Research
Members
Secured Embedded Architecture Laboratory
Students |
Research Topic |
Dr. Phuong Ha Nguyen (PDF) | Design and Analysis of Physically Unclonable Functions |
Dr. Praveen Kumar Vadnala (PDF) | Securing Implementations of Cryptographic Algorithms against Side-channel Attacks |
Dr. Radhamanajari Samanta (PDF) | ASIC Implementation of Hardware Crypto Architecture |
Dr. Prabhat Kumar Kushwaha (PDF) | Elliptic Curve Cryptography, Blockchain |
Dr. Nilajan Datta (PDF) | |
Durga Prasad Sahoo (PhD) | Design and Analysis of Physically Unclonable Functions |
Anju P Johnson (PhD) | Hardware Trojan Attacks on FPGA Based Embedded Systems and their Mitigation. |
Debapriya Basu Roy (PhD) | Hardware security, Side Channel Analysis, FPGA Based Systems Design, Design and Implementation of Elliptic Curve |
Sarani Bhattacharya (PhD) | Micro-Architectural Leakage Analysis on Cryptographic Algorithmic Implementations |
Urbi Chatterjee (PhD) | PUF based Light weight Protocol Design |
Sikhar Patranabis(PhD) | Fault Analysis, Light weight Crypto-Systems, Pairing based Cryptosystems |
Sayandeep Saha (PhD) | Fault Analysis and Formal Method |
Manaar Alam (PhD) | Design and Analysis of Robust Machine Learning in the Context of Computer Security |
Arnab Bag (PhD) | Hardware Security, Encrypted Domain Computation |
Harishma Boyapally (PhD) | Building authentication and key exchange protocols for smart power grid systems |
Balija V. Sreekanth (PhD) | VLSI Design for Hardware Security |
Pranesh Santikellur (PhD) | Network Security |
Diangarti Tariang (PhD) | Digital Image Forensics |
Durba Chatterjee (PhD) | Learnability of PUFs |
Rajat Sadhukhan (PhD) | |
Brojo Gopal Sapui (PhD) | Hardware Design of Secured PUFs |
Anirban Chakraborty (PhD) | Symmetric Key Cryptography |
Arnabi Bej (PhD) | Design and Analysis of TRNGs, evaluation of statistical randomness of TRNGs |
Paulson Mathew (PhD) | Smart Grid Security |
Pragnya Sahu (PhD) | Authentication protocols and key exchange protocol for IoT devices,cyber security |
Akashdeep Saha (PhD) | Hardware Obfuscation |
Siddhartha Chowdhury (PhD) | Light weight Elliptic Curve Cryptography |
Siddhartha Chowdhury (PhD) | Light weight Elliptic Curve Cryptography |
Souvik Sonar (PhD) | ( ) |
Abhishek Chakraborty(MS) | Power and Fault Analysis Attacks on Symmetric Key Ciphers. |
Poulami Das (MS) | Study of Elliptic Curve Cryptography, Design of Side Channel Countermeasures, Efficient Implementations of elliptic curves |
Aniket Roy (MS) | Reversible Image Watermarking, Parallel Processing |
Anavar Khan (MTech) | Implementing Cryptographic Software throgh NACL Library |
Boopal Sridhar N (MTech) | Steganography and Steganalysis in Digital Images |
Aditya Kumar Chaudhary (MTech) | ( ) |
Yash Shrivasatava(UG) | ( ) |
Tanujoy Saha(UG) | ( ) |