Conferences

    2002-till date

  1. Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen: A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security. IACR Cryptol. ePrint Arch. 2016: 1031 (2016)
  2. Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty: Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse. IACR Cryptol. ePrint Arch. 2016: 1149 (2016)
  3. Debapriya Basu Roy, Shivam Bhasin, Sikhar Patranabis, Debdeep Mukhopadhyay, Sylvain Guilley: What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate. IACR Cryptol. ePrint Arch. 2016: 1152 (2016)
  4. Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers. Cryptogr. Commun. 7(1): 35-69 (2015)
  5. Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri: Security analysis of concurrent error detection against differential fault analysis. J. Cryptogr. Eng. 5(3): 153-169 (2015)
  6. Chester Rebeiro, Debdeep Mukhopadhyay: Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation. IEEE Trans. Computers 64(3): 778-790 (2015)
  7. Suvadeep Hajra, Debdeep Mukhopadhyay:Reaching the Limit of Nonprofiling DPA. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 915-927 (2015)
  8. Durga Prasad Sahoo, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
    A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8): 1334-1343 (2015)
  9. Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:A PUF-Enabled Secure Architecture for FPGA-Based IoT Applications. IEEE Trans. Multi Scale Comput. Syst. 1(2): 110-122 (2015)
  10. Sarani Bhattacharya, Debdeep Mukhopadhyay: Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms. CHES 2015: 248-266
  11. Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay:Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability. CHES 2015: 577-596
  12. Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen, Debdeep Mukhopadhyay: A Biased Fault Attack on the Time Redundancy Countermeasure for AES,(COSADE) 2015: 189-203.
  13. Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay: Improved practical differential fault analysis of grain-128,(DATE) 2015: 459-464.
  14. Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay: Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set, (DATE) 2015: 641-646.
  15. Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay: A practical DPA on Grain v1 using LS-SVM, (HOST) 2015: 44-47.
  16. Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen, Durga Prasad Sahoo: Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things. VLSI Design 2015.
  17. Bodhisattwa Majumdar, Debdeep Mukhopadhyay, Indranil Sengupta: Design and Im- plementation of Rotation Symmetric S-boxes with High Nonlinearity and High DPA Resilience, to be published HOST 2013.
  18. Xinmu Wang, Debapriya Basu Roy, Saibal Mukhopadhyay, Debdeep Mukhopadhyay, and Swarup Bhunia, Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design, to appear in Design Automation Conference (DAC), 2013.
  19. Sagar Khurana, Souvik Kolay, Chester Rebeiro and Debdeep Mukhopadhyay, ”Lightweight Cipher Implementations on Embedded Processors”’, to be published in DTIS 2013.
  20. Sarani Bhattacharya, Chester Rebeiro and Debdeep Mukhopadhyay, Hardware Prefetch- ers Leak: A Revisit of SVF for Cache-Timing Attacks, Proceedings of Hardware and Architectural Support for Security and Privacy, Co-held with (MICRO’12)2012 .
  21. Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay and Huaxiong Wang, Improved Differential Cache Trace Attacks on SMS4, Proceedings of Inscrypt 2012.
  22. Sk Subidh Ali and Debdeep Mukhopadhyay, Differential Fault Analysis of Twofish, Proceedings of Inscrypt 2012.
  23. Debdeep Mukhopadhyay: Generating Expander Graphs using Cellular Automata, Accepted in ACRI(ACRI) 2012.
  24. Sujoy Sinha Roy, Chester Rebeiro and Debdeep Mukhopadhyay: A Parallel Architecture for Koblitz Curve Scalar Multiplications on FPGA Platforms. Accepted in DSD 2012.
  25. Chester Rebeiro, Sujoy Sinha Roy, Debdeep Mukhopadhyay: Pushing the Limits of High-Speed GF(2^m) Elliptic Curve Scalar Multiplication on FPGAs. Lecture Notes in Computer Science 7428, 494-511, CHES 2012.
  26. Sanjay Burman, Ayan Palchaudhuri, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Pranav Singh: Effect of Malicious Hardware Logic on Circuit Reliability. VDAT 2012: 190-197.
  27. Bodhisattwa Majumdar, Debdeep Mukhopadhyay, Indranil Sengupta: Design for Security of Block Cipher S-Boxes to Resist Differential Power Attacks. VLSID 2012, Hyderabad (best students paper award).
  28. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, “Testability of Cryptographic Hardware and Detection of Hardware Trojans”, IEEE Asian Test Symposium (ATS), Nov. 2011, New Delhi, India (Invited Paper).
  29. Chester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay: An enhanced differential cache attack on CLEFIA for large cache lines, To appear in INDOCRYPT 2011.
  30. Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury: PKDPA: an enhanced probabilistic differential power attack methodology, To appear in INDOCRYPT 2011.
  31. Sk. Subidh Ali, and Debdeep Mukhopadhyay, ” A Differential Fault Analysis on AES Key Schedule using Single Muli-Byte Fault”, In the proceeding of CARDIS 2011, Leuven, Belgium, September 14-16, 2011 LNCS.
  32. Sk. Subidh Ali, and Debdeep Mukhopadhyay, ” A Differential Fault Analysis on AES Key Schedule using Single Fault”, In the proceeding of FDTC 2011, Nara, Japan, September 28, 2011 IEEE Computer Society 2011.
  33. Subidh Ali, Debdeep Mukhopadhyay: An Improved Differential Fault Analysis on AES-256. AFRICACRYPT 2011: , , LNCS 6737, 332-347, Senegal.
  34. Michael Tunstall, Debdeep Mukhopadhyay, and Sk. Subidh Ali, “Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault”, Proceedings of WISTP 2011, LNCS 6633, Greece.
  35. Sujoy Roy, Chester Rebeiro and Debdeep Mukhopadhyay, “Accelerating Itoh-Tsujii Multiplicative Inversion Algorithm for FPGAs”, Proceedings of GLS-VLSI 2011, EPFL, Lausanne, Switzerland.
  36. Sujoy Roy, Chester Rebeiro and Debdeep Mukhopadhyay, “Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-LUT based FPGAs”, Proceedings of DATE 2011, Grenoble, France.
  37. Subidh Ali, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay and Swarup Bhunia, “Multi-level Attack: an Emerging Threat Model for Cryptographic Hardware”, Proceedings of DATE 2011, Grenoble, France.
  38. Chester Rebeiro and Debdeep Mukhopadhyay, “Cryptanalysis of CLEFIA using Differential Methods with Cache Trace Patterns”, Proceedings of CT-RSA 2011, LNCS 6558, San Francisco, USA.
  39. Mainack Mondal, Avik Chakraborti, Nilanjan Datta and Debdeep Mukhopadhyay, “TweLEX: A Tweaked Version of the LEX Stream Cipher”, 5th Benelux Workshop on Information and System Security (Wissec), November 29-30, 2010, Nijmegen, the Netherlands.
  40. Santosh Ghosh, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury, “High Speed Flexible Pairing Cryptoprocessor on FPGA Platform”, In the Proceedings of 4th International Conference on Pairing-based Cryptography (Pairing 2010), Yamanaka Hot Spring, Japan, December 13-15, 2010.
  41. Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury. High Speed Fp Multipliers and Adders on FPGA Platform. DASIP 2010, Edinburgh, Scotland, October 2010.
  42. Sandip Karmakar, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury, “d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design”‘, In the Proceedings of 9th International Conference on Cellular Automata for Research and Industry (ACRI), 2010.
  43. Sandip Karmakar, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury “CAvium – Strengthening Trivium Stream Cipher Using Cellular Automata”, In the Proceedings of Automata 2010, Nancy, France.
  44. Dibyendu Mallik and Debdeep Mukhopadhyay, “New Pseudo Near Collision on Tiger”, In the Proceedings of International Conference on Security and Cryptography, Secrypt 2010, Athens, Greece.
  45. Chester Rebeiro, Mainack Mandal and Debdeep Mukhopadhyay, “Pinpointing Cache Timing Attacks on AES”, In the Proceedings of 23rd International Conference on VLSI Design and 9th International Conference on Embedded Systems, VLSID 2010, pp. 306-311, Bangalore, India.
  46. Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga, “Cache Timing Attacks on Clefia”, Proceedings of INDOCRYPT 2009: pp. 104-118, LNCS 5922 Springer 2009.
  47. Debdeep Mukhopadhyay, “A New Fault Attack on the Advanced Encryption Standard Hardware”, 16th IEEE Europeon Conference on Circuit Theory and Design, ECCTD 2009, Antalya, Turkey ( Invited Paper ).
  48. Debdeep Mukhopadhyay, “An Improved Fault Based Attack of the Advanced Encryption Standard”, In the Proceedings of 2nd African International Conference on Cryptology, AFRICACRYPT 2009, Gammarth-Tunisia, 421-434, LNCS.
  49. Ankur Sharma and Debdeep Mukhopadhyay, “Performance Evaluation of an Efficient Boolean Function Generator for Cryptographic Applications”, In the Proceedings of 12th IEEE VLSI Design And Test Symposium, VDAT 2009, Bangalore, India
  50. Chester Rebeiro, Debdeep Mukhopadhyay, “High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms”, In the Proceedings of 9th International Conference on Cryptology in India, INDOCRYPT 2008, Kharagpur, 376-388, LNCS.
  51. Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay, “Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures”, In the Proceedings of 9th International Conference on Cryptology in India, INDOCRYPT 2008, Kharagpur, 226-238, LNCS.
  52. Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Chester Rebeiro, “Theory of Composing Non-linear Machines with Predictable Cyclic Structures”, In the Proceedings of 8th International Conference on Cellular Automata for Research and Industry (ACRI), Japan, 210-219, Springer, LNCS (2008)
  53. Chester Rebeiro and Debdeep Mukhopadhyay, “High Performance Elliptic Curve Crypto-processor for FPGA Platforms”, In the Proceedings of 12th IEEE VLSI Design And Test Symposium, VDAT 2008, Bangalore, India
  54. C. Rebeiro and D. Mukhopadhyay, “Power Attack Resistant Efficient FPGA Architecture for Karatsuba Multiplier”, In the Proceedings of 21st IEEE Conference on VLSI Design 2008, pp 706-711.
  55. S. Burman, D. Mukhopadhyay and V. Kamakoti, “LFSR Based Stream Ciphers are vulnerable to Power Attacks”, In the Proceedings of 8th International Conference on Cryptology in India, INDOCRYPT 2007, pp 384-392.
  56. K. Kumar, D. Mukhopadhyay and D. RoyChowdhury, “Design of a Differential Power Analysis Resistant AES S-Box”, In the Proceedings of 8th International Conference on Cryptology in India, INDOCRYPT 2007, pp 373-383.
  57. Gaurav Sengar,Debdeep Mukhopadhyay,D. Roy Chowdhury, “An Efficient Approach to Develop Secure Scan Tree for Crypto-Hardware”, In the Proceedings of 15th International Conference on Advanced Computing & Communication, ADCOM 2007, pp. 21-26, 18 – 21 December, 2007, IIT Guwahati, India.
  58. C. Rebeiro and D.Mukhopadhyay, “Hybrid Masked Karatsuba Multiplier for GF(2^{233})”, In the Proceedings of the 11th IEEE VLSI Design And Test Symposium, pp 379-387, August 8-11, 2007, Calcutta, India.
  59. D.Bhattacharya, D.Mukhopadhyay, D.Saha and D.RoyChowdhury, “Strengthening NLS against Crossword Puzzle Attack”, Accepted in 12th Australasian Conference on Information Security and Privacy (ACISP), James Cook University, Townsville, Queensland, Australia, July 2-4, 2007, ACISP 07.
  60. M. Alam, S. Ray, D. Mukhopadhayay, D. RoyChowdhury and I. Sengupta, “An Area optimized Reconfigurable Encryptor for AES-Rijndael”, In the Proceedings of DATE 2007, Design, Automation and Test in Europe, DATE 2007, 16-20 April, Acropolis, Nice, France
  61. M. Alam, S. Ray, D. Mukhopadhayay, D. RoyChowdhury and I. Sengupta, “An Efficient Reconfigurable Encryptor for AES-Rijndael with S-box Optimization”, In the Proceedings of FPGA 2007, Fifteenth ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Monterey Beach Resort Monterey, California, February 18-20, 2007.
  62. D. Mukhopadhyay, P. Joshi and D.RoyChowdhury, “An Efficient Design of Cellular Automata based Cryptographically Robust One-Way Function”, In the Proceedings of 20th International Conference on VLSI Design, 2007.
  63. D. Mukhopadhyay and D. RoyChowdhury, “Key Mixing in Block Ciphers through Addition Modulo 2^n, In the Proceedings of National Workshop in Cryptology, 2006, India.
  64. D. Mukhopadhyay and D. RoyChowdhury, “Generation of Expander Graphs Using Cellular Automata and its Applications to Cryptography”, In the Proceedings of the 7th International Conference on Cellular Automata for Research and Industry (ACRI 2006), 20-23 September 2006, Perpignan, France.
  65. D. Bhattacharya, D. Mukhopadhyay and D. RoyChowdhury, “A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and its Application to RS-coded MPSK Modulation”, In the Proceedings of the 7th International Conference on Cellular Automata for Research and Industry (ACRI 2006), 20-23 September 2006, Perpignan, France
  66. P. Joshi, D. Mukhopadhyay and D. RoyChowdhury, “Design and Analysis of a Robust and Efficient Block Cipher Using Cellular Automata”, In the Proceedings of the 20th International Conference on Advanced Networking and Applications (AINA’06), volume 2, pp 67-71, April 18-20, Vienna, Austria.
  67. D. Mukhopadhyay, A. Chaudhury, A. Nebhnani and D. RoyChowdhury, “CCMEA : Customized Cellular Message Encryption Algorithm for Wireless Networks”, In the Proceedings of International Conference on Information Systems Security (ICISS 2005), LNCS 3803 pp 217-227, December 19-21, Kolkata, India.
  68. D. Mukhopadhyay, S. Banerjee, D. RoyChowdhury and B. Bhattacharya, “CryptoScan: A Secured Scan Chain Architecture”, In the Proceedings of Asian Test Symposium 2005, pp 348-353, December 18-21, Kolkata, India.
  69. D. Mukhopadhyay and D. RoyChowdhury, “Programmable Galois Multiplier Using Cellular Automaton”, 9th VLSI Design and Test Symposium (VDAT 2005), pp 169-176, Bangalore, India.
  70. D. Mukhopadhyay and D. RoyChowdhury, “An Efficient End to End Design of Rijndael Cryptosystem in 0.18 mu CMOS”, in the Proceedings of the 18th International Conference on VLSI Design 2005 jointly held with 4th International Conference on Embedded Systems Design, pp 405-410, Kolkata, India.
  71. S. Banerjee, D. Mukhopadhyay and D. RoyChowdhury, “Computer Aided Test (CAT) Tool for Mixed Siganal SOCs”, in the Proceedings of the comming 18th International Conference on VLSI Design 2005, pp 787-790, Kolkata, India.
  72. D. Mukhopadhyay and D. RoyChowdhury, “Cellular Automata : An Ideal Candidate for a Block Cipher”, 1st International Conference on Distributed Computing and Internet Technology (ICDCIT 2004), Lecture Notes in Computer Science, 3347, pp 452-457, Bhuvaneshwar, India.
  73. D. Mukhopadhyay and D. RoyChowdhury, “Characterization of a Class of Complemented Group Cellular Automata”, 6th International Conference on Cellular Automata for Research and Industry, ACRI’04, Lecture Notes in Computer Science, 3305, pp 775-784, Amsterdam, The Netherlands.
  74. S. Banerjee, D. Mukhopadhyay and D. RoyChowdhury, “Best Repair: An Efficient Reconfiguration for RRAM”, in the Proceedings of the IEEE Indicon 2004, pp 423-426, Kharagpur, India.
  75. C. V. Guru Rao and D. Mukhopadhyay and D. Roy Chowdhury, “A New Strategy and Design For Mixed signal SOC Testing”, In the digest of the papers of 4th International Workshop on RTL and High Level Testing (WRTLT’03) in conjunction with Asian Test Symposium 2003 at Xi’an, P.R.China, November 20-21, 2003.
  76. S.Basu, D. Mukhopadhyay, Dipanwita Roychoudhury, Indranil Sengupta, Sudipta Bhawmik, “Reformatting Test Patterns for Embedded Core Based Systems Using Test Access Mechanism (TAM) Switch”, Proceedings of International Conference on ASP-DAC and VLSI Design 2002, pp 598-603, Bangalore, India.
  77. [Best Poster Award]  Ayan Palchaudhuri and Rajat Subhra Chakraborty, “Architecture and Design Automation of High Performance Arithmetic Architectures on FPGAs (poster)”, accepted in the International Conference on VLSI Design (VLSID)2015, Bangalore, India.
  78.  Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay, Cryptanalysis of Robust Ring Oscillator PUF with Enhanced Challenge-Response Set”, accepted in Design, Automation and Test in Europe (DATE) 2014, Grenoble, France.
  79. [Best Poster Award]  Ayan Palchaudhuri and Rajat Subhra Chakraborty, “High Performance Integer Arithmetic Circuit Design on Reconfigurable Computing Platforms (poster)”, accepted in the International Conference on High Performance Computing (HiPC) 2014, Goa, India.
  80.  Durga Prasad Sahoo, Phuong Ha Nguyen, Debapriya Basu Roy, Suvadeep Hajra, Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, “Side Channel Evaluation of PUF-Based Pseudorandom Permutation (poster)”, accepted in the IEEE Workshop on Information Forensics and Security (WIFS) 2014, Washington D.C., USA.
  81.  Anju P. J., Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay and Sezer Goren, “Fault Attack on AES via Hardware Trojan Insertion by Dynamic Partial Reconfiguration of FPGA over Ethernet”, Workshop on Embedded Systems Security (WESS, part of ACM ESWEEK) 2014, New Delhi, India.
  82. Phuong Ha Nguyen, Durga Prasad Sahoo, Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, “Cryptanalysis of Compsite PUFs (invited paper)”, International Symposium on VLSI Design and Test (VDAT) 2014, Coimbatore, India.
  83. Ayan Palchaudhuri, Rajat Subhra Chakraborty, Md. Salman, Sreemukh Kardas and Debdeep Mukhopadhyay, “DRECON: DPA Resistant Encryption by Construction”, (AFRICACRYPT ) 2014: 420-439.
  84. Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, Debdeep Mukhopadhyay, “Highly Compact Automated Implementation of Linear CA on FPGAs”, Cellular Automata for Research and Industry (ACRI) 2014, Krakow, Poland.
  85. Durga Prasad Sahoo. Sayandeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty and Hitesh Kapoor, “Composite PUF: A New Design Paradigm for Physically Unclonable Functions on FPGA”, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2014, Washington, D.C., USA.
  86. Ruchira Naskar and Rajat Subhra Chakraborty, “On Complexities of Spatial-Domain Reversible Watermarking Algorithms”, International Conference on Computing (INDIACom) 2014, New Delhi, India.
  87. Ruchira Naskar, Ashok Raju, Rajat Subhra Chakraborty, “A Single Pass, High Throughput Reversible Watermarking Scheme for Audio based on Redundant Embedding”, International Conference on Signal Processing and Communication 2013, Noida, India.
  88.  Durga Prasad Sahoo, Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, “Design of Low Area-overhead Ring Oscillator PUF with Large Challenge Space”, accepted in the International Conference on Reconfigurable Computing and FPGAs (ReConFig) 2013, Cancun, Mexico.
  89. Durga Prasad Sahoo, Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, “Formal Design of Composite Physically Unclonable FunctionSecurity Proofs for Embedded Systems (PROOFS) 2013, Santa Barbara, California, USA (co-located with CHES’13).
  90. Indrasish Saha, Ratan Rahul Jeldi and Rajat Subhra Chakraborty, “Model Building attacks on Physically Unclonable Functions using Genetic Programming (short paper/poster)“, international Symposium on Security and Trust (HOST) 2013, Austin, TX, USA.
  91. Pasunuri Nagaraju, Ruchira Naskar and Rajat Subhra Chakraborty, “Improved Histogram Bin Shifting based Reversible Watermarking”, International Conference on Intelligent System and Signal Processing (ISSP) 2013, Anand, Gujarat, India.
  92. Ruchira Naskar and Rajat Subhra Chakraborty, “Fuzzy Inference Rule based Reversible Watermarking for Digital Images”, International Conference on Information Systems Security (ICISS) 2012, Guwahati, India. Published in Lecture Notes on Computer Science, vol. 7671, pp. 149-163, 2012.
  93. Ruchira Naskar and Rajat Subhra Chakraborty, ” Lossless Secret Image Sharing based on Generalized–LSB Replacement”, ACM Research in Applied Computation Symposium (RACS), San Antonio, Texas, USA, 2012.
  94. Sanjay Burman, Ayan Palchaudhuri, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay and Pranav Singh, “Effect of Malicious Hardware Logic on Circuit Reliability”, International Symposium on VLSI Design and Test (VDAT) 2012, Shibpur, India. Published in Lecture Notes on Computer Science, vol. 7373, pp. 190-197, 2012.
  95. Ruchira Naskar and Rajat Subhra Chakraborty, “Reversible Image Watermarking through Coordinate Logic Operation based Prediction”, International Conference on Information Systems Security (ICISS) 2011, Kolkata, India. Published in Lecture Notes on Computer Science, vol. 7093, pp. 190-203, 2011.
  96.  Debdeep Mukhopadhyay and Rajat Subhra Chakraborty,” Testability of Cryptographic Hardware and Detection of Hardware Trojans (invited paper)”, IEEE Asian Test Symposium (ATS) 2011, New Delhi, India.
  97. Ruchira Naskar and Rajat Subhra Chakraborty, “Lossless Data Hiding for Halftone Color Images”, International Conference on Image Information Processing (ICIIP) 2011, Shimla, Himachal Pradesh, India.
  98.  Rajat Subhra Chakraborty, Seeetharam Narasimhan and Swarup Bhunia, “Embedded Software Security through Key-based Control Flow Obfuscation”, accepted in the International Conference on Security Aspects in Information Technology, High-performance Computing and Networking (InfoSecHiComNet) 2011, Haldia, West Bengal, India. Published in Lecture Notes in Computer Science, vol. 7011, pp. 30-44, 2011.
  99.  Sambaran Bandyopadhyay, Ruchira Naskar and Rajat Subhra Chakraborty, “Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform”, International Conference on Security Aspects in Information Technology, High-performance Computing and Networking (InfoSecHiComNet) 2011, Haldia, West Bengal, India. Published in Lecture Notes in Computer Science, vol. 7011, pp. 45-56, 2011.
  100. Seetharam Narasimhan, Xinmu Wang, Dongdong Du, Rajat Subhra Chakraborty and Swarup Bhunia, “TeSR: A Robust Temporal Self-Referencing Approach for Hardware Trojan Detection”, international Symposium on Security and Trust (HOST) 2011, San Diego, CA, USA.
  101.  Sk. Subidh Ali, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty and Swarup Bhunia, “Multi-level Attack: an Emerging Threat Model for Cryptographic Hardware”, Design, Automation and Test in Europe (DATE) 2011, Grenoble, France.
  102.  Sambaran Bandyopadhyay, Ruchira Naskar and Rajat Subhra Chakraborty, “Reversible Digital Watermarking using Integer Wavelet Transform”, International Conference on Scientific Paradigm Shift in Information Technology and Management (SPSITM), 2011, Kolkata, India.
  103. Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty and Swarup Bhunia, “Self-referencing: a Scalable Side-channel Approach for Hardware Trojan Detection”, Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2010, Santa Barbara, CA, USA. Published in Lecture Notes in Computer Science, vol. 6225, pp. 173-187, 2010.
  104. < Rajat Subhra Chakraborty, Seetharam Narasimhan and Swarup Bhunia: “Embedded Software Security through Key-based Obfuscation (poster)”, Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2010, Santa Barbara, CA, USA.
  105. [Best Paper Nomination]  Seetharam Narasimhan, Dongdong Du, Rajat Subhra Chakraborty, Somnath Paul, Francis Wolff, Christos Papachristou, Kaushik Roy and Swarup Bhunia, “Multiple-parameter Side-channel Analysis: a Non-invasive Hardware Trojan Detection Approach”, IEEE International Symposium on Security and Trust (HOST) 2010, Anaheim, CA, USA.
  106. Seetharam Narasimhan, Somnath Paul, Rajat Subhra Chakraborty, Francis Wolff, Christos Papachristou, Daniel Weyer and Swarup Bhunia, “System Level Self-Healing for Parametric Yield and Reliability Improvement under Power Bound”, NASA/ESA Conference on Adaptive Hardware and Systems (AHS) 2010, Anaheim, CA, USA.
  107.  Rajat Subhra Chakraborty and Swarup Bhunia: “RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation”. International Conference on VLSI Design (VLSID), 2010, Bangalore, India.
  108.  Rajat Subhra Chakraborty, Seetharam Narasimhan and Swarup Bhunia: “Hardware Trojan: Threats and Emerging Solutions (invited paper)”, IEEE International. High Level Design Validation and Test Workshop (HLDVT), 2009, San Francisco, CA, USA.
  109. Rajat Subhra Chakraborty and Swarup Bhunia: “Security Against Hardware Trojan Through a Novel Application of Design Obfuscation”,  IEEE/ACM International Conference on Computer-aided Design (ICCAD), 2009, San Jose, CA, USA.
  110. Rajat Subhra Chakraborty, F.Wolff, S. Paul, C. Papachristou and S. Bhunia: “MERO: A Statistical Approach for Hardware Trojan Detection Using Logic Testing”, Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2009, Lausanne, Switzerland. Published in Lecture Notes in Computer Science, vol. 5747, pp. 396-410, 2009.
  111. Rajat Subhra Chakraborty and Swarup Bhunia: “Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP”, accepted in the IEEE International Workshop on Security and Trust (HOST) 2009, San Francisco, CA, USA.
  112.  Rajat Subhra Chakraborty and Swarup Bhunia, “Hardware Protection and Authentication Through Netlist-level Obfuscation”, IEEE/ACM International Conference on Computer-aided Design (ICCAD, 2008 San Jose, CA, USA.
  113.  Rajat Subhra Chakraborty, Somnath Paul and Swarup Bhunia, “On-Demand Transparency for Improving Hardware Trojan Detectability”, IEEE International Workshop on Hardware-Oriented Security and Trust (HOST2008AnaheimCA, USA. 
  114.  Francis G. Wolff, Swarup Bhunia, Christos Papachristou and Rajat Subhra Chakraborty, “Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme”, Design, Automation and Test in Europe (DATE) 2008, Munich, Germany. 
  115.  Somnath Paul, Rajat Subhra Chakraborty and Swarup Bhunia, “VIm-Scan: A Low Overhead Scan Design Approach for Protection of Secret Key in Scan-Based Secure Chips”, IEEE VLSI Test Symposium (VTS 2007, Berkeley, CA, USA.
  116.  Rajat Subhra Chakraborty, Somnath Paul, and Swarup Bhunia, “Analysis and Robust Design of Diode-Resistor Based Nanoscale Crossbar PLA Circuits”, International Conference on VLSI Design (VLSID) 2008, Hyderabad, India.
  117.  Somnath Paul, Rajat Subhra Chakraborty and Swarup Bhunia, “Defect-Aware Configurable Computing in Nano-crossbar Fabric for Improved Yield”, IEEE International Online Testing Symposium(IOLTS) 2007, Hersonissos-Heraklion, Crete, Greece
  118.  Rajat Subhra Chakraborty and Swarup Bhunia, “Micropipeline-Based Asynchronous Design Methodology for Robust System Design Using Nanoscale Crossbar”, International Symposium on Quality Electronic Design (ISQED) 2008, San Jose, CA, USA.
  119.  Rajat Subhra Chakraborty,Seetharam Narasimhan and Swarup Bhunia, “Hybridization of CMOS with CNT-based Complementary Nano Electro-Mechanical Switch for Low-Leakage and Robust Embedded Memory Design (poster)”, NSTI Nanotech 2007, Sunnyvale, CA, USA.
  120.  Rajat Subhra Chakraborty and Iti Sah, A Misra, “A Novel Design Approach for V-Dipole Antennas using Genetic Algorithms”, International Conference on Antenna Technologies(ICAT 2005, Ahmedabad, India