Publications 


                              For updated full publication list: https://scholar.google.com/citations?user=2ELnl9IAAAAJ&hl=en 

                              DBLP Link: https://dblp.org/pid/85/3079.html

Journals

J1 Chester Rebeiro and Debdeep Mukhopadhyay, "A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers", Journal of Cryptology, 34(3): 21 (2021).

J2. Nimesh Shah, Durba Chatterjee, Brojogopal Sapui, Debdeep Mukhopadhyay, and Arindam Basu, "Introducing Recurrence in Strong PUFs for Enhanced Machine Learning Attack Resistance", To appear in IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

J3. Arnab Bag, Sikhar Patranabis, Debapriya Basu Roy, and Debdeep Mukhopadhyay, "FlexFlexiPair: An Automated Programmable Framework for Pairing Cryptosystems", IEEE Transactions on Computers, 2021.

J4  Anirban Chakraborty, Sarani Bhattacharya, Manaar Alam, Sikhar Patranabis, and Debdeep Mukhopadhyay, "RASSLE: Return Address Stack based Side-channel LEakage", IACR Transactions on CHES, 2021.

J5 Akashdeep Saha, Hrivu Banerjee, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay, "ORACALL: An Oracle-Based Attack on Cellular Automata Guided Logic Locking", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021

J6  Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, and Debdeep Mukhopadhyay, "A Survey on Adversarial Attacks and Defences', IET CAAI Transactions on Intelligence Technology. 

J7  Manaar Alam, Sarani Bhattacharya, and Debdeep Mukhopadhyay, "Victims can be Saviors: A Machine Learning-based detection for Micro-Architectural Side-Channel Attacks", ACM Journal on Emerging Technologies in Computing Systems (JETC), 2020.

J8 Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, "3PAA: A Private PUF Protocol for Anonymous Authentication". IEEE Transaction on Information Forensics Security. 16: 756-769 (2021)

J9 Navid Vafaei, Sayandeep Saha, Nasour Bagheri,  Debdeep Mukhopadhyay, Fault Attack on SKINNY Cipher, Journal of Hardware and Systems Security (HASS), 2020.

J10 Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, and Debdeep Mukhopadhyay, "Neural Network-based Inherently Fault-Tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks", ACM Journal on Emerging Technologies in Computing Systems (JETC), 2020. (To Appear)

J11  Urbi Chatterjee, Soumi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty; Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT, ACM Transactions on Design Automation of Electronic Systems (2020)

J12  Manaar Alam, Debdeep Mukhopadhyay, Sai Praveen Kadiyala, Siew-Kei Lam, and Thambipillai Srikanthan, "Improving Accuracy of HPC-based Malware Classification for Embedded Platforms using Gradient Descent Optimization", Springer Journal of Cryptographic Engineering (JCEN), 2020.

J13 Sai Praveen Kadiyala, Manaar Alam, Yash Shrivastava, Sikhar Patranabis, Muhamed Fauzi Bin Abbas, Arnab Kumar Biswas, Debdeep Mukhopadhyay, Thambipillai Srikanthan LAMBDA: Lightweight Assessment of Malware for emBeddeD Architectures, ACM Trans. Embedded Comput. Syst., Volume: 19, Issue: 4, June 2020.

J14 Boyapally Harishma, Paulson Mathew, Sikhar Patranabis, Urbi Chatterjee, Umang Agarwal,Manu Maheshwari, Soumyajit Dey, and Debdeep Mukhopadhyay Safe is the new Smart: PUF-based Authentication for Load Modification-Resistant Smart Meters, IEEE Trans. on Dependable and Secure Computing, 16(3): 424-437 (2019)

J15 Sarani Bhattacharya,  Clémentine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay Branch Prediction Attack on Blinded Scalar Multiplication, To appear in IEEE Trans. Computers (2020)[feature article for May 2020], https://www.youtube.com/watch?time_continue=7&v=gA4QoeVzYRg&feature=emb_logo

J16 Sayandeep Saha, Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborty, Shivam Bhasin, Debdeep Mukhopadhyay A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction, IEEE Trans. Information Forensics and Security 15: 1905-1919 (2020)

J17 Sikhar Patranabis, Nilanjan Datta, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations, IEEE Trans. Computers 68(10): 1498-1510 (2019)

J18 Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M Prabhu Building PUF based Authentication and Key Exchange Protocol for IoT without Explicit CRPs in Verifier Database, IEEE Trans. Dependable Sec. Comput. 16(3): 424-437 (2019)

J19 Debapriya Basu Roy, Debdeep Mukhopadhyay High-Speed Implementation of ECC Scalar Multiplication in GF(p) for Generic Montgomery Curves, IEEE Trans. VLSI Syst. 27(7): 1587-1600 (2019)

J20 Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay Power Efficiency of S-Boxes: From a Machine-Learning-Based Tool to a Deterministic Model, IEEE Trans. VLSI Syst. 27(12): 2829-2841

J21 Rajat Sadhukhan, Paulson Mathew, Debapriya Basu Roy, Debdeep Mukhopadhyay Count Your Toggles: a New Leakage Model for Pre-Silicon Power Analysis of Crypto Designs, J. Electronic Testing 35(5): 605-619 (2019)

J22 Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta An automated framework for exploitable fault identification in block ciphers J. Cryptographic Engineering 9(3): 203-219 (2019)

J23 Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands, J. Cryptographic Engineering 9(3): 263-275 (2019)

J24 Manaar Alam, Sarani Bhattacharya, Sayan Sinha, Chester Rebeiro, Debdeep Mukhopadhyay IPA: an Instruction Profiling-Based Micro-architectural Side-Channel Attack on Block Ciphers J. Hardware and Systems Security 3(1): 26-44 (2019)

J25 Debapriya Basu Roy, Debdeep Mukhopadhyay: High Speed Implementation of ECC Scalar Multiplication in GF(p) for Generic Montgomery Curves, IEEE Transactions on VLSI.2019

J26 Sikhar Patranabis, Debdeep Mukhopadhyay Identity-Based Key-Aggregate Cryptosystems from Multilinear Maps, To Appear in Advances in Mathematics of Communications, American Institute of Mathematical Sciences,2019

J27 SK Ghosh, S Dey, D Mukhopadhyay, Performance, Security Trade-offs in Secure Control. IEEE Embedded Systems Letters,2019

J28 Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay Combining PUF with RLUTs: A Two-party Pay-per-device IP Licensing Scheme on FPGAs , ACM Transactions on Embedded Computing Systems (TECS) Volume 18 Issue 2, March 2019

J29 Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis IEEE Trans. Computers 68(3): 347-361,2019

J30 Sikhar Patranabis, Debapriya Basu Roy, Anirban Chakraborty, Naveen Nagar, Astikey Singh,Debdeep Mukhopadhyay, Santosh Ghosh Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications, Journalof Hardware and System Security, Springer, vol 3(1): 1-29, 2019.

J31 Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IEEE Trans. Information Forensics and Security 14(4): 954-968 (2019)

J32 Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules. IACR Trans. Symmetric Cryptol. 2018(3): 311-334 (2018)

J33 Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta :An Automated Framework for Exploitable Fault Identification in Block Ciphers, Journal of Cryptographic Engineering, Springer 2018

J34  Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security. IEEE Trans. Computers 67(3): 403-417 (2018)

J35 Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta: ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 242-276 (2018)

J36 Sarani Bhattacharya, Debdeep Mukhopadhyay: Utilizing Performance Counters for Compromising Public Key Ciphers. ACM Trans. Priv. Secur. 21(1): 5:1-5:31 (2018)

J37 Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M Prabhu Building PUF based Authentication and Key Exchange Protocol for IoT without Explicit CRPs in Verifier Database, IEEE Trans. Dependable Sec. Comput. 16(3): 424-437 (2019)

J38 Debapriya Basu Roy, Manaar Alam, Sarani Bhattacharya, Vidya Govindan, Francesco Regazzoni, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay: Customized Instructions for Protection Against Memory Integrity Attacks. Embedded Systems Letters 10(3): 91-94 (2018)

J39 Sarani Bhattacharya, Debdeep Mukhopadhyay: Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers. J. Cryptographic Engineering 7(4): 299-310 (2017)

J40 Rajat Sadhukhan, Sikhar Patranabis, Ashrujit Ghoshal, Debdeep Mukhopadhyay, Vishal Saraswat, Santosh Ghosh An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security” Journal of Hardware and System Security (HASS), Volume 1, Issue 3, September 2017, Springer

J41 Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi ,Two Efficient Fault-Based Attacks on CLOC and SILC, Journal of Hardware and System Security (HASS), Volume 1, Issue 3, September 2017, Springer.

J42 Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, Fault Tolerant Infective Countermeasure for AES, Journal of Hardware and System Security (HASS), Volume 1, Issue 1, March 2017, Springer.

J43 Anju P. Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications. Microprocessors and Microsystems - Embedded Hardware Design 52: 131-144 (2017), Elsevier.

J44 Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud, IEEE Trans. Computers 66(5): 891-904 (2017)

J45 Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers IEEE Trans. Information Forensics and Security 12(5): 1092-1102 (2017)

J46 Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay A Combined Power and Fault Analysis Attack on Protected Grain Family of Stream Ciphers, IEEE Trans. on CAD of Integrated Circuits and Systems 36(12): 1968-1977 (2017).

J47 Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test. ACM Trans. Design Autom. Electr. Syst. 22(2): 20:1-20:28 (2017)

J48 Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay An Improved DCMBased Tunable True Random Number Generator for Xilinx FPGA IEEE Trans. on Circuits and Systems 64-II(4): 452-456 (2017)

J49 Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay A PUF-Based Secure Communication Protocol for IoT. ACM Trans. Embedded Comput. Syst. 16(3): 67:1-67:25 (2017)

J50 Bodhisatwa Mazumdar and Debdeep Mukhopadhyay Construction of RSSBs with High Nonlinearity and Improved DPA Resistivity from Balanced RSBFs, IEEE Trans. Computers 66(1): 59-72 (2017).

J51 Debdeep Mukhopadhyay PUFs as Promising Tools for Security in Internet of Things Invited Article, IEEE Design & Test 33(3): 103-115 (2016).

J52 Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff, Redefining the Transparency Order Design Codes Cryptography 82(1-2): 95-115 (2017), Springer.

J53 Abhishek Chakraborty, Sarani Bhattacharya, Tanu Dixit, Chester Rebeiro, Debdeep Mukhopadhyay Template Attack on SPA and FA Resistant Implementation of Montgomery Ladder IET Information Security 10(5): 245-251 (2016).

J54 Sanjay Burman, Seetal Potluri, Debdeep Mukhopadhyay, Kamakoti Veezhinathan Power Consumption versus Hardware Security: Feasibility Study of Differential Power Attack on Linear Feedback Shift Register Based Stream Ciphers and Its Countermeasures. J. Low Power Electronics 12(2): 99-106 (2016)

J55 Urbi Chatterjee, Rajat Subhra Chakraborty, Hitesh Kapoor, Debdeep Mukhopadhyay Theory and Application of Delay Constraints in Arbiter PUF. ACM Trans. Embedded Comput. Syst. 15(1): 10 (2016)

J56 Suvadeep Hajra, Debdeep Mukhopadhyay Reaching the Limit of Nonprofiling DPA. IEEE Trans. on CAD of Integrated Circuits and Systems 34(6): 915-927 (2015)

J57 Chester Rebeiro, Debdeep Mukhopadhyay Micro-Architectural Analysis of Time-Driven CacheAttacks: Quest for the Ideal Implementation IEEE Trans. Computers 64(3): 778-790 (2015)

J58 Durga Prasad Sahoo, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty: A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks. IEEE Trans. on CAD of Integrated Circuits and Systems 34(8): 1334-1343 (2015)

J59 Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay A PUF-Enabled Secure Architecture for FPGA-Based IoT Applications. IEEE Trans. Multi-Scale Computing Systems 1(2): 110-122 (2015)

J60 Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers. Cryptography and Communications 7(1): 35-69 (2015), Springer.

J61 Chester Rebeiro, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Axel Poschmann: Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks. IEEE Transactions on Information Forensics and Security 8(8): 1274-1279 (2013)

J62 Subidh Ali, Bodhisatwa Majumdar, Debdeep Mukhopadhyay A Fault Analysis Perspective for Testing of Secured SoC Cores IEEE Design & Test, vol.30, no.5, pp.63,73, Oct. 2013

J63 Chester Rebeiro, Debdeep Mukhopadhyay Boosting Profiled Cache Timing Attacks With Apriori Analysis, IEEE TIFS, 7(6): 1900-1905 (2012).

J64 Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta Constrained Search for a Class of Good Bijective S-Boxes With Improved DPA Resistivity. IEEE Transactions on Information Forensics and Security 8(12): 2154-2163 (2013)

J65 Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall Differential fault analysis of AES: towards reaching its limits Journal of Cryptographic Engineering, issn: 2190-8508, Springer, 3(2): 73-97 (2013).

J66 Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay Theoretical Modeling of Elliptic Curve Scalar Multiplier on LUT Based FPGAs for Area & Speed”, IEEE Trans. VLSI Syst. 21(5): 901-909 (2013)

J67 Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform, IEEE Transactions on VLSI Systems. 21(3): 434-442 (2013)

J68 Sezer Goren, Ozgur Ozkurt, Abdullah Yildiz, H. Fatih Ugurdag, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay Partial Bitstream Protection for Low-cost FPGAs with PUFs, Obfuscation & DPSR-LD, Journal Computers and Electrical Engineering, Volume 39 Issue 2, February, 2013 Pages 386-397

J69 Sujoy Sinha Roy, Chester Rebeiro and Debdeep Mukhopadhyay Generalized High Speed Itoh-Tsujii Multiplicative Inversion Architecture for FPGAs”, Integration, VLSI Journal, Elsevier, 45(3): 307-315 (2012).

J70 Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury Petrel: Power and Timing Attack Resistant Elliptic Curve Scalar Multiplier Based on Programmable GF(p) Arithmetic Unit, IEEE Transactions on Circuits and Systems-I (IEEE TCAS-I), 58-I(8): 1798-1812 (2011).

J71 Chester Rebeiro, Sujoy Sinha Roy, Sankara Reddy and Debdeep Mukhopadhyay Revisiting the Itoh-Tsujii Inversion Algorithm for FPGA Platforms”’, IEEE Transactions on VLSI Systems (IEEE TVLSI), 19(8): 1508-1512 (2011).

J72 Debdeep Mukhopadhyay and Dipanwita RoyChowdhury, A Parallel Efficient Architecture for Large Cryptographically Robust n×k (k > n/2) Mappings”, IEEE Transactions on Computers (IEEE TC), 60(3): 375-385 (2011).

J73 Sandip Karmakar, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata, Journal of Cellular Automata, 7(2): 179-197 (2012).

J74 Debdeep Mukhopadhyay, Group Properties of Non-linear Cellular Automata”, Journal of Cellular Automata (JCA), October, Vol. 5 issue 1, 2009, pp 139-155.

J75 M. Alam, S. Ghosh, M.J. Mohan, D. Mukhopadhyay, D.R. Chowdhury, and I.S. Gupta Effect of glitches against masked AES S-box implementation and countermeasure, IET Information Security, 2009, Volume 3, Issue 1, pp 34-44

J76 G. Sengar, D. Mukhopadhyay and D.RoyChowdhury Secured Flipped Scan Chain Model for Crypto-architecture IEEE Transactions on CAD, Nov 2007, Volume 26, Issue: 11 pp 2080-2084.

J77 D. Mukhopadhyay, G. Sengar and D.RoyChowdhury, Hierarchical Verification of Galois Field Circuits, IEEE Transactions on CAD, Oct 2007, Volume 26, Issue 10, pp 1893-1898

J78 D. Mukhopadhyay and D. RoyChowdhury Theory of a Class of Complemented Group Cellular Automata and its Application to Cryptography”, Journal of Cellular Automata, Volume 2, Number 3, 2007, pp 243-271.

J79 S. Banerjee, D. Mukhopadhyay and D. RoyChowdhury A DFT Solution for Mixed Signal SOCs”, IEEE Transactions on CAD, Volume 25, Issue 7, pp: 1368-1377, July 2006.


Conferences

C1. Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin, Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks, Accepted for AsiaCrypt 2021.

C2. Rajat Sadhukhan, Sayandeep Saha, Debdeep Mukhopadhyay, Shortest Path to Secured Hardware: Domain Oriented Masking with High-Level-Synthesis, DAC 2021

C3. Durba Chatterjee, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra, 'SACReD: An Attack Framework on SAC Resistant Delay-PUFs leveraging Bias and Reliability Factors", DAC 2021.

C4. Sikhar Patranabis and Debdeep Mukhopadhyay, "Forward and Backward Private Conjunctive Searchable Symmetric Encryption", In the proceedings of NDSS 2021.

C5. Sayandeep Saha and Debdeep Mukhopadhyay, "Transform without Encode is not sufficient for SIFA and FTA security: A Case Study", In the proceedings of COSADE 2021.

C6. Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay and Soumyajit Dey, "Demand Manipulation Attack Resilient Privacy Aware Smart Grid using PUFs and Blockchain", In the Proceedings of International Workshop on Critical Infrastructure and Manufacturing System Security, CIMSS@ACNS 2021.

C7. Anirban Chakraborty1, Manaar Alam, and Debdeep Mukhopadhyay, "A Good Anvil Fears No Hammer: Automated Rowhammer Detection using Unsupervised Deep Learning", In the Proceedings of 2nd workshop on Artificial Intelligence in Hardware Security in conjunction with ACNS 2021.

C8. Dhruv Thapar, Manaar Alam, and Debdeep Mukhopadhyay, Deep Learning assisted Cross-Family Profiled Side-Channel Attacks using Transfer Learning, In the Proceedings of 22nd International Symposium on Quality Electronic Design (ISQED), 2021.

C9. Debdeep Mukhopadhyay, Faultless to a Fault? The Case of Threshold Implementations of Crypto-systems vs Fault Template Attacks, In the Proceedings of International Conference On Computer Aided Design (ICCAD), 2020.

C10.  Durba Chatterjee, Debdeep Mukhopadhyay, and Aritra Hazra, PUF-G: A CAD Framework for Automated Assessment of Provable Learnability from Formal PUF Representations, In the Proceedings of International Conference On Computer Aided Design (ICCAD), 2020.

C11. Siddhartha Chowdhury, Debapriya Basu Roy, and Debdeep Mukhopadhyay, A Minimalistic Perspective on  Koblitz Curve Scalar Multiplication for FPGA Platforms. 28th IFIP/IEEE Int.l Conference on Very Large Scale Integration (VLSI-SoC 2020)

C12. Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay:Fault Template Attacks on Block Ciphers Exploiting Fault Propagation. EUROCRYPT (1) 2020: 612-643

C13. Akashdeep Saha, Sayandeep Saha, Siddartha Chowdhury, Debdeep Mukhopadhyay, Bhargab B Bhattacharya LoPher: SAT-Hardened Logic Embedding on Block Ciphers. In the proceedings of DAC 2020

C14. Urbi Chatterjee, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata and Mukesh. M. Prabhu Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions To appear in the proceedings of the  WebConf 2020-WWW(Companion Volume) 2020: 217-221

C15. Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay: ExplFrame: Exploiting Page Frame Cache for Fault Analysis of Block Ciphers. DATE 2020: 1303-1306

C16. Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian: Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. DATE 2020: 508-513 (invited paper)

C17. Ipsita Koley, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay, Amogh Kashyap K. N., Sachin Kumar Singh, Lavanya Lokesh, Jithin Nalu Purakkal, Nishant Sinha: Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations. DATE 2020: 314-317

C18. Anirban Chakraborty, Manaar Alam, Debdeep Mukhopadhyay: Deep Learning Based Diagnostics for Rowhammer Protection of DRAM Chips. ATS 2019: 86-91 (invited paper)

C19. Manaar Alam, Astikey Singh, Sarani Bhattacharya, Kuheli Pratihar and Debdeep Mukhopadhyay In-situ Extraction of Randomness from Computer Architecture through Hardware Performance Counters CARDIS 2019 (Best Paper)

C20. Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay Number "Not Used" Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates COSADE 2019: 232-250

C21. Sayandeep Saha, S. Nishok Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay, and Pallab Dasgupta, ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures, DAC 2019: 136

C22. Urbi Chatterjee, Pranesh Santikellur, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay and Rajat Subhra Chakraborty United We Stand: A Threshold Signature Scheme for Identifying outliers in PLCs DAC 2019: 224

C23. Manaar Alam and Debdeep Mukhopadhyay How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering? DAC 2019: 226

C24. Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C  Ramanna Function Private Predicate Encryption for Low Min-Entropy Predicates, Public Key Cryptography (2) 2019: 189-219

C25. Manaar Alam, Sarani Bhattacharya, Swastika Dutta, Sayan Sinha, Debdeep Mukhopadhyay, Anupam Chattopadhyay: RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders, HOST 2019: 218-227

C26. Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay Number ”Not Used” Once - Practical fault attack on pqm4 implementations of NIST candidates, COSADE 2019: 232-250

C27. Nimesh Shah, Manaar Alam, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Arindam Basu A 0.16pJ/bit recurrent neural network based PUF for enhanced machine learning attack resistance. ASP-DAC 2019: 627-632

C28. Durba Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions SPACE 2019: 142-158

C29. Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations SPACE 2019: 214-230

C30. Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay A Machine Learning Based Approach to Predict Power Efficiency of S-Boxes VLSI Design 2019: 531-532

C31. Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo Result Pattern Hiding Searchable Encryption for Conjunctive Queries. ACM Conference on Computer and Communications Security 2018 (ACM-CCS): 745-76

C32. Arnab Bag, Sikhar Patranabis, L Tribhuvan, Debdeep Mukhopadhyay, POSTER: Hardware Acceleration of Searchable Encryption, Proceedings of the 2018 ACMSIGSAC Conference on Computer and Communications 

C33. Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS. AsiaCCS 2018: 849-851

C34. Manaar Alam, Debdeep Mukhopadhyay, Sai Praveen Kadiyala, Siew Kei Lam, Thambipillai Srikanthan Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms. PROOFS@CHES 2018: 1-15

C35. Mustafa Khairallah, Rajat Sadhukhan, Radhamanjari Samanta, Jakub Breier, Shivam Bhasin, Rajat Subhra Chakraborty, Anupam Chattopadhyay, Debdeep Mukhopadhyay DFARPA: Differential fault attack resistant physical design automation. DATE 2018: 1171-117

C36. Urbi Chatterjee, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty: Trustworthy proofs for sensor data using FPGA based physically unclonable functions. DATE 2018: 1504-150

C37. Manish Kesarwani, Akshar Kaul, Prasad Naldurg, Sikhar Patranabis, Gagandeep Singh, Sameep Mehta, Debdeep Mukhopadhyay Efficient Secure k-Nearest Neighbours over Encrypted Data. EDBT 2018: 564-575

C38. Sayandeep Saha, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay, Pallab Dasgupta Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel. FDTC 2018: 15-22

C39. Debapriya Basu Roy, Debdeep Mukhopadhyay Revisiting FPGA Implementation of Montgomery Multiplier in Redundant Number System for Efficient ECC Application in GF(p). FPL 2018: 323-326

C40. Urbi Chatterjee, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Sweta Pati, Debashis Mahata, Mukesh M. Prabhu: PUFSSL: An OpenSSL Extension for PUF based Authentication DSL 2018: 1-5

C41. Saru Vig, Siew Kei Lam, Sarani Bhattacharya, Debdeep Mukhopadhyay: Rapid detection of rowhammer attacks using dynamic skewed hash tree. HASP@ISCA 2018: 7:1-7:8

C42. Debapriya Basu Roy, Debdeep Mukhopadhyay Minimalistic Perspective to Public Key Implementations on FPGA. ISVLSI 2018: 381-386

C43. Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay Template-Based Fault Injection Analysis of Block Ciphers. SPACE 2018: 21-3

C44. Navid Vafaei, Nasour Bagheri, Sayandeep Saha, Debdeep Mukhopadhyay Differential Fault Attack on SKINNY Block Cipher. SPACE 2018: 177-19

C45. Sarani Bhattacharya, Shivam Bhasin, Debdeep Mukhopadhyay Online Detection and Reactive Countermeasure for Leakage from BPU Using TVLA. VLSI Design 2018: 155-160

C46. Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay Using Tweaks To Design Fault Resistant Ciphers (Full Version). Conf. Computing Frontiers 2017: 402-408

C47. Durga Prasad Sahoo, Phuong Ha Nguyen, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Side Channel Evaluation of PUF-Based Pseudorandom Permutation. DSD 2017: 237-243

C48. Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers. FDTC 2017: 25-32

C49. Akshar Kaul, Manish Kesarwani, Sameep Mehta, Debdeep Mukhopadhyay, Prasad Naldurg, Sikhar Patranabis, Gagandeep Singh Efficient Secure k-Nearest Neighbours over Encrypted Data. To Appear in the Proceedings of 21st International Conference on Extending Database Technology (EDBT), Vienna, Austria 2018

C50. S. V. Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20. FDTC 2017: 33-40

C51. Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty [POSTER:] Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. HOST 2017: 167

C52. Sumanta Sarkar, Habeeb Syed, Rajat Sadhukhan, Debdeep Mukhopadhyay Lightweight Design Choices for LED-like Block Ciphers. INDOCRYPT 2017: 267-281

C53. Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay Opening pandora’s box: Implication of RLUT on secure FPGA applications and IP security. IVSW 2017: 134-139

C54. Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay Tackling the Time-Defence: An Instruction Count Based Micro-architectural Side-Channel Attack on Block Ciphers. SPACE 2017: 30-52

C55. Poulami Das, Debapriya Basu Roy, and Debdeep Mukhopadhyay, Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands, In the Proceedings of PROOFS (co-held with CHES 2017)

C56. Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, and Pallab Dasgupta, An Automated Framework for Exploitable Fault Identification in Block Ciphers A Data Mining Approach, In the Proceedings of PROOFS (co-held with CHES 2017)

C57. Sarani Bhattacharya, Debdeep Mukhopadhyay: Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis (CHES 2016), 602-624.

C58. Sikhar Patranabis, Debapriya Basu Roy, Praveen Kumar Vadnala, Debdeep Mukhopadhyay and Santosh Ghosh. Shuffling Across Rounds: A Lightweight Strategy to Counter Side-channel Attacks, ICCD 2016: 440-443

C59. Sarani Bhattacharya and Debdeep Mukhopadhyay, Formal Fault Analysis of Branch Predictors: Attacking countermeasures of Asymmetric key ciphers, Proofs 2016 (co-held with CHES 16)

C60. Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, Fault tolerant implementations of delay-based physically unclonable functions on FPGA, FDTC 2016 (co-held with CHES 16)

C61. Anju Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay, Remote Dynamic Clock Reconfiguration based Attacks on Internet of Things Applications, 19th Euromicro Conference on Digital Systems Design (DSD) 2016.

C62. Sayandeep Saha, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay, Testability based Metric for Hardware Trojan Vulnerability Assessment, 19th Euromicro Conference on Digital Systems Design (DSD) 2016

C63. Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S V Dilip Kumar, Debdeep Mukhopadhyay and Mridul Nandi, 6th International Conference on Security Privacy and Applied Cryptographic Engineering SPACE 2016, Hyderabad, India.

C64. Poulami Das; Debapriya Basu Roy and Debdeep Mukhopadhyay Secure Public Key Hardware for IoT Applications, 59th International Mid-West Symposium on Circuits and Systems, Abu Dhabi.

C65. Sarani Bhattacharya, Chester Rebeiro and Debdeep Mukhopadhyay, A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks HASP 2016, co-held with ISCA

C66. Sikhar Patranabis, Debapriya Basu Roy, Yash Shrivastava, Debdeep Mukhopadhyay, Santosh Ghosh Parsimonious design strategy for linear layers with high diffusion in block ciphers. IEEE HOST 2016: 31-36

C67. Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay: Improved Atomicity to Prevent HCCA on NIST Curves. AsiaPKC@AsiaCCS 2016: 21-3

C68. Abhishek Chakraborty, Debdeep Mukhopadhyay A Practical Template Attack on MICKEY128 2.0 Using PSO Generated IVs and LS-SVM. VLSI Design 2016: 529-534

C69. Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay: Using Tweaks to Design Fault Resistant Ciphers. VLSI Design 2016: 585-586

C70. Sarani Bhattacharya, Debdeep Mukhopadhyay Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms. CHES 2015: 248-266

C71. Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability. CHES 2015: 577-596

C72. Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen, Debdeep Mukhopadhyay A Biased Fault Attack on the Time Redundancy Countermeasure for AES. COSADE 2015: 189203

C73. Kaushik Chakraborty and Sumanta Sarkar and Subhamoy Maitra and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Emmanuel Prouff Redefining the Transparency Order, accepted at the ninth International Workshop on Coding and Cryptography (WCC) 2015, April 13-17, 2015, Paris, France.

C74. Durga Prasad Sahoo, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay, Towards Ideal Arbiter PUF Design on Xilinx FPGA: A Practitioner’s Perspective. DSD 2015: 559-56

C75. Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay A Novel Attack on a FPGA based True Random Number Generator. WESS 2015: 6

C76. Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay A practical DPA on Grain v1 using LS-SVM. HOST 2015: 44-47

C77. Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay From theory to practice of private circuit: A cautionary note. ICCD 2015: 296-303

C78. Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing. INDOCRYPT 2015: 25-44

C79. Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p). SAC 2015: 161-177

C80. Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay Fault Tolerant Infective Countermeasure for AES. SPACE 2015: 190-20

C81. Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina Modified Transparency Order Property: Solution or Just Another Attempt. SPACE 2015: 210-227

C82. Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm Reconfigurable LUT: A Double Edged Sword for SecurityCritical Applications. SPACE 2015: 248-268

C83. Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay Improved practical differential fault analysis of grain-128. DATE 2015: 459-464

C84. Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. DATE 2015: 641-646

C85. Ayan Palchaudhuri, Rajat Subhra Chakraborty, Mohammad Salman, Sreemukh Kardas, Debdeep Mukhopadhyay Highly Compact Automated Implementation of Linear CA on FPGAs. ACRI 2014: 388-397

C86. Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, Debdeep Mukhopadhyay DRECON: DPA Resistant Encryption by Construction. AFRICACRYPT 2014: 420-439

C87. Anju P. Johnson, Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Sezer Gren Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. WESS 2014: 1:1-1:8

C88. Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks. CHES 2014: 93-111

C89. Suvadeep Hajra, Debdeep Mukhopadhyay On the Optimal Pre-processing for Non-profiling Differential Power Analysis. COSADE 2014: 161-178

C90. Debapriya Basu Roy, Debdeep Mukhopadhyay, Masami Izumi, Junko Takahashi Tile Before Multiplication: An Efficient Strategy to Optimize DSP Multiplier for Accelerating Prime Field ECC for NIST Curves. DAC 2014: 177:1-177:6

C91. Partha De, Kunal Banerjee, Chittaranjan A. Mandal, Debdeep Mukhopadhyay Circuits and Synthesis Mechanism for Hardware Design to Counter Power Analysis Attacks. DSD 2014: 520-527

C92. Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay Differential Fault Analysis on the Families of SIMON and SPECK Ciphers. FDTC 2014: 40-48

C93. Durga Prasad Sahoo, Sayandeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Hitesh Kapoor Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA. HOST 2014: 50-55

C94. Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri NREPO: Normal basis Recomputing with Permuted Operands. HOST 2014: 118-123

C95. Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks? SPACE 2014: 14-27

C96. Souvik Kolay, Debdeep Mukhopadhyay: Khudra: A New Lightweight Block Cipher for FPGAs. SPACE 2014: 126-145

C97. Phuong Ha Nguyen, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Cryptanalysis of Composite PUFs (Extended abstract-invited talk). VDAT 2014: 1-2

C98. Debdeep Mukhopadhyay On-line testing for differential fault attacks in cryptographic circuits. IOLTS 2013: 226-227

C99. Suvadeep Hajra and Debdeep Mukhopadhyay Multivariate Leakage Model for Improving NonProfiling DPA on Noisy Power Traces, Proceedings of Inscrypt 2013

C100. Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience. HOST 2013: 87-92 (nominated for best paper award)

C101. Subidh Ali, Debdeep Mukhopadhyay Improved Differential Fault Analysis of CLEFIA. FDTC 2013: 60-70

C102. Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay Unraveling timewarp: what all the fuzz is about?. HASP 2013.

C103. Xinmu Wang, Wen Yueh, Debapriya Basu Roy, Saibal Mukhopadhyay, Debdeep Mukhopadhyay, and Swarup Bhunia, Role of Power Grid in Side Channel Attack and Power-Grid-Aware Secure Design, Design Automation Conference (DAC), 2013

C104. Sarani Bhattacharya, Chester Rebeiro and Debdeep Mukhopadhyay, Hardware Prefetchers Leak: A Revisit of SVF for Cache-Timing Attacks, Proceedings of Hardware and Architectural Support for Security and Privacy, HASP, Co-held with MICRO’12.

C105. Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay and Huaxiong Wang, Improved Differential Cache Trace Attacks on SMS4, Proceedings of Inscrypt 2012.

C106. Sk Subidh Ali and Debdeep Mukhopadhyay Differential Fault Analysis of Twofish, Proceedings of Inscrypt 2012.

C107. Debdeep Mukhopadhyay Generating Expander Graphs Using Cellular Automata. ACRI 2012: 52-62

C108. Chester Rebeiro, Sujoy Sinha Roy, Debdeep Mukhopadhyay Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs. CHES 2012: 494-511

C109. Debapriya Basu Roy, Debdeep Mukhopadhyay An Efficient High Speed Implementation of Flexible Characteristic-2 Multipliers on FPGAs. VDAT 2012: 99-11

C110. Sanjay Burman, Ayan Palchaudhuri, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Pranav Singh Effect of Malicious Hardware Logic on Circuit Reliability. VDAT 2012: 190197

C111. Bodhisattwa Majumdar, Debdeep Mukhopadhyay, Indranil Sengupta Design for Security of Block Cipher S-Boxes to Resist Differential Power Attacks. Proceedings of VLSID 2012, Hyderabad (best student paper award in VLSID 2012)

C112. Chester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines,. Proceedings of Indocrypt 2011, Lecture Notes in Computer Science, 7107

C113. Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury, PKDPA: An Enhanced Differential Power Attack on FPGAs, Proceedings of Indocrypt 2011, Lecture Notes in Computer Science, 7107.

C114. Sk. Subidh Ali, and Debdeep Mukhopadhyay, A Differential Fault Analysis on AES Key Schedule using Single Muli-Byte Fault”, In the Proceedings of CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Lecture Notes in Computer Science.

C115. Sk. Subidh Ali, and Debdeep Mukhopadhyay, A Differential Fault Analysis on AES Key Schedule using Single Fault, Proceeding of FDTC 2011, Nara, Japan, September 28, 2011 IEEE Computer Society 2011

C116. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, Testability of Cryptographic Hardware and Detection of Hardware Trojans (Invited Talk), In the Proceedings of Asian Test Symposium, 2011.

C117. Sk Subidh Ali and Debdeep Mukhopadhyay, An Improved Differential Fault Analysis on AES-256, Proceedings of Africacrypt 2011, Senegal, Lecture Notes in Computer Science.

C118. Michael Tunstall, Debdeep Mukhopadhyay, and Sk. Subidh Ali, Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault, Proceedings of WISTP, Greece, Lecture Notes in Computer Science.

C119. Sujoy Roy, Chester Rebeiro and Debdeep Mukhopadhyay, Accelerating Itoh-Tsujii Multiplicative Inversion Algorithm for FPGAs, Proceedings of GLS-VLSI 2011, EPFL, Lausanne, Switzerland.

C120. Sujoy Roy, Chester Rebeiro and Debdeep Mukhopadhyay, Theoretical Modeling of the ItohTsujii Inversion Algorithm for Enhanced Performance on k-LUT based FPGAs, Proceedings of DATE 2011, Grenoble, France.

C121. Subidh Ali, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay and Swarup Bhunia, Multilevel Attack: an Emerging Threat Model for Cryptographic Hardware, Proceedings of DATE 2011, Grenoble, France.

C122. Chester Rebeiro and Debdeep Mukhopadhyay, Cryptanalysis of CLEFIA using Differential Methods with Cache Trace Patterns, Proceedings of CT-RSA 2011, Lecture Notes in Computer Science

C123. Mainack Mondal, Avik Chakraborti, Nilanjan Datta and Debdeep Mukhopadhyay TweLEX: A Tweaked Version of the LEX Stream Cipher, Accepted for 5th Benelux Workshop on Information and System Security (Wissec), November 29-30, 2010, Nijmegen, the Netherlands.

C124. Santosh Ghosh, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury, High Speed Flexible Pairing Cryptoprocessor on FPGA Platform, Pairing, 2010, Japan, Lecture Notes in Computer Science

C125. Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury High Speed Fp Multipliers and Adders on FPGA Platform. DASIP 2010, Edinburgh, Scotland, October 2010.

C126. Sandip Karmakar, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury, d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design, 9th International Conference on Cellular Automata for Research and Industry (ACRI), Italy, 2010, Lecture Notes in Computer Science.

C127. Sandip Karmakar, Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata, Automata, France, 2010.

C128. Dibyendu Mallik and Debdeep Mukhopadhyay, New Pseudo Near Collision on Tiger, International Conference on Security and Cryptography, Secrypt 2010, Athens, Greece

C129. Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi and Toshinori Fukunaga Cache Timing Attacks on CLEFIA”, In the Proceedings of 10th International Conference on Cryptology in India, INDOCRYPT 2009, pp. 104-118, Lecture Notes in Computer Science, 5922 Springer 2009.

C130. Chester Rebeiro, Mainack Mondal, Debdeep Mukhopadhyay, Pinpointing Cache Timing Attacks on AES, In the Proceedings of 23rd International Conference on VLSI Design, VLSID 2010, pp. 306-311, Bangalore.

C131. Debdeep Mukhopadhyay, A New Fault Attack on the Advanced Encryption Standard Hardware”, Invited Paper in the Proceedings of IEEE 19th European Conference on Circuit Theory and Design, pp. 387-390, Antalya, Turkey, 2009.

C132. Debdeep Mukhopadhyay An Improved Fault Based Attack of the Advanced Encryption Standard In the Proceedings of 2nd African International Conference on Cryptology, AFRICACRYPT 2009, Gammarth-Tunisia, 412-434, Lecture Notes in Computer Science, 5580 Springer 2009

C133. Chester Rebeiro, Debdeep Mukhopadhyay, High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms, In the Proceedings of 9th International Conference on Cryptology in India, INDOCRYPT 2008, Kharagpur, 376-388, Lecture Notes in Computer Science, 5365 Springer 2008.

C134. Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay, Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures, In the Proceedings of 9th International Conference on Cryptology in India, INDOCRYPT 2008, Kharagpur, 226-238, Lecture Notes in Computer Science, 5365 Springer 2008.

C135. Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Chester Rebeiro, Theory of Composing Non-linear Machines with Predictable Cyclic Structures In the Proceedings of 8th International Conference on Cellular Automata for Research and Industry (ACRI), Japan, 210-219, Springer, Lecture Notes in Computer Science, 5191 Springer 2008.

C136. Chester Rebeiro and Debdeep Mukhopadhyay, Power Attack Resistant Efficient FPGA Architecture for Karatsuba Multiplier”, In the Proceedings of 21st IEEE Conference on VLSI Design 2008, pp 706-711, India.

C137. Sanjay Burman, Debdeep Mukhopadhyay and V. Kamakoti, LFSR Based Stream Ciphers are vulnerable to Power Attacks In the Proceedings of 8th International Conference on Cryptology in India, INDOCRYPT 2007, Lecture Notes in Computer Science, 4859, pp 384-392

C138. Kundan Kumar, Debdeep Mukhopadhyay and Dipanwita RoyChowdhury Design of a Differential Power Analysis Resistant AES S-Box, In the Proceedings of 8th International Conference on Cryptology in India, INDOCRYPT 2007, Lecture Notes in Computer Science, 4859, pp 373-383, India.

C139. Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha and Dipanwita RoyChowdhury, Strengthening NLS against Crossword Puzzle Attack, Published in 12th Australasian Conference on Information Security and Privacy (ACISP), Lecture Notes in Computer Science, 4586, pp 29-44,James Cook University, Townsville, Queensland, Australia, July 2-4, 2007, ACISP 07.

C140. Monjur Alam, Sonai Ray, Debdeep Mukhopadhyay, Dipanwita RoyChoudhury and Indranil Sengupta, An Area optimized Reconfigurable Encryptor for AES-Rijndael, Design, Automation and Test in Europe, DATE 2007, 16-20 April, Acropolis, Nice, France, DATE 07.

C141. Debdeep Mukhopadhyay, P.Joshi and D.RoyChowdhury, An Efficient Design of Cellular Automata based Cryptographically Robust One-Way Function, Proceedings of 20th IEEE International Conference on VLSI Design, VLSID 07, pp 842-853, India

C142. Debdeep Mukhopadhyay and D. RoyChowdhury, Generation of Expander Graphs Using Cellular Automata and its Applications to Cryptography, Proceedings of the 7th International Conference on Cellular Automata for Research and Industry (ACRI 2006), Lecture Notes in Computer Science 4173, pp 636-645, 20-23 September 2006, Perpignan, France.

C143. D. Bhattacharya, Debdeep Mukhopadhyay and D. RoyChowdhury, A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and its Application to RS-coded MPSK Modulation, Proceedings of the 7th International Conference on Cellular Automata for Research and Industry (ACRI 2006), Lecture Notes in Computer Science 4173, pp 204-214, 20-23 September 2006, Perpignan, France

C144. P. Joshi, D. Mukhopadhyay and D. RoyChowdhury Design and Analysis of a Robust and Efficient Block Cipher Using Cellular Automata, In the Proceedings of the 20th International Conference on Advanced Networking and Applications (AINA’06), volume 2, pp 67-71, April 18-20, Vienna, Austria.

C145. D. Mukhopadhyay, A. Chaudhury, A. Nebhnani and D. RoyChowdhury, CCMEA : Customized Cellular Message Encryption Algorithm for Wireless Networks, In the Proceedings of International Conference on Information Systems Security (ICISS 2005), Lecture Notes in Computer Science 3803, pp 217-227, December 19-21, Kolkata, India.

C146. D. Mukhopadhyay, S. Banerjee, D. RoyChowdhury and B. Bhattacharya, CryptoScan: A Secured Scan Chain Architecture, Proceedings of Asian Test Symposium 2005, pp 348-353, December 18-21, Kolkata, India.

C147. Debdeep Mukhopadhyay and D. RoyChowdhury An Efficient End to End Design of Rijndael Cryptosystem in 0.18 µ CMOS”, In the Proceedings of the 18th International Conference on VLSI Design 2005 jointly held with 4th International Conference on Embedded Systems Design, pp 405-410, Kolkata, India.

C148. S.Banerjee, D. Mukhopadhyay and D. RoyChowdhury, Computer Aided Test (CAT) Tool for Mixed Siganal SOCs Proceedings of the 18th International Conference on VLSI Design 2005, pp 787-790, Kolkata, India.

C149. D. Mukhopadhyay and D. RoyChowdhury, Characterization of a Class of Complemented Group Cellular Automata 6th International Conference on Cellular Automata for Research and Industry, ACRI’04, Lecture Notes in Computer Science, 3305, pp 775-784, Amsterdam, The Netherlands.

C150. C. V. Guru Rao and D. Mukhopadhyay and D. Roy Chowdhury, A New Strategy and Design For Mixed signal SOC Testing, In the digest of the papers of 4th International Workshop on RTL and High Level Testing (WRTLT’03) in conjunction with ATS’03 at Xi’an, P.R.China, November 20-21, 2003.

C151. S.Basu, D. Mukhopadhyay, Dipanwita Roychoudhury, Indranil Sengupta, Sudipta Bhawmik, Reformatting Test Patterns for Embedded Core Based Systems Using Test Access Mechanism (TAM) Switch Proceedings of International Conference on ASP-DAC and VLSI Design 2002, pp 598-603, Bangalore, India



Books, Edited Volumes, Book Chapters

Books

 1. Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, "Hardware Security: Design, Threats, and Safeguards", CRC Press. (among 20 best sellers of CS books, ref. http://reviews.libraryjournal.com/2015/05/best-sellers/computer-science-may-2015-bestsellers/)

2. Sikhar Patranabis and Debdeep Mukhopadhyay, Fault Tolerant Architectures for Cryptography and Hardware Security, Springer 2018.

3. Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya, Timing Channels in Cryptography: A Microarchitectural Perspective, Springer.

4. B. A. Forouzan and D. Mukhopadhyay, "`Cryptography and Network Security", Tata McGrawHill, 2011.



Edited Volumes

1. Willi Meier, Debdeep Mukhopadhyay: Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings. Lecture Notes in Computer Science 8885, Springer 2014 

2. Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay: Security, Privacy, and Applied Cryptography   Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings. Lecture Notes in Computer Science 8204, Springer 2013 

3. Marc Joye, Debdeep Mukhopadhyay, and Michael Tunstall, "Security Aspects in Information Technology", Lecture Notes in Computer Science, Springer, 2011 

4. Anupam Chattopadhyay, Swaroop Ghosh, Wayne P. Burleson, Debdeep Mukhopadhyay: Guest Editorial Special Section on Security Challenges and Solutions With Emerging Computing Technologies. IEEE Trans. Very Large Scale Integr. Syst. 27(11): 2469-2472 (2019)

5. Prabhat Mishra, Debdeep Mukhopadhyay, Swarup Bhunia: Guest Editorial: Special Section on Autonomous Intelligence for Security and Privacy Analytics. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2703-2705 (2019)


Book Chapters

1.  S Patranabis, D Mukhopadhyay , Idempotent Instructions to Counter Fault Analysis Attacks Automated Methods in Cryptographic Fault Analysis, 195-208, 2019, Springer.

2. S Saha, D Mukhopadhyay, P Dasgupta, ExpFault: An Automated Framework for Block Cipher Fault Analysis, Automated Methods in Cryptographic Fault Analysis, 13-57, 2019, Springer.

3. S Saha, D Jap, S Patranabis, D Mukhopadhyay, S Bhasin, P Dasgupta, Exploitable Fault Space Characterization: A Complementary Approach, Automated Methods in Cryptographic Fault Analysis, 59-88 Springer.

4. Fault-Tolerant Implementations of Physically Unclonable Functions on FPGA, DP Sahoo, A Bag, S Patranabis, D Mukhopadhyay, RS Chakraborty, Security and Fault Tolerance in Internet of Things, 129-153 Springer.

5. Debapriya Basu Roy, Shivam Bhasin, Sikhar Patranabis, Debdeep Mukhopadhyay, Testing of Side Channel Leakage of Cyptographic Intellectual Properties: Metrics and Evaluations, Book Chapter in Hardware IP Security and Trust (Springer), edited by Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor, Springer.

6. Debapriya Basu Roy, Debdeep Mukhopadhyay, Security of Crypto IP Core: Issues and Countermeasures, Book Chapter in Fundamentals of IP and SoC Security: Design, Verification, and Debug (Springer), edited by Swarup Bhunia, Sandip Ray, Susmita Sur-Kolay.

7. Subidh Ali, Xiaofei Guo, Ramesh Karri and Debdeep Mukhopadhyay, "Fault Attacks on AES and their Countermeasures"', Book Chapter in Secure System Design and Trustable Computing (Springer), edited by Chip-Hong Chang, and Miodrag Potkonjak.




Selected Technical Reports

T1 Debdeep Mukhopadhyay: Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations. IACR Cryptol. ePrint Arch. 2020: 459 (2020)

T2 Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra: Interpose PUF can be PAC Learned. IACR Cryptol. ePrint Arch. 2020: 471 (2020)

T3 Debapriya Basu Roy, Debdeep Mukhopadhyay Post Quantum ECC on FPGA Platform IACR Cryptology ePrint Archive 2019: 568 (2019)

T4 Chester Rebeiro, Debdeep Mukhopadhyay A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers. IACR Cryptology ePrint Archive 2015: 1191 (2015) [Accepted in Journal of Cryptology]

T5 Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury A Diagonal Fault Attack on the Advanced Encryption Standard. IACR Cryptology ePrint Archive 2009: 581 (2009)

T6 Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay: Adversarial Attacks and Defences: A Survey. CoRR abs/1810.00069 (2018)

T7 Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall Differential Fault Analysis of AES using a Single Multiple-Byte Fault. IACR Cryptology ePrint Archive 2010: 636 (2010)

T8 Michael Tunstall, Debdeep Mukhopadhyay Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault. IACR Cryptology ePrint Archive 2009: 575 (2009)

T9 Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury Key Mixing in Block Ciphers through Addition modulo 2n. IACR Cryptology ePrint Archive 2005: 383 (2005)

T10 Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga Scalar Multiplication on Koblitz Curves using \tau^2-NAF. IACR Cryptology ePrint Archive 2011: 318 (2011)