Journals

    2018

  1. Debapriya Basu Roy,Manaar Alam,Sarani Bhattacharya,Vidya Govindan,Francesco Regazzoni,Rajat Subhra Chakraborty,Debdeep Mukhopadhyay :Customized Instructions for Protection Against Memory Integrity Attacks(2018)
  2. https://ieeexplore.ieee.org/abstract/document/8341734

  3. Urbi Chatterjee,Vidya Govindan,Rajat Sadhukhan,Debdeep Mukhopadhyay,Rajat Subhra Chakraborty,Debashis Mahata,Mukesh M. Prabhu:Building PUF based Authentication and Key Exchange Protocol for IoT without Explicit CRPs in Verifier Database(2018)
  4. https://ieeexplore.ieee.org/abstract/document/8353301

  5. Prabhat Kumar Kushwaha:Improved lower bound for Diffie–Hellman problem using multiplicative group of a finite field as auxiliary group : 91-94 (2018)Journal of Mathematical Cryptology, Volume 12, Issue 2, Pages 101–118(2018)
  6. https://doi.org/10.1515/jmc-2017-0053

  7. Debapriya Basu Roy, Shivam Bhasin,Jean-Luc Danger Sylvain Guilley,Wei He,Debdeep Mukhopadhyay,Zakaria Najm, Xuan Thuy Ngo:The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA(2018)
  8. https://link.springer.com/content/pdf/10.1007/s41635-018-0035-4.pdf

  9. Pallabi Ghosh, Rajat Subhra Chakraborty:Recycled and Remarked Counterfeit Integrated Circuit Detection by Image Processing based Package Texture and Indent Analysis(2018)
  10. https://ieeexplore.ieee.org/abstract/document/8423198/

  11. V Govindan, RS Chakraborty, P Santikellur, AK Chaudhary:A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection(2018)
  12. https://link.springer.com/article/10.1007/s41635-018-0042-5

  13. Debapriya Basu Roy, Manaar Alam, Sarani Bhattacharya, Vidya Govindan, Francesco Regazzoni, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:Customized Instructions for Protection Against Memory Integrity Attacks. Embedded Systems: 91-94 (2018)
  14. https://ieeexplore.ieee.org/document/8341734

  15. Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen:A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security. IEEE Trans. Computers 67(3): 403-417 (2018)
  16. https://ieeexplore.ieee.org/document/8025790

  17. Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen:The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA(2018)
  18. https://link.springer.com/content/pdf/10.1007/s41635-018-0035-4.pdf

  19. Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta:ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 242-276 (2018)
  20. https://tches.iacr.org/index.php/TCHES/article/view/882

  21. Sarani Bhattacharya, Debdeep Mukhopadhyay:Utilizing Performance Counters for Compromising Public Key Ciphers. ACM Trans. Priv. Secur. 21(1): 5:1-5:31 (2018)
  22. https://dl.acm.org/citation.cfm?doid=3156015

  23. Ashrujit Ghoshal,Rajat Sadhukhan,Sikhar Patranabis,Nilanjan Datta,Stjepan Picek,Debdeep Mukhopadhyay:Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules(2018)
  24. https://tosc.iacr.org/index.php/ToSC/article/view/7305

  25. Ashrujit Ghoshal,Rajat Sadhukhan,Sikhar Patranabis,Nilanjan Datta,Stjepan Picek,Debdeep Mukhopadhyay:Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules(2018)
  26. https://tosc.iacr.org/index.php/ToSC/article/view/7305

    2017

  27. Aniket Roy, Diangarti Bhalang Tariang, Rajat Subhra Chakraborty:Discrete Cosine Transform Residual Feature based Filtering Forgery and Splicing Detection in JPEG Images (2018)
  28. http://openaccess.thecvf.com/content_cvpr_2018_workshops/papers/w32/Roy_Discrete_Cosine_Transform_CVPR_2018_paper.pdf

  29. Sarani Bhattacharya, Debdeep Mukhopadhyay:Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers. J. Cryptographic Engineering 7(4): 299-310 (2017)
  30. https://link.springer.com/article/10.1007%2Fs13389-017-0165-6

  31. Debapriya Basu Roy, Avik Chakraborti,Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:Two Efficient Fault-Based Attacks on CLOC and SILC(2017)
  32. https://link.springer.com/article/10.1007/s41635-017-0022-1

  33. Sarani Bhattacharya,Shivam Bhasin,Debdeep Mukhopadhyay:Online Detection and Reactive Countermeasure for Leakage from BPU Using TVLA(2017)
  34. https://ieeexplore.ieee.org/abstract/document/8326917

  35. Anju P.Johnson,Sikhar Patranabis,Rajat Subhra Chakraborty,Debdeep Mukhopadhyay:Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications(2017)
  36. https://www.sciencedirect.com/science/article/pii/S0141933116303970

  37. Anju P. Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications. Microprocessors and Microsystems – Embedded Hardware Design 52: 131-144 (2017)
  38. https://www.sciencedirect.com/science/article/pii/S0141933116303970?via%3Dihub

  39. Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:Construction of Rotation Symmetric S-Boxes with High Nonlinearity and Improved DPA Resistivity. IEEE Trans. Computers 66(1): 59-72 (2017)
  40. https://www.computer.org/csdl/trans/tc/2017/01/07470605-abs.html

  41. Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud. IEEE Trans. Computers 66(5): 891-904 (2017)
  42. https://www.computer.org/csdl/trans/tc/2017/01/07470605-abs.html

  43. Rajat Subhra Chakraborty, Samuel Pagliarini,Jimson Mathew,Sree Ranjani Rajendran,M. Nirmala Devi:A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis(2017)
  44. https://ieeexplore.ieee.org/abstract/document/7820075

  45. Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:A Combined Power and Fault Analysis Attack on Protected Grain Family of Stream Ciphers. IEEE Trans. on CAD of Integrated Circuits and Systems 36(12): 1968-1977 (2017)
  46. https://ieeexplore.ieee.org/document/7847300

  47. Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:An Improved DCM-Based Tunable True Random Number Generator for Xilinx FPGA. IEEE Trans. on Circuits and Systems 64-II(4): 452-456 (2017)
  48. https://ieeexplore.ieee.org/document/7467549

  49. Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:A PUF-Based Secure Communication Protocol for IoT. ACM Trans. Embedded Comput. Syst. 16(3): 67:1-67:25 (2017)
  50. https://dl.acm.org/citation.cfm?doid=3005715

  51. Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti:Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers. IEEE Trans. Information Forensics and Security 12(5): 1092-1102 (2017)
  52. https://ieeexplore.ieee.org/document/7801856

  53. Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test. ACM Trans. Design Autom. Electr. Syst. 22(2): 20:1-20:28 (2017)
  54. https://dl.acm.org/citation.cfm?doid=2940326

  55. Rajat Subhra Chakraborty, Ratan Rahul Jeldi, Indrasish Saha, Jimson Mathew:Binary Decision Diagram Assisted Modeling of FPGA-Based Physically Unclonable Function by Genetic Programming. IEEE Trans. Computers 66(6): 971-981 (2017)
  56. https://ieeexplore.ieee.org/document/7553573

  57. Jimson Mathew, Rajat Subhra Chakraborty, Dhiraj K. Pradhan:Guest Editorial: Special Issue on “Secure and Fault-Tolerant Embedded Computing”. ACM Trans. Embedded Comput. Syst. 16(4): 92:1-92:2 (2017)
  58. https://dl.acm.org/citation.cfm?doid=3075563

  59. Rajat Subhra Chakraborty, Samuel Pagliarini, Jimson Mathew, Sree Ranjani Rajendran, M. Nirmala Devi:A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis. IEEE Trans. Emerging Topics Comput. 5(2): 260-270 (2017)
  60. https://ieeexplore.ieee.org/document/7820075

  61. Sikhar Patranabis,Yash Shrivastava,Debdeep Mukhopadhyay:Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud(2017)
  62. https://ieeexplore.ieee.org/abstract/document/7745956

  63. Rajat Sadhukhan,Sikhar Patranabis,Ashrujit Ghoshal,Debdeep Mukhopadhyay,Vishal Saraswat,Santosh Ghosh:An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security(2017)
  64. https://link.springer.com/article/10.1007/s41635-017-0021-2

  65. Aniket Roy, Rajat Subhra Chakraborty:Camera Source Identification Using Discrete Cosine Transform Residue Features and Ensemble Classifier(2017)
  66. http://openaccess.thecvf.com/content_cvpr_2017_workshops/w28/papers/Naskar_Camera_Source_Identification_CVPR_2017_paper.pdf

    2016

  67. Debdeep Mukhopadhyay:PUFs as Promising Tools for Security in Internet of Things. IEEE Design & Test 33(3): 103-115 (2016)
  68. https://ieeexplore.ieee.org/document/7445834

  69. Abhishek Chakraborty, Sarani Bhattacharya, Tanu Hari Dixit, Chester Rebeiro, Debdeep Mukhopadhyay:Template attack on SPA and FA resistant implementation of Montgomery ladder. IET Information Security 10(5): 245-251 (2016)
  70. https://www.crossref.org/iPage?doi=10.1049%2Fiet-ifs.2015.0399

  71. Sanjay Burman, Seetal Potluri, Debdeep Mukhopadhyay, Kamakoti Veezhinathan:Power Consumption versus Hardware Security: Feasibility Study of Differential Power Attack on Linear Feedback Shift Register Based Stream Ciphers and Its Countermeasures. J. Low Power Electronics 12(2): 99-106 (2016)
  72. http://www.ingentaconnect.com/content/asp/jolpe/2016/00000012/00000002/art00003;jsessionid=4epc83nb9a7f6.x-ic-live-01

  73. Urbi Chatterjee, Rajat Subhra Chakraborty, Hitesh Kapoor, Debdeep Mukhopadhyay:Theory and Application of Delay Constraints in Arbiter PUF. ACM Trans. Embedded Comput. Syst. 15(1): 10:1-10:20 (2016)
  74. https://dl.acm.org/citation.cfm?doid=2815621

  75. Ruchira Naskar, Rajat Subhra Chakraborty:A Technique to Evaluate Upper Bounds on Performance of Pixel-prediction Based Reversible Watermarking Algorithms. Signal Processing Systems 82(3): 373-389 (2016)
  76. https://link.springer.com/article/10.1007%2Fs11265-015-1009-1

    2015

  77. Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta, Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers. Cryptography and Communications 7(1): 35-69 (2015)
  78. Chester Rebeiro, Debdeep Mukhopadhyay, Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation. IEEE Trans. Computers 64(3): 778-790 (2015).
  79. Suvadeep Hajra, Debdeep Mukhopadhyay, Reaching the Limit of Nonprofiling DPA, IEEE Trans. on CAD of Integrated Circuits and Systems 34(6): 915-927 (2015).
  80. Sezer Gören, Ozgur Ozkurt, Abdullah Yildiz, H. Fatih Ugurdag, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay: Partial bitstream protection for low-cost FPGAs with physical unclonable function, obfuscation, and dynamic partial self reconfiguration,Accepted for Computers & Electrical Engineering 39(2): 386-397 (2013),
  81. Subidh Ali, Bodhisatwa Majumdar, Debdeep Mukhopadhyay, A Fault Analysis Perspective for Testing of Secured SoC Cores, Accepted for IEEE Design & Test.
  82. Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall, Differential fault analysis of AES: towards reaching its limits, Journal of Cryptographic Engineering, issn: 2190-8508, Springer, pp 1-25, 2012.
  83. Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury, ”Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform”, IEEE Transactions on VLSI Systems. 21(3): 434-442 (2013)
  84. Sezer Goren, Ozgur Ozkurt, Abdullah Yildiz, H. Fatih Ugurdag, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay, Partial Bitstream Protection for Low-cost FPGAs with PUFs, Obfuscation & DPSR-LD, accepted for publication in Computers and Electrical Engineering (Elsevier).
  85. Chester Rebeiro, Debdeep Mukhopadhyay, “Boosting Profiled Cache Timing Attacks With Apriori Analysis”, IEEE TIFS, 7(6): 1900-1905 (2012).
  86. Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, “Theoretical Modeling of Elliptic Curve Scalar Multiplier on LUT Based FPGAs for Area & Speed”, To appear in IEEE TVLSI, http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06213145
  87. Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay: Generalized high speed Itoh-Tsujii multiplicative inversion architecture for FPGAs. Integration 45(3): 307-315 (2012)
  88. Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury: Fault Attack, Countermeasures on Pairing Based Cryptography. I. J. Network Security 12(1): 21-28 (2011)
  89. Jaydeb Bhaumik, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury, “Rain: Reversible Addition with Increased Nonlinearity”, Accepted in International Journal of Network Security.
  90. Sandip Karmakar, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury, “CAvium – Strengthening Trivium Stream Cipher Using Cellular Automata”, Journal of Cellular Automata 7(2): 179-197 (2012) (extended version of paper in Automata 2010).
  91. Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury: Petrel: Power and Timing Attack Resistant Elliptic Curve Scalar Multiplier Based on Programmable GF(p) Arithmetic Unit. IEEE Trans. on Circuits and Systems 58-I(8): 1798-1812 (2011)
  92. Chester Rebeiro, Sujoy Sinha Roy, Sankara Reddy and Debdeep Mukhopadhyay, “Revisiting the Itoh-Tsujii Inversion Algorithm for FPGA Platforms”, IEEE Transactions on VLSI Systems, 19(8): 1508-1512 (2011).
  93. Debdeep Muhopadhyay and Dipanwita RoyChowdhury, “A Parallel Efficient Architecture for Large Cryptographically Robust n x k (k>n/2) Mappings”, IEEE Transactions on Computers, 60(3): 375-385 (2011).
  94. Debdeep Mukhopadhyay, “Group Properties of Non-linear Cellular Automata”, Journal of Cellular Automata (JCA), October, Vol. 5 issue 1, 2009, pp 139-155.
  95. M. Alam, S. Ghosh, M.J. Mohan, D. Mukhopadhyay, D.R. Chowdhury, and I.S. Gupta, “Effect of glitches against masked AES S-box implementation and countermeasure”, IET Information Security, 3(1), 34-44 (2009)
  96. Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury: VLSI Architecture of a Cellular Automata based One-Way Function. Journal of Computers, 3(5): 46-53 (2008).
  97. G. Sengar, D. Mukhopadhyay and D.RoyChowdhury, “Secured Flipped Scan Chain Model for Crypto-architecture”, IEEE Transactions on CAD, Nov 2007, Volume 26, Issue: 11 pp 2080-2084.
  98. D. Mukhopadhyay, G. Sengar and D.RoyChowdhury, “Hierarchical Verification of Galois Field Circuits”, IEEE Transactions on CAD, Oct 2007, Volume 26, Issue 10, pp 1893-1898.
  99. D. Mukhopadhyay and D. RoyChowdhury, “Fault Based Attack on the Rijndael Cryptosystem”, Journal of Discrete Mathematical Sciences & Cryptography, April 2007, Volume 10, Number 2, pp 267-290.
  100. D. Mukhopadhyay and D. RoyChowdhury, “Theory of a Class of Complemented Group Cellular Automata and its Application to Cryptography”, Journal of Cellular Automata, Volume 2, Number 3, 2007, pp 243-271.
  101. S. Banerjee, D. Mukhopadhyay and D. RoyChowdhury, “A DFT Solution for Mixed Signal SOCs”, IEEE Transactions on CAD, Volume 25, Issue 7, pp: 1368-1377, July 2006.
  102. D. Mukhopadhyay and D. RoyChowdhury, “Customizing Cellular Message Encryption Algorithm”, International Journal of Network Security, Volume 7, No. 2, 2008, pp. 194-202.
  103.  J. Mathew, R. S. Chakraborty, Y. Yang, D. P. Sahoo and D. Pradhan, “A Novel Memristor based Hardware Security Primitive”, accepted in ACM Transactions on Embedded Computing Systems.
  104. Seetharam Narasimhan, Dongdong Du, Rajat Subhra Chakraborty, Somnath Paul, Francis Wolff, Christos Papachristou, Kaushik Roy and Swarup Bhunia, “Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis”, IEEE Transactions on Computers, vol. 62. no. 11, Nov. 2013, pp. 2183-2195.
  105. Rajat Subhra Chakraborty, Indrasish Saha, Ayan Palchaudhuri and Gowtham Kumar Naik, “Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream”, IEEE Design & Test of Computers, vol. 30, no. 2, Apr. 2013, pp. 45-54 (top downloaded paper in IEEE Design & Test of Computers from April-July 2013).
  106.  Ruchira Naskar and Rajat Subhra Chakraborty, “A Generalized Tamper Localization Approach for Reversible Watermarking Algorithms”, ACM Transactions on Multimedia Computing Communications and Applications, vol. 9, no. 3, Jun. 2013, pp. 19:1-19:22.
  107. Ruchira Naskar and Rajat Subhra Chakraborty, “Histogram–Bin–Shifting based Reversible Watermarking for Color Images”, IET Image Processing, vol. 7, no. 2, Mar. 2013, pp. 99-110.  Sezer Goren, Ozgur Ozkurt, Abdullah Yildiz, H. Fatih Ugurdag, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay, “Partial Bitstream Protection for Low-cost FPGAs with PUFs, Obfuscation & DPSR-LD”, Computers and Electrical Engineering (Elsevier), vol. 39, no. 2, Feb. 2013, pp. 386-397.
  108. Ruchira Naskar and Rajat Subhra Chakraborty, “Performance of Reversible Digital Image Watermarking under Error-prone Data Communication: a Simulation-based Study”, IET Image Processing, vol. 6, no. 6, Aug. 2012, pp. 728-737.
  109.  Ruchira Naskar and Rajat Subhra Chakraborty, “Reversible Watermarking Utilizing Weighted–median based Prediction”, IET Image Processing, vol. 6, no. 5, Jul. 2012, pp. 507-520.
  110.  Rajat Subhra Chakraborty and Swarup Bhunia, “Security Against Hardware Trojan Attacks Using Key-based Design Obfuscation”, Journal of Electronic Testing: Theory and Applications (Elsevier), vol. 27. no. 6, pp. 767-785, Dec. 2011.
  111. Seetharam Narasimhan, Swarup Bhunia and Rajat Subhra Chakraborty, “Hardware IP Protection During Evaluation using Embedded Sequential Trojan”, IEEE Design & Test of Computers, vol. 29, no. 3, Jun. 2012, pp. 70-79.
  112.  Rajat Subhra Chakraborty, Somnath Paul, Yu Zhou and Swarup Bhunia, “Low-Power Hybrid CMOS-NEMS FPGA: Circuit Level Analysis and Defect-Aware Mapping”, IET Computers and Digital Techniques, vol. 3, no. 6, pp. 609-624, Nov. 2009.
  113.  Rajat Subhra Chakraborty and Swarup Bhunia, “HARPOON: A SoC Design Methodology for Hardware Protection through Netlist Level Obfuscation”, IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, vol. 28, no. 10,  pp. 1493-1502, Oct. 2009.
  114.  Rajat Subhra Chakraborty and Swarup Bhunia, “A Study of Asynchronous Design Methodology for Robust CMOS-Nano Hybrid System Design”, ACM Journal of Emerging Technologies in Computing Systems, vol. 5, no. 3, pp. 1-22, Aug. 2009.
  115.  Rajat Subhra Chakraborty, Seetharam Narasimhan and Swarup Bhunia, “Hybridization of CMOS with CNT-Based Nano Electromechanical Switch for Low Leakage and Robust Circuit Design Using Nanoscaled CMOS Devices, IEEE Transactions on Circuits and Systems I, vol. 54, no. 7, pp. 2480-2488, Nov. 2007.