


Остановите войну!
for scientists:


default search action
Dipanwita Roy Chowdhury
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j46]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
EnCash: An Authenticated Encryption Scheme Using Cellular Automata. J. Cell. Autom. 16(5-6): 443-461 (2022) - [c111]Rahul Roy, Abhijit Das, Dipanwita Roy Chowdhury:
Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2). SECRYPT 2022: 540-547 - [i15]Md Rasid Ali, Debranjan Pal
, Abhijit Das, Dipanwita Roy Chowdhury:
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest. IACR Cryptol. ePrint Arch. 2022: 519 (2022) - [i14]Debranjan Pal
, Upasana Mandal, Mainak Chaudhury, Abhijit Das, Dipanwita Roy Chowdhury:
A Deep Neural Differential Distinguisher for ARX based Block Cipher. IACR Cryptol. ePrint Arch. 2022: 1195 (2022) - 2021
- [j45]Swapan Maiti
, Dipanwita Roy Chowdhury:
Design of fault-resilient S-boxes for AES-like block ciphers. Cryptogr. Commun. 13(1): 71-100 (2021) - [j44]Swapan Maiti, Dipanwita Roy Chowdhury:
Synthesis of Maximum Length Cellular Automata with Nonlinearity Injections. J. Cell. Autom. 16(1-2): 39-60 (2021) - [j43]Bijoy Das
, Amit Sardar, Swapan Maiti, Abhijit Das, Dipanwita Roy Chowdhury:
An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures. J. Hardw. Syst. Secur. 5(3): 191-207 (2021) - [c110]Souvik Sur, Abhijit Das, Dipanwita Roy Chowdhury:
CArrency: An Energy-Efficient Proof-of-Work Scheme for Crypto-Currencies. ICMC 2021: 23-38 - [c109]Shramona Chakraborty, Soma Kundu, Dipanwita Roy Chowdhury:
Image Encryption with Parallel Evolution of 2-D Cellular Automata. ICMC 2021: 63-78 - 2020
- [c108]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
EnCash: an Authenticated Encryption scheme using Cellular Automata. ACRI 2020: 67-79 - [c107]Anindya Ganguly, Abhijit Das, Dipanwita Roy Chowdhury, Deval Mehta:
A Family of Subfield Hyperelliptic Curves for Use in Cryptography. ICICS 2020: 543-561 - [c106]Swapan Maiti, Dipanwita Roy Chowdhury:
Preventing Differential Fault Analysis Attack on AEGIS Family of Ciphers. ICMC 2020: 1-14
2010 – 2019
- 2019
- [j42]Dhiman Saha
, Sourya Kakarla
, Dipanwita Roy Chowdhury:
Dinamite: internal differential match-in-the-end attack on eight-round PAEQ. IET Inf. Secur. 13(4): 378-388 (2019) - [j41]Dhiman Saha
, Dipanwita Roy Chowdhury:
Internal differential fault analysis of parallelizable ciphers in the counter-mode. J. Cryptogr. Eng. 9(1): 53-67 (2019) - [c105]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
On the Security of the Double-Block-Length Hash Function NCASH. ATIS 2019: 266-278 - [c104]Amit Sardar, Bijoy Das, Dipanwita Roy Chowdhury:
An Efficient Hardware Design for Combined AES and AEGIS. EST 2019: 1-6 - [c103]Tapadyoti Banerjee, Bijoy Das, Deval Mehta, Dipanwita Roy Chowdhury:
RACE: Randomized Counter Mode of Authenticated Encryption using Cellular Automata. ICETE (2) 2019: 504-509 - [c102]Tanushree Haldar, Dipanwita Roy Chowdhury:
Design of Hash Function Using Two Dimensional Cellular Automata. ICMC 2019: 33-45 - [c101]Swapan Maiti, Dipanwita Roy Chowdhury:
Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction. ICMC 2019: 67-80 - [c100]Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
NCASH: Nonlinear Cellular Automata-based Hash function. ICMC 2019: 111-123 - [c99]Debranjan Pal, Dishank Agrawal, Abhijit Das, Dipanwita Roy Chowdhury:
An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128. SPACE 2019: 106-122 - 2018
- [j40]Sandip Karmakar, Dipanwita Roy Chowdhury:
Design and Analysis of Some Cryptographically Robust Non-uniform Nonlinear Cellular Automata. J. Cell. Autom. 13(1-2): 145-158 (2018) - [j39]Sandip Karmakar, Dipanwita Roy Chowdhury:
Scan-based side channel attack on stream ciphers and its prevention. J. Cryptogr. Eng. 8(4): 327-340 (2018) - [c98]Swapan Maiti
, Dipanwita Roy Chowdhury:
Achieving Better Security Using Nonlinear Cellular Automata as a Cryptographic Primitive. ICMC 2018: 3-15 - 2017
- [j38]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing fault attacks using fault randomisation with a case study on AES. Int. J. Appl. Cryptogr. 3(3): 225-235 (2017) - [j37]Dhiman Saha
, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ. J. Hardw. Syst. Secur. 1(3): 282-296 (2017) - [j36]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. IACR Trans. Symmetric Cryptol. 2017(1): 240-258 (2017) - [c97]Swapan Maiti, Shamit Ghosh, Dipanwita Roy Chowdhury:
On the Security of Designing a Cellular Automata Based Stream Cipher. ACISP (2) 2017: 406-413 - [c96]Sourya Kakarla
, Srinath Mandava, Dhiman Saha, Dipanwita Roy Chowdhury:
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES. ATIS 2017: 58-72 - [c95]Swapan Maiti, Dipanwita Roy Chowdhury:
Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesis. ICMC 2017: 68-83 - [i13]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. IACR Cryptol. ePrint Arch. 2017: 165 (2017) - [i12]Anindya Shankar Bhandari, Dipanwita Roy Chowdhury:
ZETA: Towards Tagless Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 205 (2017) - 2016
- [j35]Jimmy Jose, Sourav Das, Dipanwita Roy Chowdhury:
Prevention of Fault Attacks in Cellular Automata Based Stream Ciphers. J. Cell. Autom. 12(1-2): 141-157 (2016) - [c94]Jimmy Jose
, Dipanwita Roy Chowdhury:
FResCA: A Fault-Resistant Cellular Automata Based Stream Cipher. ACRI 2016: 24-33 - [c93]Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. CHES 2016: 581-601 - [c92]Anindya Shankar Bhandari, Dipanwita Roy Chowdhury:
SCARAB: A continuous authentication scheme for biomedical application. PST 2016: 361-367 - [c91]Dhiman Saha, Sourya Kakarla
, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ. SPACE 2016: 194-210 - [i11]Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. IACR Cryptol. ePrint Arch. 2016: 623 (2016) - 2015
- [c90]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. ACISP 2015: 343-355 - [c89]Shamit Ghosh, Dipanwita Roy Chowdhury:
Preventing fault attack on stream cipher using randomization. HOST 2015: 88-91 - [c88]Dhiman Saha, Dipanwita Roy Chowdhury:
Diagonal fault analysis of Gr⊘stl in dedicated MAC mode. HOST 2015: 100-105 - [c87]Dhiman Saha, Dipanwita Roy Chowdhury:
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts. SAC 2015: 417-438 - [i10]Jimmy Jose, Dipanwita Roy Chowdhury:
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2015: 700 (2015) - 2014
- [j34]Sourav Das, Dipanwita Roy Chowdhury:
CASTREAM: A High-speed, Secure Stream Cipher Suitable for Both Hardware and Software. J. Cell. Autom. 9(2-3): 153-166 (2014) - [j33]Sandip Karmakar, Dipanwita Roy Chowdhury:
Leakage Squeezing Using Cellular Automata and Its Application to Scan Attack. J. Cell. Autom. 9(5-6): 417-436 (2014) - [j32]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
New algorithms for batch verification of standard ECDSA signatures. J. Cryptogr. Eng. 4(4): 237-258 (2014) - [c86]Shamit Ghosh, Abhrajit Sengupta, Dhiman Saha, Dipanwita Roy Chowdhury:
A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n - 1. ACRI 2014: 65-74 - [c85]Jimmy Jose
, Sourav Das, Dipanwita Roy Chowdhury:
Inapplicability of Fault Attacks against Trivium on a Cellular Automata Based Stream Cipher. ACRI 2014: 427-436 - [c84]Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry. AFRICACRYPT 2014: 88-108 - [c83]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
EscApe: Diagonal Fault Analysis of APE. INDOCRYPT 2014: 197-216 - [c82]Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
CASH: Cellular Automata Based Parameterized Hash. SPACE 2014: 59-75 - [c81]Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury:
AEC: A Practical Scheme for Authentication with Error Correction. SPACE 2014: 155-170 - [c80]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:
Randomized Batch Verification of Standard ECDSA Signatures. SPACE 2014: 237-255 - [i9]Sandip Karmakar, Dipanwita Roy Chowdhury:
Fault Analysis of Grain Family of Stream Ciphers. IACR Cryptol. ePrint Arch. 2014: 261 (2014) - [i8]Sandip Karmakar, Dipanwita Roy Chowdhury:
Differential Fault Analysis of MICKEY Family of Stream Ciphers. IACR Cryptol. ePrint Arch. 2014: 262 (2014) - [i7]Sandip Karmakar, Dipanwita Roy Chowdhury:
A Generic Scan Attack on Hardware based eStream Winners. IACR Cryptol. ePrint Arch. 2014: 263 (2014) - 2013
- [j31]Sourav Das, Dipanwita Roy Chowdhury:
CAR30: A new scalable stream cipher with rule 30. Cryptogr. Commun. 5(2): 137-162 (2013) - [j30]Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:
First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off. Int. J. Netw. Secur. 15(3): 219-230 (2013) - [j29]Jaydeb Bhaumik, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Rain: Reversible Addition with Increased Nonlinearity. Int. J. Netw. Secur. 15(4): 298-306 (2013) - [j28]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Secure Dual-Core Cryptoprocessor for Pairings Over Barreto-Naehrig Curves on FPGA Platform. IEEE Trans. Very Large Scale Integr. Syst. 21(3): 434-442 (2013) - [c79]Sandip Karmakar, Dipanwita Roy Chowdhury:
Leakage Squeezing Using Cellular Automata. Automata 2013: 98-109 - [c78]Sandip Karmakar, Dipanwita Roy Chowdhury:
Differential Fault Analysis of MICKEY-128 2.0. FDTC 2013: 52-59 - 2012
- [j27]Sandip Karmakar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata. J. Cell. Autom. 7(2): 179-197 (2012) - [c77]Kaushik Chakraborty, Dipanwita Roy Chowdhury:
CSHR: Selection of Cryptographically Suitable Hybrid Cellular Automata Rule. ACRI 2012: 591-600 - [c76]Sourav Das, Dipanwita Roy Chowdhury:
CASTREAM: A New Stream Cipher Suitable for Both Hardware and Software. ACRI 2012: 601-610 - [c75]Sandip Karmakar, Dipanwita Roy Chowdhury:
Countermeasures of Side Channel Attacks on Symmetric Key Ciphers Using Cellular Automata. ACRI 2012: 623-632 - [c74]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
Batch Verification of ECDSA Signatures. AFRICACRYPT 2012: 1-18 - [c73]Anup Kumar Bhattacharya, Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer:
Use of SIMD Features to Speed up Eta Pairing. ICETE (Selected Papers) 2012: 137-154 - [c72]Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Aravind Iyer, Debojyoti Bhattacharya:
Autonomous Certification with List-Based Revocation for Secure V2V Communication. ICISS 2012: 208-222 - [c71]Santosh Ghosh, Ingrid Verbauwhede
, Dipanwita Roy Chowdhury:
Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform. Pairing 2012: 141-159 - [c70]Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer:
SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics. SECRYPT 2012: 94-101 - [c69]Arpan Mondal, Santosh Ghosh, Abhijit Das, Dipanwita Roy Chowdhury:
Efficient FPGA Implementation of Montgomery Multiplier Using DSP Blocks. VDAT 2012: 370-372 - [i6]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:
Using Randomizers for Batch Verification of ECDSA Signatures. IACR Cryptol. ePrint Arch. 2012: 582 (2012) - 2011
- [j26]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Fault Attack, Countermeasures on Pairing Based Cryptography. Int. J. Netw. Secur. 12(1): 21-28 (2011) - [j25]Sourav Das, Dipanwita Roy Chowdhury:
Cryptographically Suitable Maximum Length Cellular Automata. J. Cell. Autom. 6(6): 439-459 (2011) - [j24]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Parallel Efficient Architecture for Large Cryptographically Robust n × k (k>n/2) Mappings. IEEE Trans. Computers 60(3): 375-385 (2011) - [j23]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Petrel: Power and Timing Attack Resistant Elliptic Curve Scalar Multiplier Based on Programmable GF(p) Arithmetic Unit. IEEE Trans. Circuits Syst. I Regul. Pap. 58-I(8): 1798-1812 (2011) - [c68]Sandip Karmakar, Dipanwita Roy Chowdhury:
Fault Analysis of Grain-128 by Targeting NFSR. AFRICACRYPT 2011: 298-315 - [c67]Sandip Karmakar, Dipanwita Roy Chowdhury:
NOCAS : A Nonlinear Cellular Automata Based Stream Cipher. Automata 2011: 135-146 - [c66]Santosh Ghosh, Dipanwita Roy Chowdhury, Abhijit Das:
High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields. CHES 2011: 442-458 - [c65]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. INDOCRYPT 2011: 3-21 - [c64]Santosh Ghosh, Dipanwita Roy Chowdhury:
Security of Prime Field Pairing Cryptoprocessor against Differential Power Attack. InfoSecHiComNet 2011: 16-29 - [c63]Praloy Kr. Biswas, Dipanwita Roy Chowdhury, Kankar S. Dasgupta:
Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream Cipher. SECRYPT 2011: 414-417 - [i5]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack. IACR Cryptol. ePrint Arch. 2011: 181 (2011) - 2010
- [j22]Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
New Architectural Design of CA-Based Codec. IEEE Trans. Very Large Scale Integr. Syst. 18(7): 1139-1144 (2010) - [c62]Jaydeb Bhaumik, Dipanwita Roy Chowdhury, Indrajit Chakrabarti:
Null Boundary 90/150 Cellular Automata for Multi-byte Error Correcting Code. ACRI 2010: 231-240 - [c61]Sourav Das, Dipanwita Roy Chowdhury:
Generating Cryptographically Suitable Non-linear Maximum Length Cellular Automata. ACRI 2010: 241-250 - [c60]Sandip Karmakar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design. ACRI 2010: 261-270 - [c59]Sourav Das, Dipanwita Roy Chowdhury:
An Efficient, Parameterized and Scalable S-box for Stream Ciphers. Inscrypt 2010: 77-94 - [c58]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
High speed Fp multipliers and adders on FPGA platform. DASIP 2010: 21-26 - [c57]Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
High Speed Flexible Pairing Cryptoprocessor on FPGA Platform. Pairing 2010: 450-466
2000 – 2009
- 2009
- [j21]Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta:
Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks. Comput. Electr. Eng. 35(2): 329-338 (2009) - [j20]Monjur Alam, Santosh Ghosh, M. J. Mohan, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Indranil Sengupta:
Effect of glitches against masked AES S-box implementation and countermeasure. IET Inf. Secur. 3(1): 34-44 (2009) - [j19]Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
An Integrated ECC-MAC Based on RS Code. Trans. Comput. Sci. 4: 117-135 (2009) - [c56]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
A Novel Seed Selection Algorithm for Test Time Reduction in BIST. Asian Test Symposium 2009: 15-20 - [c55]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
A hierarchical approach towards system level static timing verification of SoCs. ICCD 2009: 201-206 - [c54]Mounita Saha, Dipanwita Roy Chowdhury:
An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networks. ICETE (Selected Papers) 2009: 212-223 - [c53]Mounita Saha, Dipanwita Roy Chowdhury:
An Efficient Group Key Agreement Protocol for Heterogeneous Environment. SECRYPT 2009: 182-189 - [c52]Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
Nmix: An Ideal Candidate for Key Mixing. SECRYPT 2009: 285-288 - [c51]Mayank Varshney, Dipanwita Roy Chowdhury:
A New Image Encryption Algorithm using Cellular Automata. SECRYPT 2009: 289-292 - [i4]Mounita Saha, Dipanwita Roy Chowdhury:
A Secure and Efficient Protocol for Group Key agreement in Heterogeneous Environment. CoRR abs/0908.2509 (2009) - [i3]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Diagonal Fault Attack on the Advanced Encryption Standard. IACR Cryptol. ePrint Arch. 2009: 581 (2009) - 2008
- [j18]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Customizing Cellular Message Encryption Algorithm. Int. J. Netw. Secur. 7(2): 193-201 (2008) - [j17]Shiladitya Munshi, Nirmalya Sundar Maiti, Deepan Ray, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri:
An Analytical Framework for Characterizing Restricted Two Dimensional Cellular Automata Evolution. J. Cell. Autom. 3(4): 313-335 (2008) - [j16]Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury:
VLSI Architecture of a Cellular Automata based One-Way Function. J. Comput. 3(5): 46-53 (2008) - [c50]Sourav Das, Dipanwita Roy Chowdhury:
An Efficient n×nBoolean Mapping Using Additive Cellular Automata. ACRI 2008: 168-173 - [c49]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Chester Rebeiro
:
Theory of Composing Non-linear Machines with Predictable Cyclic Structures. ACRI 2008: 210-219 - [c48]Jaydeb Bhaumik, Dipanwita Roy Chowdhury, Indrajit Chakrabarti:
An Improved Double Byte Error Correcting Code Using Cellular Automata. ACRI 2008: 463-470 - [c47]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
coreBIST: A Cellular Automata Based Core for Self Testing System-on-Chips. ACRI 2008: 506-511 - [c46]Mounita Saha, Dipanwita Roy Chowdhury, Indranil Sengupta:
A secure verifiable key agreement protocol for mobile conferencing. COMSWARE 2008: 219-222 - [c45]Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta:
A GF(p) elliptic curve group operator resistant against side channel attacks. ACM Great Lakes Symposium on VLSI 2008: 53-58 - [c44]Jaydeb Bhaumik, Balaji Janakiram, Dipanwita Roy Chowdhury:
Architectural Design of CA-Based Double Byte Error Correcting Codec. ICIIS 2008: 1-6 - [c43]Rupsa Chakraborty, Dipanwita Roy Chowdhury:
Raising the Level of Abstraction for the Timing Verification of System-on-Chips. ISVLSI 2008: 459-462 - [c42]Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:
Single Chip Encryptor/Decryptor Core Implementation of AES Algorithm. VLSI Design 2008: 693-698 - [e1]Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das:
Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings. Lecture Notes in Computer Science 5365, Springer 2008, ISBN 978-3-540-89753-8 [contents] - 2007
- [j15]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Theory of a Class of Complemented Group Cellular Automata and Its Application to Cryptography. J. Cell. Autom. 2(3): 243-271 (2007) - [j14]Shibaji Banerjee, Dipanwita Roy Chowdhury, Bhargab B. Bhattacharya:
An Efficient Scan Tree Design for Compact Test Pattern Set. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(7): 1331-1339 (2007) - [j13]Debdeep Mukhopadhyay, Gaurav Sengar, Dipanwita Roy Chowdhury:
Hierarchical Verification of Galois Field Circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(10): 1893-1898 (2007) - [j12]Gaurav Sengar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Secured Flipped Scan-Chain Model for Crypto-Architecture. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(11): 2080-2084 (2007) - [c41]