default search action
Subidh Ali
Person information
- affiliation: Indian Institute of Technology, Kharagpur
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Yogendra Sao, Sk Subidh Ali, Bodhisatwa Mazumdar:
DefScan: Provably Defeating Scan Attack on AES-Like Ciphers. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(8): 2326-2339 (2024) - 2023
- [j11]Dipojjwal Ray, Yogendra Sao, Santosh Biswas, Sk Subidh Ali:
On Securing Cryptographic ICs against Scan-based Attacks: A Hamming Weight Distribution Perspective. ACM J. Emerg. Technol. Comput. Syst. 19(2): 10:1-10:20 (2023) - [j10]Yogendra Sao, Sk Subidh Ali:
Security Analysis of Scan Obfuscation Techniques. IEEE Trans. Inf. Forensics Secur. 18: 2842-2855 (2023) - 2019
- [j9]Sk Subidh Ali, Debdeep Mukhopadhyay:
Guest Editorial SPACE 2017 Special Issue in the Journal of Hardware and Systems Security (HaSS). J. Hardw. Syst. Secur. 3(1): 1-2 (2019) - 2017
- [j8]Bodhisatwa Mazumdar, Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu:
Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers. IEEE Trans. Emerg. Top. Comput. 5(3): 317-328 (2017) - 2016
- [j7]Sk Subidh Ali, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, Krishnendu Chakrabarty:
Supply-Chain Security of Digital Microfluidic Biochips. Computer 49(8): 36-43 (2016) - [j6]Chandra K. H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali, Ozgur Sinanoglu:
A Comparative Security Analysis of Current and Emerging Technologies. IEEE Micro 36(5): 50-61 (2016) - [j5]Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, Ramesh Karri:
Security Assessment of Cyberphysical Digital Microfluidic Biochips. IEEE ACM Trans. Comput. Biol. Bioinform. 13(3): 445-458 (2016) - [j4]Bodhisatwa Mazumdar, Sk Subidh Ali, Ozgur Sinanoglu:
A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities. ACM Trans. Design Autom. Electr. Syst. 22(1): 11:1-11:26 (2016) - 2015
- [j3]Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri:
Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(5): 808-821 (2015) - 2013
- [j2]Sk Subidh Ali, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
A Fault Analysis Perspective for Testing of Secured SoC Cores. IEEE Des. Test 30(5): 63-73 (2013) - [j1]Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential fault analysis of AES: towards reaching its limits. J. Cryptogr. Eng. 3(2): 73-97 (2013)
Conference and Workshop Papers
- 2023
- [c29]Yogendra Sao, Debanka Giri, Soham Saha, Sk Subidh Ali:
Vulnerability of Dynamic Masking in Test Compression. SPACE 2023: 101-116 - 2022
- [c28]Yogendra Sao, Anjum Riaz, Satyadev Ahlawat, Sk Subidh Ali:
Evaluating Security of New Locking SIB-based Architectures. ETS 2022: 1-6 - 2021
- [c27]Sk Subidh Ali, Yogendra Sao, Santosh Biswas:
Opacity preserving Countermeasure using Finite State Machines against Differential Scan Attacks. ETS 2021: 1-2 - [c26]Yogendra Sao, Sk Subidh Ali:
Security Analysis of State-of-the-art Scan Obfuscation Technique. ICCD 2021: 599-602 - 2020
- [c25]Yogendra Sao, K. K. Soundra Pandian, Sk Subidh Ali:
Revisiting the security of static masking and compaction: Discovering new vulnerability and Improved Scan Attack on AES. AsianHOST 2020: 1-6 - 2016
- [c24]Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, Ramesh Karri:
Microfluidic encryption of on-chip biochemical assays. BioCAS 2016: 152-155 - [c23]Chandra K. H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali, Ozgur Sinanoglu:
Power-side-channel analysis of carbon nanotube FET based design. IOLTS 2016: 215-218 - [c22]Bodhisatwa Mazumdar, Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu:
Thwarting timing attacks on NEMS relay based designs. VTS 2016: 1-4 - 2015
- [c21]Muhammad Yasin, Bodhisatwa Mazumdar, Sk Subidh Ali, Ozgur Sinanoglu:
Security analysis of logic encryption against the most effective side-channel attack: DPA. DFTS 2015: 97-102 - [c20]Sk Subidh Ali, Ozgur Sinanoglu:
Scan attack on Elliptic Curve Cryptosystem. DFTS 2015: 115-118 - [c19]Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, Ramesh Karri:
Security implications of cyberphysical digital microfluidic biochips. ICCD 2015: 483-486 - [c18]Bodhisatwa Mazumdar, Sk Subidh Ali, Ozgur Sinanoglu:
Power analysis attacks on ARX: An application to Salsa20. IOLTS 2015: 40-43 - [c17]Jerry Backer, Sk Subidh Ali, Kurt Rosenfeld, David Hély, Ozgur Sinanoglu, Ramesh Karri:
A secure design-for-test infrastructure for lifetime security of SoCs. ISCAS 2015: 37-40 - [c16]Samah Mohamed Saeed, Bodhisatwa Mazumdar, Sk Subidh Ali, Ozgur Sinanoglu:
Timing attack on NEMS relay based design of AES. VLSI-SoC 2015: 264-269 - [c15]Sk Subidh Ali, Ozgur Sinanoglu:
TMO: A new class of attack on cipher misusing test infrastructure. VTS 2015: 1-4 - 2014
- [c14]Sk Subidh Ali, Ozgur Sinanoglu, Ramesh Karri:
Test-mode-only scan attack using the boundary scan chain. ETS 2014: 1-6 - [c13]Sk Subidh Ali, Ozgur Sinanoglu, Samah Mohamed Saeed, Ramesh Karri:
New scan attacks against state-of-the-art countermeasures and DFT. HOST 2014: 142-147 - [c12]Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu, Ramesh Karri:
Test-mode-only scan attack and countermeasure for contemporary scan architectures. ITC 2014: 1-8 - [c11]Sk Subidh Ali, Ozgur Sinanoglu, Ramesh Karri:
AES design space exploration new line for scan attack resiliency. VLSI-SoC 2014: 1-6 - 2013
- [c10]Subidh Ali, Debdeep Mukhopadhyay:
Improved Differential Fault Analysis of CLEFIA. FDTC 2013: 60-70 - [c9]Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri:
Scan attack in presence of mode-reset countermeasure. IOLTS 2013: 230-231 - [c8]Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri:
New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure. VLSI-SoC (Selected Papers) 2013: 48-68 - [c7]Sk Subidh Ali, Ozgur Sinanoglu, Samah Mohamed Saeed, Ramesh Karri:
New scan-based attack using only the test mode. VLSI-SoC 2013: 234-239 - 2012
- [c6]Subidh Ali, Debdeep Mukhopadhyay:
Differential Fault Analysis of Twofish. Inscrypt 2012: 10-28 - 2011
- [c5]Subidh Ali, Debdeep Mukhopadhyay:
An Improved Differential Fault Analysis on AES-256. AFRICACRYPT 2011: 332-347 - [c4]Subidh Ali, Debdeep Mukhopadhyay:
Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault. CARDIS 2011: 50-64 - [c3]Subidh Ali, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Swarup Bhunia:
Multi-level attacks: An emerging security concern for cryptographic hardware. DATE 2011: 1176-1179 - [c2]Subidh Ali, Debdeep Mukhopadhyay:
A Differential Fault Analysis on AES Key Schedule Using Single Fault. FDTC 2011: 35-42 - [c1]Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali:
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. WISTP 2011: 224-233
Editorship
- 2017
- [e1]Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarth:
Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings. Lecture Notes in Computer Science 10662, Springer 2017, ISBN 978-3-319-71500-1 [contents]
Informal and Other Publications
- 2024
- [i8]Sowdagar Mahammad Shahid, Sudev Kumar Padhi, Umesh Kashyap, Sk Subidh Ali:
Generalized Deepfake Attribution. CoRR abs/2406.18278 (2024) - [i7]Sudev Kumar Padhi, Sk Subidh Ali:
DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques. CoRR abs/2407.06552 (2024) - [i6]Umesh Kashyap, Sudev Kumar Padhi, Sk Subidh Ali:
Attack GAN (AGAN ): A new Security Evaluation Tool for Perceptual Encryption. CoRR abs/2407.06570 (2024) - 2023
- [i5]Sudev Kumar Padhi, Mohit Kumar, Debanka Giri, Subidh Ali:
RoboSense At Edge: Detecting Slip, Crumple and Shape of the Object in Robotic Hand for Teleoprations. CoRR abs/2311.07888 (2023) - 2012
- [i4]Subidh Ali, Debdeep Mukhopadhyay:
Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis. IACR Cryptol. ePrint Arch. 2012: 286 (2012) - [i3]Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential Fault Analysis of AES: Towards Reaching its Limits. IACR Cryptol. ePrint Arch. 2012: 446 (2012) - 2010
- [i2]Subidh Ali, Debdeep Mukhopadhyay:
Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault. IACR Cryptol. ePrint Arch. 2010: 451 (2010) - [i1]Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential Fault Analysis of AES using a Single Multiple-Byte Fault. IACR Cryptol. ePrint Arch. 2010: 636 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint