Остановите войну!
for scientists:
default search action
Debdeep Mukhopadhyay
- > Home > Persons > Debdeep Mukhopadhyay
Publications
- 2023
- [j98]Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Birds of the Same Feather Flock Together: A Dual-Mode Circuit Candidate for Strong PUF-TRNG Functionalities. IEEE Trans. Computers 72(6): 1636-1651 (2023) - 2022
- [j90]Swapnil Gade, Urbi Chatterjee, Debdeep Mukhopadhyay:
PAKAMAC: A PUF-based Keyless Automotive Entry System with Mutual Authentication. J. Hardw. Syst. Secur. 6(3-4): 67-78 (2022) - [j87]Harishma Boyapally, Paulson Mathew, Sikhar Patranabis, Urbi Chatterjee, Umang Agarwal, Manu Maheshwari, Soumyajit Dey, Debdeep Mukhopadhyay:
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. IEEE Trans. Dependable Secur. Comput. 19(1): 663-680 (2022) - [j86]Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay:
Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange. IEEE Trans. Inf. Forensics Secur. 17: 3847-3862 (2022) - [c180]Nimish Mishra, Anirban Chakraborty, Urbi Chatterjee, Debdeep Mukhopadhyay:
Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels. CARDIS 2022: 3-24 - [c176]Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
DIP Learning on CAS-Lock: Using Distinguishing Input Patterns for Attacking Logic Locking. DATE 2022: 688-693 - [c174]Soumyadyuti Ghosh, Urbi Chatterjee, Soumyajit Dey, Debdeep Mukhopadhyay:
Is the Whole lesser than its Parts? Breaking an Aggregation based Privacy aware Metering Algorithm. DSD 2022: 921-929 - 2021
- [j78]Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
3PAA: A Private PUF Protocol for Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 16: 756-769 (2021) - [c166]Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey:
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain. ACNS Workshops 2021: 252-275 - [c164]Chandan Kumar Chaudhary, Urbi Chatterjee, Debdeep Mukhopadhyay:
Auto-PUFChain: An Automated Interaction Tool for PUFs and Blockchain in Electronic Supply Chain. AsianHOST 2021: 1-4 - [c162]Durba Chatterjee, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
SACReD: An Attack Framework on SAC Resistant Delay-PUFs leveraging Bias and Reliability Factors. DAC 2021: 85-90 - [i91]Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange. IACR Cryptol. ePrint Arch. 2021: 389 (2021) - [i90]Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay:
On the Validity of Spoofing Attack Against Safe is the New Smart. IACR Cryptol. ePrint Arch. 2021: 395 (2021) - [i88]Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Open Sesame: A Novel Non-SAT-Attack against CAS-Lock. IACR Cryptol. ePrint Arch. 2021: 791 (2021) - [i86]Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs. IACR Cryptol. ePrint Arch. 2021: 1067 (2021) - 2020
- [j71]Urbi Chatterjee, Soumi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT. ACM Trans. Design Autom. Electr. Syst. 25(4): 32:1-32:21 (2020) - [c143]Urbi Chatterjee, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions. WWW (Companion Volume) 2020: 217-221 - 2019
- [j60]Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database. IEEE Trans. Dependable Secur. Comput. 16(3): 424-437 (2019) - [c137]Urbi Chatterjee, Pranesh Santikellur, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs. DAC 2019: 224 - [c132]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. SPACE 2019: 214-230 - 2018
- [c129]Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay:
POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS. AsiaCCS 2018: 849-851 - [c125]Urbi Chatterjee, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Trustworthy proofs for sensor data using FPGA based physically unclonable functions. DATE 2018: 1504-1507 - [c121]Urbi Chatterjee, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Sweta Pati, Debashis Mahata, Mukesh M. Prabhu:
PUFSSL: An OpenSSL Extension for PUF based Authentication. DSP 2018: 1-5 - 2017
- [j36]Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-Based Secure Communication Protocol for IoT. ACM Trans. Embed. Comput. Syst. 16(3): 67:1-67:25 (2017) - [c108]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. HOST 2017: 167 - [i55]Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs. IACR Cryptol. ePrint Arch. 2017: 422 (2017) - 2016
- [j30]Urbi Chatterjee, Rajat Subhra Chakraborty, Hitesh Kapoor, Debdeep Mukhopadhyay:
Theory and Application of Delay Constraints in Arbiter PUF. ACM Trans. Embed. Comput. Syst. 15(1): 10:1-10:20 (2016) - [i38]Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-based Secure Communication Protocol for IoT. IACR Cryptol. ePrint Arch. 2016: 674 (2016) - [i35]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse. IACR Cryptol. ePrint Arch. 2016: 1149 (2016)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 18:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint