SEAL
Secured Embedded Architecture Laboratory
Weekly Talk
From Theory to Practice: Private Circuit and Its Ambush—
Debapriya Basu Roy
Towards Improved Cache Timing Attack—
Aswini Kumar Patro
PUF Protocols—
Urbi Chatterjee
Combination and Sampling Ring Oscillator TRNG and possible attack strategies—
Anju P. Johnson
Improved Practical Differential Fault Analysis of Grain-128—
Abhishek Chakraborty
Efficient Attacks on Robust Ring Oscillator PUF with Enhanced Challenge-Response Set—
Dr. Phuong Ha Ngyuen
Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms—-
Sarani Bhattacharya
Introduction to Logic Encryption—
Sayandeep Saha
Trojan Detection in Third Party IP Cores A Surveya—
Sayandeep Saha
A Biased Fault Attack on the Time Redundancy Countermeasure for AES—
Sikhar Patranabis
Pairings on ECC—
Prof. Debdeep Mukhopadhyay
ECC on Your Fingertips—
Debapriya Basu Roy
Fault Tolerant Infective Countermeasure for AES—
Sikhar Patranabis
On Propagation Criterion Property of PUFs—
Dr. Phuong Ha Ngyuen
Lattice Based Cryptography—
Tanujay Saha
Exploiting the Order of Multiplier Operands: A Low-Cost Approach for HCCA Resistance—
Poulami Das
Reversible Color Image Watermarking In YCoCg-R Color Space—
Aniket Roy
Strategy of Security : Adhering Security with Performance—
Souvik Sonar
Fault Analysis of Cryptosystems: Attacks, Countermeasures, and Metrics—
Debdeep Mukhopadhyay and Sikhar Patranabis (CHES 2015)
Memristor based Arbiter PUF: Cryptanalysis Threat and its Mitigation—
Urbi Chatterjee
Dynamic Key-Aggregate Cryptosystems for Online Data Sharing in the Cloud—
Sikhar Patranabis
Realization of an Asymmetric Key Exchange Protocol in Universally Composable Framework—
Urbi Chatterjee
On Chip Vulnerability Analysis for Cryptographic Hardware—
Souvik Sonar
Applications of Multilinear Forms to Cryptography—
Yash Shrivastava
Candidate Multilinear Maps—
Kalyan Kumar Garapaty
Parallel Implementation of Side Channel Analysis Toolbox(1) Implementation Techniques of Pairings(2)—
1.Rahul Sonanis 2.Krishna Bagadia
Parsimonious Design Strategy for Linear Layers with High Diffusion in Block Ciphers—
Debapriya Basu Roy
Research
Research Area
Projects
Partners
Recent Focus
Members
Faculty
Students
Ex-Students
Staff
All Containts
Book
Book Chapter
Conferences
Contact
Current Focus
Ex-Students
Expertise/Results
Faculty
Funding and Publications
Highlights
Home
Invited Talks
Journals
Latest News
Magazine
Partners
Patent
Poster
Projects
Research Area
Research Labs
Staff
Students
Synergistic Efforts on Hardware Security
Weekly Talk