptanalysis of CLEFIA using Differential Methods with Cache Trace Patterns", Proceedings of CT-RSA 2011, LNCS 6558, San Francisco, USA.

  23. Mainack Mondal, Avik Chakraborti, Nilanjan Datta and Debdeep Mukhopadhyay, "TweLEX: A Tweaked Version of the LEX Stream Cipher", 5th Benelux Workshop on Information and System Security (Wissec), November 29-30, 2010, Nijmegen, the Netherlands.

  24. Santosh Ghosh, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury, "High Speed Flexible Pairing Cryptoprocessor on FPGA Platform", In the Proceedings of 4th International Conference on Pairing-based Cryptography (Pairing 2010), Yamanaka Hot Spring, Japan, December 13-15, 2010.

  25. Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury. High Speed Fp Multipliers and Adders on FPGA Platform. DASIP 2010, Edinburgh, Scotland, October 2010.

  26. Sandip Karmakar, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury, "d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design"', In the Proceedings of 9th International Conference on Cellular Automata for Research and Industry (ACRI), 2010.

  27. Sandip Karmakar, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury "CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata", In the Proceedings of Automata 2010, Nancy, France.

  28. Dibyendu Mallik and Debdeep Mukhopadhyay, "New Pseudo Near Collision on Tiger", In the Proceedings of International Conference on Security and Cryptography, Secrypt 2010, Athens, Greece.

  29. Chester Rebeiro, Mainack Mandal and Debdeep Mukhopadhyay, "Pinpointing Cache Timing Attacks on AES", In the Proceedings of 23rd International Conference on VLSI Design and 9th International Conference on Embedded Systems, VLSID 2010, pp. 306-311, Bangalore, India.

  30. Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga, "Cache Timing Attacks on Clefia", Proceedings of INDOCRYPT 2009: pp. 104-118, LNCS 5922 Springer 2009.

  31. Debdeep Mukhopadhyay, "A New Fault Attack on the Advanced Encryption Standard Hardware", 16th IEEE Europeon Conference on Circuit Theory and Design, ECCTD 2009, Antalya, Turkey ( Invited Paper ).

  32. Debdeep Mukhopadhyay, "An Improved Fault Based Attack of the Advanced Encryption Standard", In the Proceedings of 2nd African International Conference on Cryptology, AFRICACRYPT 2009, Gammarth-Tunisia, 421-434, LNCS.

  33. Ankur Sharma and Debdeep Mukhopadhyay, "Performance Evaluation of an Efficient Boolean Function Generator for Cryptographic Applications", In the Proceedings of 12th IEEE VLSI Design And Test Symposium, VDAT 2009, Bangalore, India

  34. Chester Rebeiro, Debdeep Mukhopadhyay, "High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms", In the Proceedings of 9th International Conference on Cryptology in India, INDOCRYPT 2008, Kharagpur, 376-388, LNCS.

  35. Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay, "Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures", In the Proceedings of 9th International Conference on Cryptology in India, INDOCRYPT 2008, Kharagpur, 226-238, LNCS.

  36. Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Chester Rebeiro, "Theory of Composing Non-linear Machines with Predictable Cyclic Structures", In the Proceedings of 8th International Conference on Cellular Automata for Research and Industry (ACRI), Japan, 210-219, Springer, LNCS (2008)

  37. Chester Rebeiro and Debdeep Mukhopadhyay, "High Performance Elliptic Curve Crypto-processor for FPGA Platforms", In the Proceedings of 12th IEEE VLSI Design And Test Symposium, VDAT 2008, Bangalore, India

  38. C. Rebeiro and D. Mukhopadhyay, "Power Attack Resistant Efficient FPGA Architecture for Karatsuba Multiplier", In the Proceedings of 21st IEEE Conference on VLSI Design 2008, pp 706-711.

  39. S. Burman, D. Mukhopadhyay and V. Kamakoti, "LFSR Based Stream Ciphers are vulnerable to Power Attacks", In the Proceedings of 8th International Conference on Cryptology in India, INDOCRYPT 2007, pp 384-392.

  40. K. Kumar, D. Mukhopadhyay and D. RoyChowdhury, "Design of a Differential Power Analysis Resistant AES S-Box", In the Proceedings of 8th International Conference on Cryptology in India, INDOCRYPT 2007, pp 373-383.

  41. Gaurav Sengar,Debdeep Mukhopadhyay,D. Roy Chowdhury, "An Efficient Approach to Develop Secure Scan Tree for Crypto-Hardware", In the Proceedings of 15th International Conference on Advanced Computing & Communication, ADCOM 2007, pp. 21-26, 18 - 21 December, 2007, IIT Guwahati, India.

  42. C. Rebeiro and D.Mukhopadhyay, "Hybrid Masked Karatsuba Multiplier for GF(2^{233})", In the Proceedings of the 11th IEEE VLSI Design And Test Symposium, pp 379-387, August 8-11, 2007, Calcutta, India.

  43. D.Bhattacharya, D.Mukhopadhyay, D.Saha and D.RoyChowdhury, "Strengthening NLS against Crossword Puzzle Attack", Accepted in 12th Australasian Conference on Information Security and Privacy (ACISP), James Cook University, Townsville, Queensland, Australia, July 2-4, 2007, ACISP 07.

  44. M. Alam, S. Ray, D. Mukhopadhayay, D. RoyChowdhury and I. Sengupta, "An Area optimized Reconfigurable Encryptor for AES-Rijndael", In the Proceedings of DATE 2007, Design, Automation and Test in Europe, DATE 2007, 16-20 April, Acropolis, Nice, France

  45. M. Alam, S. Ray, D. Mukhopadhayay, D. RoyChowdhury and I. Sengupta, "An Efficient Reconfigurable Encryptor for AES-Rijndael with S-box Optimization", In the Proceedings of FPGA 2007, Fifteenth ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Monterey Beach Resort Monterey, California, February 18-20, 2007.

  46. D. Mukhopadhyay, P. Joshi and D.RoyChowdhury, "An Efficient Design of Cellular Automata based Cryptographically Robust One-Way Function", In the Proceedings of 20th International Conference on VLSI Design, 2007.

  47. D. Mukhopadhyay and D. RoyChowdhury, "Key Mixing in Block Ciphers through Addition Modulo 2^n, In the Proceedings of National Workshop in Cryptology, 2006, India.

  48. D. Mukhopadhyay and D. RoyChowdhury, "Generation of Expander Graphs Using Cellular Automata and its Applications to Cryptography", In the Proceedings of the 7th International Conference on Cellular Automata for Research and Industry (ACRI 2006), 20-23 September 2006, Perpignan, France.

  49. D. Bhattacharya, D. Mukhopadhyay and D. RoyChowdhury, "A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and its Application to RS-coded MPSK Modulation", In the Proceedings of the 7th International Conference on Cellular Automata for Research and Industry (ACRI 2006), 20-23 September 2006, Perpignan, France

  50. P. Joshi, D. Mukhopadhyay and D. RoyChowdhury, "Design and Analysis of a Robust and Efficient Block Cipher Using Cellular Automata", In the Proceedings of the 20th International Conference on Advanced Networking and Applications (AINA'06), volume 2, pp 67-71, April 18-20, Vienna, Austria.

  51. D. Mukhopadhyay, A. Chaudhury, A. Nebhnani and D. RoyChowdhury, "CCMEA : Customized Cellular Message Encryption Algorithm for Wireless Networks", In the Proceedings of International Conference on Information Systems Security (ICISS 2005), LNCS 3803 pp 217-227, December 19-21, Kolkata, India.

  52. D. Mukhopadhyay, S. Banerjee, D. RoyChowdhury and B. Bhattacharya, "CryptoScan: A Secured Scan Chain Architecture", In the Proceedings of Asian Test Symposium 2005, pp 348-353, December 18-21, Kolkata, India.

  53. D. Mukhopadhyay and D. RoyChowdhury, "Programmable Galois Multiplier Using Cellular Automaton", 9th VLSI Design and Test Symposium (VDAT 2005), pp 169-176, Bangalore, India.

  54. D. Mukhopadhyay and D. RoyChowdhury, "An Efficient End to End Design of Rijndael Cryptosystem in 0.18 mu CMOS", in the Proceedings of the 18th International Conference on VLSI Design 2005 jointly held with 4th International Conference on Embedded Systems Design, pp 405-410, Kolkata, India.

  55. S. Banerjee, D. Mukhopadhyay and D. RoyChowdhury, "Computer Aided Test (CAT) Tool for Mixed Siganal SOCs", in the Proceedings of the comming 18th International Conference on VLSI Design 2005, pp 787-790, Kolkata, India.

  56. D. Mukhopadhyay and D. RoyChowdhury, "Cellular Automata : An Ideal Candidate for a Block Cipher", 1st International Conference on Distributed Computing and Internet Technology (ICDCIT 2004), Lecture Notes in Computer Science, 3347, pp 452-457, Bhuvaneshwar, India.

  57. D. Mukhopadhyay and D. RoyChowdhury, "Characterization of a Class of Complemented Group Cellular Automata", 6th International Conference on Cellular Automata for Research and Industry, ACRI'04, Lecture Notes in Computer Science, 3305, pp 775-784, Amsterdam, The Netherlands.

  58. S. Banerjee, D. Mukhopadhyay and D. RoyChowdhury, "Best Repair: An Efficient Reconfiguration for RRAM", in the Proceedings of the IEEE Indicon 2004, pp 423-426, Kharagpur, India.

  59. C. V. Guru Rao and D. Mukhopadhyay and D. Roy Chowdhury, "A New Strategy and Design For Mixed signal SOC Testing", In the digest of the papers of 4th International Workshop on RTL and High Level Testing (WRTLT'03) in conjunction with Asian Test Symposium 2003 at Xi'an, P.R.China, November 20-21, 2003.

  60. S.Basu, D. Mukhopadhyay, Dipanwita Roychoudhury, Indranil Sengupta, Sudipta Bhawmik, "Reformatting Test Patterns for Embedded Core Based Systems Using Test Access Mechanism (TAM) Switch", Proceedings of International Conference on ASP-DAC and VLSI Design 2002, pp 598-603, Bangalore, India.

Books

  1. B. Forouzan, D. Mukhopadhyay, "Cryptography and Network Security e/2", Tata-McGraw Hill