Debrup Chakraborty

Orcid: 0000-0001-5179-1971

According to our database1, Debrup Chakraborty authored at least 45 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Making Searchable Symmetric Encryption Schemes Smaller and Faster.
IACR Cryptol. ePrint Arch., 2024

Fast Low Level Disk Encryption Using FPGAs.
IACR Cryptol. ePrint Arch., 2024

2023
On the security of TrCBC.
Inf. Process. Lett., 2023

Designing tweakable enciphering schemes using public permutations.
Adv. Math. Commun., 2023

2022
{\sf TrCBC} is Insecure.
IACR Cryptol. ePrint Arch., 2022

${\sf {FAST}}$: Disk encryption and beyond.
Adv. Math. Commun., 2022

2019
Impact of Data Pruning on Machine Learning Algorithm Performance.
CoRR, 2019

2018
Disk encryption: do we need to preserve length?
J. Cryptogr. Eng., 2018

2017
A Fast Single-Key Two-Level Universal Hash Function.
IACR Trans. Symmetric Cryptol., 2017

Evaluating Bernstein-Rabin-Winograd Polynomials.
IACR Cryptol. ePrint Arch., 2017

FAST: Disk Encryption and Beyond.
IACR Cryptol. ePrint Arch., 2017

2016
On modes of operations of a block cipher for authentication and authenticated encryption.
Cryptogr. Commun., 2016

2015
Attacks on the Authenticated Encryption Mode of Operation PAE.
IEEE Trans. Inf. Theory, 2015

STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data.
IEEE Trans. Computers, 2015

Another look at XCB.
Cryptogr. Commun., 2015

2014
A Cryptographic Study of Tokenization Systems.
IACR Cryptol. ePrint Arch., 2014

Using Bitmaps for Executing Range Queries in Encrypted Databases.
Proceedings of the SECRYPT 2014, 2014

2013
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes.
IEEE Trans. Computers, 2013

RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases.
IACR Cryptol. ePrint Arch., 2013

2012
Double ciphertext mode: a proposal for secure backup.
Int. J. Appl. Cryptogr., 2012

On Securing Communication From Profilers.
IACR Cryptol. ePrint Arch., 2012

Encryption Schemes Secure Against Profiling Adversaries.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012

2011
An Ensemble of Degraded Neural Networks.
Proceedings of the Pattern Recognition - Third Mexican Conference, 2011

2010
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes.
IEEE Trans. Computers, 2010

On implementation of a practical crypto-system in the limited access model.
Proceedings of the 7th International Conference on Electrical Engineering, 2010

2009
On Some Weaknesses in the Disk Encryption Schemes EME and EME2.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Neural Network Ensembles from Training Set Expansions.
Proceedings of the Progress in Pattern Recognition, 2009

Block Cipher Modes of Operation from a Hardware Implementation Perspective.
Proceedings of the Cryptographic Engineering, 2009

2008
Selecting Useful Groups of Features in a Connectionist Framework.
IEEE Trans. Neural Networks, 2008

A General Construction of Tweakable Block Ciphers and Different Modes of Operations.
IEEE Trans. Inf. Theory, 2008

HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach.
IEEE Trans. Inf. Theory, 2008

Objective reduction using a feature selection technique.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

An Improved Security Bound for HCTR.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.
Proceedings of the Progress in Cryptology, 2007

Strict Generalization in Multilayered Perceptron Networks.
Proceedings of the Foundations of Fuzzy Logic and Soft Computing, 2007

2006
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random.
IACR Cryptol. ePrint Arch., 2006

HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach.
Proceedings of the Progress in Cryptology, 2006

A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2004
A neuro-fuzzy scheme for simultaneous feature selection and fuzzy rule-based classification.
IEEE Trans. Neural Networks, 2004

2003
A novel training scheme for multilayered perceptrons to realize proper generalization and incremental learning.
IEEE Trans. Neural Networks, 2003

Some New Features for Protein Fold Prediction.
Proceedings of the Artificial Neural Networks and Neural Information Processing, 2003

Two connectionist schemes for selecting groups of features (sensors).
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

2002
Designing Rule-Based Classifiers with On-Line Feature Selection: A Neuro-fuzzy Approach.
Proceedings of the Advances in Soft Computing, 2002

2001
Integrated feature analysis and fuzzy rule-based system identification in a neuro-fuzzy paradigm.
IEEE Trans. Syst. Man Cybern. Part B, 2001

2000
Mountain and subtractive clustering method: Improvements and generalizations.
Int. J. Intell. Syst., 2000


  Loading...