Cryptography & network security BA Forouzan McGraw-Hill, Inc., 2007 | 1478 | 2007 |
A survey on adversarial attacks and defences A Chakraborty, M Alam, V Dey, A Chattopadhyay, D Mukhopadhyay CAAI Transactions on Intelligence Technology 6 (1), 25-45, 2021 | 1045* | 2021 |
Differential fault analysis of the advanced encryption standard using a single fault M Tunstall, D Mukhopadhyay, S Ali Information Security Theory and Practice. Security and Privacy of Mobile …, 2011 | 437 | 2011 |
Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database U Chatterjee, V Govindan, R Sadhukhan, D Mukhopadhyay, ... IEEE transactions on dependable and secure computing 16 (3), 424-437, 2018 | 252 | 2018 |
A PUF-based secure communication protocol for IoT U Chatterjee, RS Chakraborty, D Mukhopadhyay ACM Transactions on Embedded Computing Systems (TECS) 16 (3), 1-25, 2017 | 208 | 2017 |
An improved fault based attack of the advanced encryption standard D Mukhopadhyay International Conference on Cryptology in Africa, 421-434, 2009 | 194 | 2009 |
Result pattern hiding searchable encryption for conjunctive queries S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ... Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 178 | 2018 |
Secured flipped scan-chain model for crypto-architecture G Sengar, D Mukhopadhyay, DR Chowdhury IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2007 | 163 | 2007 |
A multiplexer-based arbiter PUF composition with enhanced reliability and security DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen IEEE Transactions on Computers 67 (3), 403-417, 2017 | 156 | 2017 |
A diagonal fault attack on the advanced encryption standard D Saha, D Mukhopadhyay, D RoyChowdhury Cryptology ePrint Archive, 2009 | 146 | 2009 |
Improved test pattern generation for hardware trojan detection using genetic algorithm and boolean satisfiability S Saha, RS Chakraborty, SS Nuthakki, Anshul, D Mukhopadhyay Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 129 | 2015 |
Curious case of rowhammer: flipping secret exponent bits using timing analysis S Bhattacharya, D Mukhopadhyay Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016 | 123 | 2016 |
A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks DP Sahoo, PH Nguyen, D Mukhopadhyay, RS Chakraborty IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015 | 98 | 2015 |
PUFs as promising tools for security in internet of things D Mukhopadhyay IEEE Design & Test 33 (3), 103-115, 2016 | 94 | 2016 |
A PUF-enabled secure architecture for FPGA-based IoT applications AP Johnson, RS Chakraborty, D Mukhopadhyay IEEE Transactions on Multi-Scale Computing Systems 1 (2), 110-122, 2015 | 92 | 2015 |
Security analysis of concurrent error detection against differential fault analysis X Guo, D Mukhopadhyay, C Jin, R Karri Journal of Cryptographic Engineering 5, 153-169, 2015 | 91 | 2015 |
Destroying fault invariant with randomization: A countermeasure for aes against differential fault attacks H Tupsamudre, S Bisht, D Mukhopadhyay Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014 | 91 | 2014 |
Hardware security: design, threats, and safeguards D Mukhopadhyay, RS Chakraborty CRC Press, 2014 | 90 | 2014 |
Differential fault analysis on the families of SIMON and SPECK ciphers H Tupsamudre, S Bisht, D Mukhopadhyay 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 40-48, 2014 | 88 | 2014 |
Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks M Alam, S Bhattacharya, D Mukhopadhyay, S Bhattacharya Cryptology ePrint Archive, 2017 | 87 | 2017 |