default search action
Dipanwita Roy Chowdhury
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Rupshali Dasgupta, Meghabriti Pramanik, Pabitra Mitra, Dipanwita Roy Chowdhury:
Intrusion detection for power grid: a review. Int. J. Inf. Sec. 23(2): 1317-1329 (2024) - [c116]Souvik Sur, Dipanwita Roy Chowdhury:
Worst-Case Analysis of the Soundness of Efficient Verifiable Delay Function. Blockchain 2024: 400-405 - [i19]Debranjan Pal, Vishal Pankaj Chandratreya, Abhijit Das, Dipanwita Roy Chowdhury:
Modeling Linear and Non-linear Layers: An MILP Approach Towards Finding Differential and Impossible Differential Propagations. CoRR abs/2405.00441 (2024) - 2023
- [j47]Debranjan Pal, Md Rasid Ali, Abhijit Das, Dipanwita Roy Chowdhury:
A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis. J. Supercomput. 79(6): 6252-6289 (2023) - [c115]Debranjan Pal, Vishal Pankaj Chandratreya, Dipanwita Roy Chowdhury:
New Techniques for Modeling SBoxes: An MILP Approach. CANS 2023: 318-340 - [c114]Bijoy Das, Abhijit Das, Dipanwita Roy Chowdhury:
Security Analysis of WAGE Against Division Property Based Cube Attack. ISPEC 2023: 492-506 - [c113]Anisha Mitra, Dipanwita Roy Chowdhury:
Unmasking the Dominant Threat of Data Manipulation Attack on Implantable Cardioverter Defibrillators. PST 2023: 1-7 - [e2]Luca Manzoni, Luca Mariot, Dipanwita Roy Chowdhury:
Cellular Automata and Discrete Complex Systems - 29th IFIP WG 1.5 International Workshop, AUTOMATA 2023, Trieste, Italy, August 30 - September 1, 2023, Proceedings. Lecture Notes in Computer Science 14152, Springer 2023, ISBN 978-3-031-42249-2 [contents] - [i18]Debranjan Pal, Vishal Pankaj Chandratreya, Dipanwita Roy Chowdhury:
Efficient Algorithms for Modeling SBoxes Using MILP. CoRR abs/2306.02642 (2023) - [i17]Bijoy Das, Abhijit Das, Dipanwita Roy Chowdhury:
Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack. CoRR abs/2306.04352 (2023) - [i16]Debranjan Pal, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury:
Deep Learning based Differential Classifier of PRIDE and RC5. IACR Cryptol. ePrint Arch. 2023: 461 (2023) - 2022
- [j46]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
EnCash: An Authenticated Encryption Scheme Using Cellular Automata. J. Cell. Autom. 16(5-6): 443-461 (2022) - [c112]Debranjan Pal, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury:
Deep Learning Based Differential Classifier of PRIDE and RC5. ATIS 2022: 46-58 - [c111]Rahul Roy, Abhijit Das, Dipanwita Roy Chowdhury:
Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2). SECRYPT 2022: 540-547 - [i15]Md Rasid Ali, Debranjan Pal, Abhijit Das, Dipanwita Roy Chowdhury:
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest. IACR Cryptol. ePrint Arch. 2022: 519 (2022) - [i14]Debranjan Pal, Upasana Mandal, Mainak Chaudhury, Abhijit Das, Dipanwita Roy Chowdhury:
A Deep Neural Differential Distinguisher for ARX based Block Cipher. IACR Cryptol. ePrint Arch. 2022: 1195 (2022) - 2021
- [j45]Swapan Maiti, Dipanwita Roy Chowdhury:
Design of fault-resilient S-boxes for AES-like block ciphers. Cryptogr. Commun. 13(1): 71-100 (2021) - [j44]Swapan Maiti, Dipanwita Roy Chowdhury:
Synthesis of Maximum Length Cellular Automata with Nonlinearity Injections. J. Cell. Autom. 16(1-2): 39-60 (2021) - [j43]Bijoy Das, Amit Sardar, Swapan Maiti, Abhijit Das, Dipanwita Roy Chowdhury:
An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures. J. Hardw. Syst. Secur. 5(3): 191-207 (2021) - [c110]Souvik Sur, Abhijit Das, Dipanwita Roy Chowdhury:
CArrency: An Energy-Efficient Proof-of-Work Scheme for Crypto-Currencies. ICMC 2021: 23-38 - [c109]Shramona Chakraborty, Soma Kundu, Dipanwita Roy Chowdhury:
Image Encryption with Parallel Evolution of 2-D Cellular Automata. ICMC 2021: 63-78 - 2020
- [c108]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
EnCash: an Authenticated Encryption scheme using Cellular Automata. ACRI 2020: 67-79 - [c107]Anindya Ganguly, Abhijit Das, Dipanwita Roy Chowdhury, Deval Mehta:
A Family of Subfield Hyperelliptic Curves for Use in Cryptography. ICICS 2020: 543-561 - [c106]Swapan Maiti, Dipanwita Roy Chowdhury:
Preventing Differential Fault Analysis Attack on AEGIS Family of Ciphers. ICMC 2020: 1-14
2010 – 2019
- 2019
- [j42]Dhiman Saha, Sourya Kakarla, Dipanwita Roy Chowdhury:
Dinamite: internal differential match-in-the-end attack on eight-round PAEQ. IET Inf. Secur. 13(4): 378-388 (2019) - [j41]Dhiman Saha, Dipanwita Roy Chowdhury:
Internal differential fault analysis of parallelizable ciphers in the counter-mode. J. Cryptogr. Eng. 9(1): 53-67 (2019) - [c105]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
On the Security of the Double-Block-Length Hash Function NCASH. ATIS 2019: 266-278 - [c104]Amit Sardar, Bijoy Das, Dipanwita Roy Chowdhury:
An Efficient Hardware Design for Combined AES and AEGIS. EST 2019: 1-6 - [c103]Tapadyoti Banerjee, Bijoy Das, Deval Mehta, Dipanwita Roy Chowdhury:
RACE: Randomized Counter Mode of Authenticated Encryption using Cellular Automata. ICETE (2) 2019: 504-509 - [c102]Tanushree Haldar, Dipanwita Roy Chowdhury:
Design of Hash Function Using Two Dimensional Cellular Automata. ICMC 2019: 33-45 - [c101]Swapan Maiti, Dipanwita Roy Chowdhury:
Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction. ICMC 2019: 67-80 - [c100]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
NCASH: Nonlinear Cellular Automata-based Hash function. ICMC 2019: 111-123 - [c99]Debranjan Pal, Dishank Agrawal, Abhijit Das, Dipanwita Roy Chowdhury:
An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128. SPACE 2019: 106-122 - 2018
- [j40]Sandip Karmakar, Dipanwita Roy Chowdhury:
Design and Analysis of Some Cryptographically Robust Non-uniform Nonlinear Cellular Automata. J. Cell. Autom. 13(1-2): 145-158 (2018) - [j39]Sandip Karmakar, Dipanwita Roy Chowdhury:
Scan-based side channel attack on stream ciphers and its prevention. J. Cryptogr. Eng. 8(4): 327-340 (2018) - [c98]Swapan Maiti, Dipanwita Roy Chowdhury:
Achieving Better Security Using Nonlinear Cellular Automata as a Cryptographic Primitive. ICMC 2018: 3-15 - 2017
- [j38]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing fault attacks using fault randomisation with a case study on AES. Int. J. Appl. Cryptogr. 3(3): 225-235 (2017) - [j37]Dhiman Saha, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ. J. Hardw. Syst. Secur. 1(3): 282-296 (2017) - [j36]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. IACR Trans. Symmetric Cryptol. 2017(1): 240-258 (2017) - [c97]Swapan Maiti, Shamit Ghosh, Dipanwita Roy Chowdhury:
On the Security of Designing a Cellular Automata Based Stream Cipher. ACISP (2) 2017: 406-413 - [c96]Sourya Kakarla, Srinath Mandava, Dhiman Saha, Dipanwita Roy Chowdhury:
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES. ATIS 2017: 58-72 - [c95]Swapan Maiti, Dipanwita Roy Chowdhury:
Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesis. ICMC 2017: 68-83 - [i13]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. IACR Cryptol. ePrint Arch. 2017: 165 (2017) - [i12]Anindya Shankar Bhandari, Dipanwita Roy Chowdhury:
ZETA: Towards Tagless Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 205 (2017) - 2016
- [j35]Jimmy Jose, Sourav Das, Dipanwita Roy Chowdhury:
Prevention of Fault Attacks in Cellular Automata Based Stream Ciphers. J. Cell. Autom. 12(1-2): 141-157 (2016) - [c94]Jimmy Jose, Dipanwita Roy Chowdhury:
FResCA: A Fault-Resistant Cellular Automata Based Stream Cipher. ACRI 2016: 24-33 - [c93]Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. CHES 2016: 581-601 - [c92]Anindya Shankar Bhandari, Dipanwita Roy Chowdhury:
SCARAB: A continuous authentication scheme for biomedical application. PST 2016: 361-367 - [c91]Dhiman Saha, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ. SPACE 2016: 194-210 - [i11]Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. IACR Cryptol. ePrint Arch. 2016: 623 (2016) - 2015
- [c90]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. ACISP 2015: 343-355 - [c89]Shamit Ghosh, Dipanwita Roy Chowdhury:
Preventing fault attack on stream cipher using randomization. HOST 2015: 88-91 - [c88]Dhiman Saha, Dipanwita Roy Chowdhury:
Diagonal fault analysis of Gr⊘stl in dedicated MAC mode. HOST 2015: 100-105 - [c87]Dhiman Saha, Dipanwita Roy Chowdhury:
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts. SAC 2015: 417-438 - [i10]Jimmy Jose, Dipanwita Roy Chowdhury:
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2015: 700 (2015) - 2014
- [j34]Sourav Das, Dipanwita Roy Chowdhury:
CASTREAM: A High-speed, Secure Stream Cipher Suitable for Both Hardware and Software. J. Cell. Autom. 9(2-3): 153-166 (2014) - [j33]Sandip Karmakar, Dipanwita Roy Chowdhury:
Leakage Squeezing Using Cellular Automata and Its Application to Scan Attack. J. Cell. Autom. 9(5-6): 417-436 (2014) - [j32]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
New algorithms for batch verification of standard ECDSA signatures. J. Cryptogr. Eng. 4(4): 237-258 (2014) - [c86]Shamit Ghosh, Abhrajit Sengupta, Dhiman Saha, Dipanwita Roy Chowdhury:
A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n - 1. ACRI 2014: 65-74 - [c85]Jimmy Jose, Sourav Das, Dipanwita Roy Chowdhury:
Inapplicability of Fault Attacks against Trivium on a Cellular Automata Based Stream Cipher. ACRI 2014: 427-436 - [c84]Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry. AFRICACRYPT 2014: 88-108 - [c83]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
EscApe: Diagonal Fault Analysis of APE. INDOCRYPT 2014: 197-216 - [c82]Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
CASH: Cellular Automata Based Parameterized Hash. SPACE 2014: 59-75 - [c81]Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury:
AEC: A Practical Scheme for Authentication with Error Correction. SPACE 2014: 155-170 - [c80]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:
Randomized Batch Verification of Standard ECDSA Signatures. SPACE 2014: 237-255 - [i9]Sandip Karmakar, Dipanwita Roy Chowdhury:
Fault Analysis of Grain Family of Stream Ciphers. IACR Cryptol. ePrint Arch. 2014: 261 (2014) - [i8]Sandip Karmakar, Dipanwita Roy Chowdhury:
Differential Fault Analysis of MICKEY Family of Stream Ciphers. IACR Cryptol. ePrint Arch. 2014: 262 (2014) - [i7]Sandip Karmakar, Dipanwita Roy Chowdhury:
A Generic Scan Attack on Hardware based eStream Winners. IACR Cryptol. ePrint Arch. 2014: 263 (2014) - 2013
- [j31]Sourav Das, Dipanwita Roy Chowdhury:
CAR30: A new scalable stream cipher with rule 30. Cryptogr. Commun. 5(2): 137-162 (2013) - [j30]Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:
First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off. Int. J. Netw. Secur. 15(3): 219-230 (2013) - [j29]Jaydeb Bhaumik, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Rain: Reversible Addition with Increased Nonlinearity. Int. J. Netw. Secur. 15(4): 298-306 (2013) - [j28]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform. IEEE Trans. Very Large Scale Integr. Syst. 21(3): 434-442 (2013) - [c79]Sandip Karmakar, Dipanwita Roy Chowdhury:
Leakage Squeezing Using Cellular Automata. Automata 2013: 98-109 - [c78]Sandip Karmakar, Dipanwita Roy Chowdhury:
Differential Fault Analysis of MICKEY-128 2.0. FDTC 2013: 52-59 - 2012
- [j27]Sandip Karmakar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata. J. Cell. Autom. 7(2): 179-197 (2012) - [c77]Kaushik Chakraborty, Dipanwita Roy Chowdhury:
CSHR: Selection of Cryptographically Suitable Hybrid Cellular Automata Rule. ACRI 2012: 591-600 - [c76]Sourav Das, Dipanwita Roy Chowdhury:
CASTREAM: A New Stream Cipher Suitable for Both Hardware and Software. ACRI 2012: 601-610 - [c75]Sandip Karmakar, Dipanwita Roy Chowdhury:
Countermeasures of Side Channel Attacks on Symmetric Key Ciphers Using Cellular Automata. ACRI 2012: 623-632 - [c74]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
Batch Verification of ECDSA Signatures. AFRICACRYPT 2012: 1-18 - [c73]Anup Kumar Bhattacharya, Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer:
Use of SIMD Features to Speed up Eta Pairing. ICETE (Selected Papers) 2012: 137-154 - [c72]Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Aravind Iyer, Debojyoti Bhattacharya:
Autonomous Certification with List-Based Revocation for Secure V2V Communication. ICISS 2012: 208-222 - [c71]Santosh Ghosh, Ingrid Verbauwhede, Dipanwita Roy Chowdhury:
Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform. Pairing 2012: 141-159 - [c70]Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer:
SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics. SECRYPT 2012: 94-101 - [c69]Arpan Mondal, Santosh Ghosh, Abhijit Das, Dipanwita Roy Chowdhury:
Efficient FPGA Implementation of Montgomery Multiplier Using DSP Blocks. VDAT 2012: 370-372 - [i6]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:
Using Randomizers for Batch Verification of ECDSA Signatures. IACR Cryptol. ePrint Arch. 2012: 582 (2012) - 2011
- [j26]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Fault Attack, Countermeasures on Pairing Based Cryptography. Int. J. Netw. Secur. 12(1): 21-28 (2011) - [j25]Sourav Das, Dipanwita Roy Chowdhury:
Cryptographically Suitable Maximum Length Cellular Automata. J. Cell. Autom. 6(6): 439-459 (2011) - [j24]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Parallel Efficient Architecture for Large Cryptographically Robust n × k (k>n/2) Mappings. IEEE Trans. Computers 60(3): 375-385 (2011) - [j23]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Petrel: Power and Timing Attack Resistant Elliptic Curve Scalar Multiplier Based on Programmable GF(p) Arithmetic Unit. IEEE Trans. Circuits Syst. I Regul. Pap. 58-I(8): 1798-1812 (2011) - [c68]Sandip Karmakar, Dipanwita Roy Chowdhury:
Fault Analysis of Grain-128 by Targeting NFSR. AFRICACRYPT 2011: 298-315 - [c67]Sandip Karmakar, Dipanwita Roy Chowdhury:
NOCAS : A Nonlinear Cellular Automata Based Stream Cipher. Automata 2011: 135-146 - [c66]Santosh Ghosh, Dipanwita Roy Chowdhury, Abhijit Das:
High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields. CHES 2011: 442-458 - [c65]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. INDOCRYPT 2011: 3-21 - [c64]Santosh Ghosh, Dipanwita Roy Chowdhury:
Security of Prime Field Pairing Cryptoprocessor against Differential Power Attack. InfoSecHiComNet 2011: 16-29 - [c63]Praloy Kr. Biswas, Dipanwita Roy Chowdhury, Kankar S. Dasgupta:
Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream Cipher. SECRYPT 2011: 414-417 - [i5]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack. IACR Cryptol. ePrint Arch. 2011: 181 (2011) - 2010
- [j22]Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
New Architectural Design of CA-Based Codec. IEEE Trans. Very Large Scale Integr. Syst. 18(7): 1139-1144 (2010) - [c62]Jaydeb Bhaumik, Dipanwita Roy Chowdhury, Indrajit Chakrabarti:
Null Boundary 90/150 Cellular Automata for Multi-byte Error Correcting Code. ACRI 2010: 231-240 - [c61]Sourav Das, Dipanwita Roy Chowdhury:
Generating Cryptographically Suitable Non-linear Maximum Length Cellular Automata. ACRI 2010: 241-250 - [c60]Sandip Karmakar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design. ACRI 2010: 261-270 - [c59]Sourav Das, Dipanwita Roy Chowdhury:
An Efficient, Parameterized and Scalable S-box for Stream Ciphers. Inscrypt 2010: 77-94 - [c58]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
High speed Fp multipliers and adders on FPGA platform. DASIP 2010: 21-26 - [c57]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
High Speed Flexible Pairing Cryptoprocessor on FPGA Platform. Pairing 2010: 450-466
2000 – 2009
- 2009
- [j21]Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta:
Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks. Comput. Electr. Eng. 35(2): 329-338 (2009) - [j20]Monjur Alam, Santosh Ghosh, M. J. Mohan, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Indranil Sengupta:
Effect of glitches against masked AES S-box implementation and countermeasure. IET Inf. Secur. 3(1): 34-44 (2009) - [j19]Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
An Integrated ECC-MAC Based on RS Code. Trans. Comput. Sci. 4: 117-135 (2009) - [c56]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
A Novel Seed Selection Algorithm for Test Time Reduction in BIST. Asian Test Symposium 2009: 15-20 - [c55]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
A hierarchical approach towards system level static timing verification of SoCs. ICCD 2009: 201-206 - [c54]Mounita Saha, Dipanwita Roy Chowdhury:
An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networks. ICETE (Selected Papers) 2009: 212-223 - [c53]Mounita Saha, Dipanwita Roy Chowdhury:
An Efficient Group Key Agreement Protocol for Heterogeneous Environment. SECRYPT 2009: 182-189 - [c52]Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
Nmix: An Ideal Candidate for Key Mixing. SECRYPT 2009: 285-288 - [c51]Mayank Varshney, Dipanwita Roy Chowdhury:
A New Image Encryption Algorithm using Cellular Automata. SECRYPT 2009: 289-292 - [i4]Mounita Saha, Dipanwita Roy Chowdhury:
A Secure and Efficient Protocol for Group Key agreement in Heterogeneous Environment. CoRR abs/0908.2509 (2009) - [i3]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Diagonal Fault Attack on the Advanced Encryption Standard. IACR Cryptol. ePrint Arch. 2009: 581 (2009) - 2008
- [j18]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Customizing Cellular Message Encryption Algorithm. Int. J. Netw. Secur. 7(2): 193-201 (2008) - [j17]Shiladitya Munshi, Nirmalya Sundar Maiti, Deepan Ray, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
An Analytical Framework for Characterizing Restricted Two Dimensional Cellular Automata Evolution. J. Cell. Autom. 3(4): 313-335 (2008) - [j16]Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury:
VLSI Architecture of a Cellular Automata based One-Way Function. J. Comput. 3(5): 46-53 (2008) - [c50]Sourav Das, Dipanwita Roy Chowdhury:
An Efficient n×nBoolean Mapping Using Additive Cellular Automata. ACRI 2008: 168-173 - [c49]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Chester Rebeiro:
Theory of Composing Non-linear Machines with Predictable Cyclic Structures. ACRI 2008: 210-219 - [c48]Jaydeb Bhaumik, Dipanwita Roy Chowdhury, Indrajit Chakrabarti:
An Improved Double Byte Error Correcting Code Using Cellular Automata. ACRI 2008: 463-470 - [c47]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
coreBIST: A Cellular Automata Based Core for Self Testing System-on-Chips. ACRI 2008: 506-511 - [c46]Mounita Saha, Dipanwita Roy Chowdhury, Indranil Sengupta:
A secure verifiable key agreement protocol for mobile conferencing. COMSWARE 2008: 219-222 - [c45]Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta:
A GF(p) elliptic curve group operator resistant against side channel attacks. ACM Great Lakes Symposium on VLSI 2008: 53-58 - [c44]Jaydeb Bhaumik, Balaji Janakiram, Dipanwita Roy Chowdhury:
Architectural Design of CA-Based Double Byte Error Correcting Codec. ICIIS 2008: 1-6 - [c43]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
Raising the Level of Abstraction for the Timing Verification of System-on-Chips. ISVLSI 2008: 459-462 - [c42]Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:
Single Chip Encryptor/Decryptor Core Implementation of AES Algorithm. VLSI Design 2008: 693-698 - [e1]Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das:
Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings. Lecture Notes in Computer Science 5365, Springer 2008, ISBN 978-3-540-89753-8 [contents] - 2007
- [j15]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Theory of a Class of Complemented Group Cellular Automata and Its Application to Cryptography. J. Cell. Autom. 2(3): 243-271 (2007) - [j14]Shibaji Banerjee, Dipanwita Roy Chowdhury, Bhargab B. Bhattacharya:
An Efficient Scan Tree Design for Compact Test Pattern Set. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(7): 1331-1339 (2007) - [j13]Debdeep Mukhopadhyay, Gaurav Sengar, Dipanwita Roy Chowdhury:
Hierarchical Verification of Galois Field Circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(10): 1893-1898 (2007) - [j12]Gaurav Sengar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Secured Flipped Scan-Chain Model for Crypto-Architecture. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(11): 2080-2084 (2007) - [c41]Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury:
Strengthening NLS Against Crossword Puzzle Attack. ACISP 2007: 29-44 - [c40]Monjur Alam, Sonai Ray, Debdeep Mukhopadhyay, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:
An area optimized reconfigurable encryptor for AES-Rijndael. DATE 2007: 1116-1121 - [c39]Santosh Ghosh, Monjur Alam, Indranil Sengupta, Dipanwita Roy Chowdhury:
A Robust GF(p) Parallel Arithmetic Unit for Public Key Cryptography. DSD 2007: 109-115 - [c38]Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury:
A Near Optimal S-Box Design. ICISS 2007: 77-90 - [c37]Shiladitya Munshi, Nirmalya Sundar Maiti, Deepan Ray, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
An Analytical Framework for Characterizing Restricted Two Dimensional Cellular Automata Evolution. IICAI 2007: 1383-1402 - [c36]Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design of a Differential Power Analysis Resistant Masked AES S-Box. INDOCRYPT 2007: 373-383 - [c35]Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury:
An Efficient Design of Cellular Automata Based Cryptographically Robust One-Way Function. VLSI Design 2007: 842-853 - 2006
- [j11]Shibaji Banerjee, Debdeep Mukhopadhyay, C. V. G. Rao, Dipanwita Roy Chowdhury:
An integrated DFT solution for mixed-signal SOCs. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 25(7): 1368-1377 (2006) - [c34]Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and Its Application to RS-Coded MPSK Modulation. ACRI 2006: 204-214 - [c33]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Generation of Expander Graphs Using Cellular Automata and Its Applications to Cryptography. ACRI 2006: 636-645 - [c32]Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata. AINA (2) 2006: 67-71 - [c31]Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Programmable Parallel Structure to perform Galois Field Exponentiation. ICIT 2006: 277-280 - [c30]Shibaji Banerjee, Dipanwita Roy Chowdhury:
Built-In Self-Test for Flash Memory Embedded in SoC. DELTA 2006: 379-384 - [c29]Mounita Saha, Dipanwita Roy Chowdhury:
Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack. ICISS 2006: 194-204 - [c28]Shibaji Banerjee, Dipanwita Roy Chowdhury, Bhargab B. Bhattacharya:
An Efficient Scan Tree Design for Compact Test Pattern Set. VLSI Design 2006: 175-180 - 2005
- [c27]Debdeep Mukhopadhyay, Shibaji Banerjee, Dipanwita Roy Chowdhury, Bhargab B. Bhattacharya:
CryptoScan: A Secured Scan Chain Architecture. Asian Test Symposium 2005: 348-353 - [c26]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Cellular automata based key agreement. ICETE 2005: 262-267 - [c25]Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita Roy Chowdhury:
CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks. ICISS 2005: 217-227 - [c24]Roshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury:
Modifications of SHA-0 to Prevent Attacks. ICISS 2005: 277-289 - [c23]Shibaji Banerjee, Dipanwita Roy Chowdhury, Bhargab B. Bhattacharya:
A programmable built-in self-test for embedded DRAMs. MTDT 2005: 58-63 - [c22]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
An Efficient End to End Design of Rijndael Cryptosystem in 0.18 ? CMOS. VLSI Design 2005: 405-410 - [c21]Shibaji Banerjee, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Computer Aided Test (CAT) Tool for Mixed Signal SOCs. VLSI Design 2005: 787-790 - [i2]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Key Mixing in Block Ciphers through Addition modulo 2n. IACR Cryptol. ePrint Arch. 2005: 383 (2005) - [i1]Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata. IACR Cryptol. ePrint Arch. 2005: 396 (2005) - 2004
- [j10]Suraj Peri, J. Daniel Navarro, Troels Z. Kristiansen, Ramars Amanchy, Vineeth Surendranath, Babylakshmi Muthusamy, T. K. B. Gandhi, K. N. Chandrika, Nandan Deshpande, Shubha Suresh, B. P. Rashmi, K. Shanker, N. Padma, Vidya Niranjan, H. C. Harsha, Naveen Talreja, B. M. Vrushabendra, M. A. Ramya, A. J. Yatish, Mary Joy, H. N. Shivashankar, M. P. Kavitha, Minal Menezes, Dipanwita Roy Chowdhury, Neelanjana Ghosh, R. Saravana, Sreenath Chandran, S. Sujatha Mohan, Chandra Kiran Jonnalagadda, C. K. Prasad, Chandan Kumar-Sinha, Krishna S. Deshpande, Akhilesh Pandey:
Human protein reference database as a discovery resource for proteomics. Nucleic Acids Res. 32(Database-Issue): 497-501 (2004) - [c20]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Characterization of a Class of Complemented Group Cellular Automata. ACRI 2004: 775-784 - [c19]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Cellular Automata : An Ideal Candidate for a Block Cipher. ICDCIT 2004: 452-457 - 2003
- [c18]Chakunta Venkata Guru Rao, Dipanwita Roy Chowdhury:
A new design-for-test technique for reducing SOC test time. ASP-DAC 2003: 879-882 - [c17]Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
Cryptosystem Designed for Embedded System Security. VLSI Design 2003: 271-276 - 2002
- [j9]Subhayu Basu, Indranil Sengupta, Dipanwita Roy Chowdhury, Sudipta Bhawmik:
An Integrated Approach to Testing Embedded Cores and Interconnects Using Test Access Mechanism (TAM) Switch. J. Electron. Test. 18(4-5): 475-485 (2002) - [j8]Kolin Paul, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
Theory of Extended Linear Machines. IEEE Trans. Computers 51(9): 1106-1110 (2002) - [c16]Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri:
Cellular Automata Based Cryptosystem (CAC). ICICS 2002: 303-314 - [c15]Subhayu Basu, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Indranil Sengupta, Sudipta Bhawmik:
Reformatting Test Patterns for Testing Embedded Core Based System Using Test Access Mechanism (TAM) Switch. ASP-DAC/VLSI Design 2002: 598-603 - 2001
- [c14]Debabrata Bagchi, Dipanwita Roy Chowdhury, Joy Mukherjee, Santanu Chattopadhyay:
A Novel Strategy to Test Core Based Designs. VLSI Design 2001: 122-127 - 2000
- [c13]Parimal Pal Chaudhuri, Dipanwita Roy Chowdhury, Kolin Paul, Biplab K. Sikdar:
Theory and Applications of Cellular Automata for VLSI Design and Testing. VLSI Design 2000: 4 - [c12]Kolin Paul, Ranadeep Ghosal, Biplab K. Sikdar, Santashil Pal Chaudhuri, Dipanwita Roy Chowdhury:
GF(2p) CA Based Vector Quantization for Fast Encoding of Still Images. VLSI Design 2000: 140-143 - [c11]Kolin Paul, Parimal Pal Chaudhuri, Dipanwita Roy Chowdhury:
Scalable Pipelined Micro-Architecture for Wavelet Transform. VLSI Design 2000: 144- - [c10]Kolin Paul, Dipanwita Roy Chowdhury:
Application of GF(2p) CA in Burst Error Correcting Codes. VLSI Design 2000: 562-567
1990 – 1999
- 1999
- [c9]Kolin Paul, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
Cellular Automata Based Transform Coding for Image Compression. HiPC 1999: 269-273 - [c8]Kolin Paul, P. Dutta, Dipanwita Roy Chowdhury, Prasanta Kumar Nandi, Parimal Pal Chaudhuri:
A VLSI Architecture for On-Line Image Decompression Using GF(28) Cellular Automata. VLSI Design 1999: 532-537 - 1998
- [j7]Santanu Chattopadhyay, Dipanwita Roy Chowdhury, Subarna Bhattacharjee, Parimal Pal Chaudhuri:
Cellular-Automata-Array-Based Diagnosis of Board Level Faults. IEEE Trans. Computers 47(8): 817-828 (1998) - 1996
- [j6]Supratik Chakraborty, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
Theory and Application of Nongroup Cellular Automata for Synthesis of Easily Testable Finite State Machines. IEEE Trans. Computers 45(7): 769-781 (1996) - [c7]Subarna Bhattacharjee, U. Raghavendra, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
An efficient encoding algorithm for image compression hardware based on cellular automata. HiPC 1996: 239-244 - 1995
- [j5]Dipanwita Roy Chowdhury, Indranil Sengupta, Parimal Pal Chaudhuri:
CA-Based Byte Error-Correcting Code. IEEE Trans. Computers 44(3): 371-382 (1995) - [j4]Dipanwita Roy Chowdhury, Idranil Sen Gupta, Parimal Pal Chaudhuri:
A Low-Cost High-Capacity Associative Memory Design Using Cellular Automata. IEEE Trans. Computers 44(10): 1260-1264 (1995) - [c6]Santanu Chattopadhyay, Dipanwita Roy Chowdhury, Subarna Bhattacharjee, Parimal Pal Chaudhuri:
Board level fault diagnosis using cellular automata array. VLSI Design 1995: 343-348 - 1994
- [j3]Dipanwita Roy Chowdhury, Indranil Sengupta, Parimal Pal Chaudhuri:
A class of two-dimensional cellular automata and their applications in random pattern testing. J. Electron. Test. 5(1): 67-82 (1994) - [j2]Dipanwita Roy Chowdhury, Saugata Basu, Idranil Sen Gupta, Parimal Pal Chaudhuri:
Design of CAECC-Cellular Automata Based Error Correcting Code. IEEE Trans. Computers 43(6): 759-764 (1994) - [c5]Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
Architecture for VLSI Design of CA Based Byte Error Correcting Code Decoders. VLSI Design 1994: 283-286 - 1993
- [j1]Dipanwita Roy Chowdhury, P. Subbarao, Parimal Pal Chaudhuri:
Characterization of two-dimensional cellular automata using matrix algebra. Inf. Sci. 71(3): 289-314 (1993) - [c4]Dipanwita Roy Chowdhury, Supratik Chakraborty, B. Vamsi, B. Pal Chaudhuri:
Cellular automata based synthesis of easily and fully testable FSMs. ICCAD 1993: 650-653 - [c3]Dipanwita Roy Chowdhury, Supratik Chakraborty, Parimal Pal Chaudhuri:
Synthesis of Self-Checking Sequential Machines Using Cellular Automata. VLSI Design 1993: 107 - 1992
- [c2]Dipanwita Roy Chowdhury, Saugata Basu, Idranil Sen Gupta, Parimal Pal Chaudhuri:
A Novel Scheme for Designing Error Correcting Codes Using Cellular Automata. VLSI Design 1992: 133-136 - [c1]Dipanwita Roy Chowdhury, Idranil Sen Gupta, Parimal Pal Chaudhuri:
A Low-Cost High-Capacity Associative Memory Design Using Cellular Automata. VLSI Design 1992: 157-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint