Dipanwita Roy Chowdhury
According to our database1,
Dipanwita Roy Chowdhury
authored at least 174 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Modeling Linear and Non-linear Layers: An MILP Approach Towards Finding Differential and Impossible Differential Propagations.
CoRR, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis.
J. Supercomput., April, 2023
IACR Cryptol. ePrint Arch., 2023
Unmasking the Dominant Threat of Data Manipulation Attack on Implantable Cardioverter Defibrillators.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
2022
J. Cell. Autom., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2).
Proceedings of the 19th International Conference on Security and Cryptography, 2022
2021
An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures.
J. Hardw. Syst. Secur., 2021
J. Cell. Autom., 2021
Cryptogr. Commun., 2021
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021
2020
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
2019
J. Cryptogr. Eng., 2019
IET Inf. Secur., 2019
An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the Eighth International Conference on Emerging Security Technologies, 2019
Proceedings of the Applications and Techniques in Information Security, 2019
2018
J. Cryptogr. Eng., 2018
Design and Analysis of Some Cryptographically Robust Non-uniform Nonlinear Cellular Automata.
J. Cell. Autom., 2018
Achieving Better Security Using Nonlinear Cellular Automata as a Cryptographic Primitive.
Proceedings of the Mathematics and Computing - 4th International Conference, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
J. Hardw. Syst. Secur., 2017
Int. J. Appl. Cryptogr., 2017
Proceedings of the Mathematics and Computing - Third International Conference, 2017
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES.
Proceedings of the Applications and Techniques in Information Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
J. Cell. Autom., 2016
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Cellular Automata, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
J. Cryptogr. Eng., 2014
J. Cell. Autom., 2014
CASTREAM: A High-speed, Secure Stream Cipher Suitable for Both Hardware and Software.
J. Cell. Autom., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
Inapplicability of Fault Attacks against Trivium on a Cellular Automata Based Stream Cipher.
Proceedings of the Cellular Automata, 2014
Proceedings of the Cellular Automata, 2014
2013
Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform.
IEEE Trans. Very Large Scale Integr. Syst., 2013
First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off.
Int. J. Netw. Secur., 2013
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013
Proceedings of the Cellular Automata and Discrete Complex Systems, 2013
2012
J. Cell. Autom., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Progress in VLSI Design and Test - 16th International Symposium, 2012
SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
Countermeasures of Side Channel Attacks on Symmetric Key Ciphers Using Cellular Automata.
Proceedings of the Cellular Automata, 2012
Proceedings of the Cellular Automata, 2012
Proceedings of the Cellular Automata, 2012
2011
Petrel: Power and Timing Attack Resistant Elliptic Curve Scalar Multiplier Based on Programmable GF(p) Arithmetic Unit.
IEEE Trans. Circuits Syst. I Regul. Pap., 2011
A Parallel Efficient Architecture for Large Cryptographically Robust n × k (k>n/2) Mappings.
IEEE Trans. Computers, 2011
Int. J. Netw. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream Cipher.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Security Aspects in Information Technology, 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
Proceedings of the 17th International Workshop on Cellular Automata and Discrete Complex Systems, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
IEEE Trans. Very Large Scale Integr. Syst., 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the 2010 Conference on Design & Architectures for Signal & Image Processing, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Cellular Automata, 2010
Proceedings of the Cellular Automata, 2010
Proceedings of the Cellular Automata, 2010
2009
IET Inf. Secur., 2009
IACR Cryptol. ePrint Arch., 2009
CoRR, 2009
Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks.
Comput. Electr. Eng., 2009
A New Image Encryption Algorithm using Cellular Automata.
Proceedings of the SECRYPT 2009, 2009
An Efficient Group Key Agreement Protocol for Heterogeneous Environment.
Proceedings of the SECRYPT 2009, 2009
Nmix: An Ideal Candidate for Key Mixing.
Proceedings of the SECRYPT 2009, 2009
An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networks.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Proceedings of the 27th International Conference on Computer Design, 2009
Proceedings of the Eighteentgh Asian Test Symposium, 2009
2008
An Analytical Framework for Characterizing Restricted Two Dimensional Cellular Automata Evolution.
J. Cell. Autom., 2008
Proceedings of the 21st International Conference on VLSI Design (VLSI Design 2008), 2008
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2008
Proceedings of the IEEE Reglon 10 Colloquium and Third International Conference on Industrial and Information Systems, 2008
Proceedings of the 18th ACM Great Lakes Symposium on VLSI 2008, 2008
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
Proceedings of the Cellular Automata, 2008
Proceedings of the Cellular Automata, 2008
Proceedings of the Cellular Automata, 2008
Proceedings of the Cellular Automata, 2008
2007
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2007
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2007
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2007
Theory of a Class of Complemented Group Cellular Automata and Its Application to Cryptography.
J. Cell. Autom., 2007
An Efficient Design of Cellular Automata Based Cryptographically Robust One-Way Function.
Proceedings of the 20th International Conference on VLSI Design (VLSI Design 2007), 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the Tenth Euromicro Conference on Digital System Design: Architectures, 2007
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2006
Design of Key Establishment Protocol Using One-Way Functions to Avert <i>insider-replay</i> Attack.
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Third IEEE International Workshop on Electronic Design, 2006
Proceedings of the 9th International Conference in Information Technology, 2006
Generation of Expander Graphs Using Cellular Automata and Its Applications to Cryptography.
Proceedings of the Cellular Automata, 2006
A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and Its Application to RS-Coded MPSK Modulation.
Proceedings of the Cellular Automata, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 18th International Conference on VLSI Design (VLSI Design 2005), 2005
Proceedings of the 18th International Conference on VLSI Design (VLSI Design 2005), 2005
Proceedings of the 13th IEEE International Workshop on Memory Technology, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Cellular automata based key agreement.
Proceedings of the ICETE 2005, 2005
Proceedings of the 14th Asian Test Symposium (ATS 2005), 2005
2004
Nucleic Acids Res., 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
Proceedings of the Cellular Automata, 2004
2003
Proceedings of the 16th International Conference on VLSI Design (VLSI Design 2003), 2003
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003
2002
An Integrated Approach to Testing Embedded Cores and Interconnects Using Test Access Mechanism (TAM) Switch.
J. Electron. Test., 2002
Reformatting Test Patterns for Testing Embedded Core Based System Using Test Access Mechanism (TAM) Switch.
Proceedings of the 7th Asia and South Pacific Design Automation Conference (ASP-DAC 2002), 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2001
Proceedings of the 14th International Conference on VLSI Design (VLSI Design 2001), 2001
2000
Proceedings of the 13th International Conference on VLSI Design (VLSI Design 2000), 2000
Proceedings of the 13th International Conference on VLSI Design (VLSI Design 2000), 2000
Proceedings of the 13th International Conference on VLSI Design (VLSI Design 2000), 2000
Proceedings of the 13th International Conference on VLSI Design (VLSI Design 2000), 2000
1999
Proceedings of the 12th International Conference on VLSI Design (VLSI Design 1999), 1999
Proceedings of the High Performance Computing, 1999
1998
IEEE Trans. Computers, 1998
1996
Theory and Application of Nongroup Cellular Automata for Synthesis of Easily Testable Finite State Machines.
IEEE Trans. Computers, 1996
An efficient encoding algorithm for image compression hardware based on cellular automata.
Proceedings of the 3rd International Conference on High Performance Computing, 1996
1995
IEEE Trans. Computers, 1995
Proceedings of the 8th International Conference on VLSI Design (VLSI Design 1995), 1995
1994
IEEE Trans. Computers, 1994
A class of two-dimensional cellular automata and their applications in random pattern testing.
J. Electron. Test., 1994
Proceedings of the Seventh International Conference on VLSI Design, 1994
1993
Inf. Sci., 1993
Proceedings of the Sixth International Conference on VLSI Design, 1993
Proceedings of the 1993 IEEE/ACM International Conference on Computer-Aided Design, 1993
1992
Proceedings of the Fifth International Conference on VLSI Design, 1992