default search action
Sikhar Patranabis
Person information
- affiliation: IBM Research India, Bangalore, India
- affiliation (former): ETH Zurich, Switzerland
- affiliation (former): Nanyang Technological University (NTU), Singapore
- affiliation (former, PhD 2019): Indian Institute of Technology (IIT) Kharagpur, Department of Computer Science and Engineering, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay:
Compact Key Function Secret Sharing with Non-linear Decoder. IACR Commun. Cryptol. 1(2): 8 (2024) - [j24]Navid Alamati, Sikhar Patranabis:
Cryptographic Primitives with Hinting Property. J. Cryptol. 37(3): 21 (2024) - [j23]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. Proc. Priv. Enhancing Technol. 2024(1): 549-581 (2024) - [c47]Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay:
Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum World. ACNS (2) 2024: 47-78 - [c46]Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy. AsiaCCS 2024 - [c45]Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Nitin Singh:
Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs. ASIACRYPT (6) 2024: 133-166 - [c44]Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh:
Batching-Efficient RAM using Updatable Lookup Arguments. CCS 2024: 4077-4091 - [c43]Pankaj Dayama, Vinayaka Pandit, Sikhar Patranabis, Abhishek Singh, Nitin Singh:
Poster: A Secure Multiparty Computation Platform for Squeaky-Clean Data Rooms. CCS 2024: 5069-5071 - [c42]Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi:
Asterisk: Super-fast MPC with a Friend. SP 2024: 542-560 - [c41]Sikhar Patranabis:
Post-quantum Multi-client Conjunctive Searchable Symmetric Encryption from Isogenies. SPACE 2024: 225-257 - [i54]Hart Montgomery, Sikhar Patranabis:
Public-Key Cryptography through the Lens of Monoid Actions. IACR Cryptol. ePrint Arch. 2024: 236 (2024) - [i53]Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2024: 573 (2024) - [i52]Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh:
Batching-Efficient RAM using Updatable Lookup Arguments. IACR Cryptol. ePrint Arch. 2024: 840 (2024) - [i51]Animesh Singh, Sikhar Patranabis, Debdeep Mukhopadhyay:
Threshold OPRF from Threshold Additive HE. IACR Cryptol. ePrint Arch. 2024: 1032 (2024) - [i50]Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay:
Compact Key Function Secret Sharing with Non-linear Decoder. IACR Cryptol. ePrint Arch. 2024: 1062 (2024) - [i49]Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh:
GAPP: Generic Aggregation of Polynomial Protocols. IACR Cryptol. ePrint Arch. 2024: 1685 (2024) - [i48]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis:
A Query Reconstruction Attack on the Chase-Shen Substring-Searchable Symmetric Encryption Scheme. IACR Cryptol. ePrint Arch. 2024: 1837 (2024) - 2023
- [j22]Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy:
Minicrypt Primitives with Algebraic Structure and Applications. J. Cryptol. 36(1): 2 (2023) - [j21]Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay:
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries. Proc. Priv. Enhancing Technol. 2023(1): 115-139 (2023) - [j20]Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
CAMiSE: Content Addressable Memory-Integrated Searchable Encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 70(8): 3254-3267 (2023) - [j19]Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay:
Commitments via Physically Related Functions. IEEE Trans. Inf. Forensics Secur. 18: 1497-1508 (2023) - [c40]Navid Alamati, Hart Montgomery, Sikhar Patranabis:
Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs. CT-RSA 2023: 333-359 - [c39]Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, Benjamin Wesolowski:
Supersingular Curves You Can Trust. EUROCRYPT (2) 2023: 405-437 - [c38]Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay:
Conjunctive Searchable Symmetric Encryption from Hard Lattices. EuroS&P 2023: 958-978 - [c37]Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty:
Private Certifier Intersection. NDSS 2023 - [c36]Peihan Miao, Sikhar Patranabis, Gaven J. Watson:
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH. Public Key Cryptography (2) 2023: 368-398 - [c35]Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar:
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH. Public Key Cryptography (1) 2023: 376-405 - [c34]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis:
Rethinking Searchable Symmetric Encryption. SP 2023: 1401-1418 - [i47]Debadrita Talapatra, Nimish Mishra, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
SEC: Fast Private Boolean Circuit Evaluation from Encrypted Look-ups. IACR Cryptol. ePrint Arch. 2023: 628 (2023) - [i46]Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay:
Conjunctive Searchable Symmetric Encryption from Hard Lattices. IACR Cryptol. ePrint Arch. 2023: 872 (2023) - [i45]Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi:
sfAsterisk: Super-fast MPC with a Friend. IACR Cryptol. ePrint Arch. 2023: 1098 (2023) - [i44]Navid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar:
Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH. IACR Cryptol. ePrint Arch. 2023: 1170 (2023) - 2022
- [j18]Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay:
FlexiPair: An Automated Programmable Framework for Pairing Cryptosystems. IEEE Trans. Computers 71(3): 506-519 (2022) - [j17]Harishma Boyapally, Paulson Mathew, Sikhar Patranabis, Urbi Chatterjee, Umang Agarwal, Manu Maheshwari, Soumyajit Dey, Debdeep Mukhopadhyay:
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. IEEE Trans. Dependable Secur. Comput. 19(1): 663-680 (2022) - [j16]Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay:
Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange. IEEE Trans. Inf. Forensics Secur. 17: 3847-3862 (2022) - [j15]Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman:
On the Quantum Security of OCB. IACR Trans. Symmetric Cryptol. 2022(2): 379-414 (2022) - [c33]Navid Alamati, Sikhar Patranabis:
Cryptographic Primitives with Hinting Property. ASIACRYPT (1) 2022: 33-62 - [c32]Charanjit S. Jutla, Sikhar Patranabis:
Efficient Searchable Symmetric Encryption for Join Queries. ASIACRYPT (3) 2022: 304-333 - [c31]Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Work-in-Progress: CAMiSE: Content Addressable Memory-integrated Searchable Encryption. CASES 2022: 21-22 - [c30]Rajat Sadhukhan, Anirban Chakraborty, Nilanjan Datta, Sikhar Patranabis, Debdeep Mukhopadhyay:
Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers. SPACE 2022: 28-49 - [c29]Saikrishna Badrinarayanan, Sikhar Patranabis, Pratik Sarkar:
Statistical Security in Two-Party Computation Revisited. TCC (2) 2022: 181-210 - [c28]Yuval Ishai, Arpita Patra, Sikhar Patranabis, Divya Ravi, Akshayaram Srinivasan:
Fully-Secure MPC with Minimal Trust. TCC (2) 2022: 470-501 - [i43]Peihan Miao, Sikhar Patranabis, Gaven J. Watson:
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE. IACR Cryptol. ePrint Arch. 2022: 311 (2022) - [i42]Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman:
On the Quantum Security of OCB. IACR Cryptol. ePrint Arch. 2022: 699 (2022) - [i41]Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay:
XOR Compositions of Physically Related Functions. IACR Cryptol. ePrint Arch. 2022: 954 (2022) - [i40]Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay:
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries. IACR Cryptol. ePrint Arch. 2022: 1096 (2022) - [i39]Saikrishna Badrinarayanan, Sikhar Patranabis, Pratik Sarkar:
Statistical Security in Two-Party Computation Revisited. IACR Cryptol. ePrint Arch. 2022: 1190 (2022) - [i38]Yuval Ishai, Arpita Patra, Sikhar Patranabis, Divya Ravi, Akshayaram Srinivasan:
Fully-Secure MPC with Minimal Trust. IACR Cryptol. ePrint Arch. 2022: 1248 (2022) - [i37]Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty:
Private Certifier Intersection. IACR Cryptol. ePrint Arch. 2022: 1302 (2022) - [i36]Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, Benjamin Wesolowski:
Supersingular Curves You Can Trust. IACR Cryptol. ePrint Arch. 2022: 1469 (2022) - [i35]Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar:
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH. IACR Cryptol. ePrint Arch. 2022: 1511 (2022) - [i34]Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Efficient Threshold FHE with Application to Real-Time Systems. IACR Cryptol. ePrint Arch. 2022: 1625 (2022) - [i33]Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Nitin Singh:
Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs. IACR Cryptol. ePrint Arch. 2022: 1648 (2022) - [i32]Navid Alamati, Sikhar Patranabis:
Cryptographic Primitives with Hinting Property. IACR Cryptol. ePrint Arch. 2022: 1770 (2022) - 2021
- [j14]Anirban Chakraborty, Sarani Bhattacharya, Manaar Alam, Sikhar Patranabis, Debdeep Mukhopadhyay:
RASSLE: Return Address Stack based Side-channel LEakage. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2): 275-303 (2021) - [c27]Navid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar:
Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH. ASIACRYPT (2) 2021: 305-334 - [c26]Sikhar Patranabis, Debdeep Mukhopadhyay:
Forward and Backward Private Conjunctive Searchable Symmetric Encryption. NDSS 2021 - [c25]Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis:
BETA: Biometric-Enabled Threshold Authentication. Public Key Cryptography (2) 2021: 290-318 - [i31]Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange. IACR Cryptol. ePrint Arch. 2021: 389 (2021) - [i30]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis:
Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing. IACR Cryptol. ePrint Arch. 2021: 879 (2021) - [i29]Charanjit S. Jutla, Sikhar Patranabis:
Efficient Searchable Symmetric Encryption for Join Queries. IACR Cryptol. ePrint Arch. 2021: 1471 (2021) - 2020
- [j13]Sai Praveen Kadiyala, Manaar Alam, Yash Shrivastava, Sikhar Patranabis, Muhamed Fauzi Bin Abbas, Arnab Kumar Biswas, Debdeep Mukhopadhyay, Thambipillai Srikanthan:
LAMBDA: Lightweight Assessment of Malware for emBeddeD Architectures. ACM Trans. Embed. Comput. Syst. 19(4): 23:1-23:31 (2020) - [c24]Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis:
Cryptographic Group Actions and Applications. ASIACRYPT (2) 2020: 411-439 - [c23]Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay:
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation. EUROCRYPT (1) 2020: 612-643 - [c22]Arnab Bag, Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Cryptographically Secure Multi-tenant Provisioning of FPGAs. SPACE 2020: 208-225 - [i28]Navid Alamati, Hart Montgomery, Sikhar Patranabis:
Ring Key-Homomorphic Weak PRFs and Applications. IACR Cryptol. ePrint Arch. 2020: 606 (2020) - [i27]Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis:
BETA: Biometric Enabled Threshold Authentication. IACR Cryptol. ePrint Arch. 2020: 679 (2020) - [i26]Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis:
Cryptographic Group Actions and Applications. IACR Cryptol. ePrint Arch. 2020: 1188 (2020) - [i25]Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2020: 1328 (2020) - [i24]Sikhar Patranabis, Debdeep Mukhopadhyay:
Forward and Backward Private Conjunctive Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2020: 1342 (2020)
2010 – 2019
- 2019
- [j12]Sikhar Patranabis, Debdeep Mukhopadhyay:
Identity-based key aggregate cryptosystem from multilinear maps. Adv. Math. Commun. 13(4): 759-778 (2019) - [j11]Sikhar Patranabis, Debapriya Basu Roy, Anirban Chakraborty, Naveen Nagar, Astikey Singh, Debdeep Mukhopadhyay, Santosh Ghosh:
Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications. J. Hardw. Syst. Secur. 3(2): 103-131 (2019) - [j10]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay:
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Trans. Computers 68(3): 347-361 (2019) - [j9]Sikhar Patranabis, Nilanjan Datta, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations. IEEE Trans. Computers 68(10): 1498-1510 (2019) - [j8]Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IEEE Trans. Inf. Forensics Secur. 14(4): 954-968 (2019) - [c21]Navid Alamati, Hart Montgomery, Sikhar Patranabis:
Symmetric Primitives with Structured Secrets. CRYPTO (1) 2019: 650-679 - [c20]Sayandeep Saha, S. Nishok Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay, Pallab Dasgupta:
ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures. DAC 2019: 136 - [c19]Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy:
Minicrypt Primitives with Algebraic Structure and Applications. EUROCRYPT (2) 2019: 55-82 - [c18]Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna:
Function Private Predicate Encryption for Low Min-Entropy Predicates. Public Key Cryptography (2) 2019: 189-219 - [p1]Durga Prasad Sahoo, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Fault-Tolerant Implementations of Physically Unclonable Functions on FPGA. Security and Fault Tolerance in Internet of Things 2019: 129-153 - [i23]Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy:
Minicrypt Primitives with Algebraic Structure and Applications. IACR Cryptol. ePrint Arch. 2019: 108 (2019) - [i22]Navid Alamati, Hart Montgomery, Sikhar Patranabis:
Symmetric Primitives with Structured Secrets. IACR Cryptol. ePrint Arch. 2019: 608 (2019) - [i21]Sayandeep Saha, Debapriya Basu Roy, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2019: 937 (2019) - 2018
- [j7]Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay:
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules. IACR Trans. Symmetric Cryptol. 2018(3): 311-334 (2018) - [c17]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. CCS 2018: 745-762 - [c16]Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay:
POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS. AsiaCCS 2018: 849-851 - [c15]Arnab Bag, Sikhar Patranabis, L. Tribhuvan, Debdeep Mukhopadhyay:
Hardware Acceleration of Searchable Encryption. CCS 2018: 2201-2203 - [c14]Manish Kesarwani, Akshar Kaul, Prasad Naldurg, Sikhar Patranabis, Gagandeep Singh, Sameep Mehta, Debdeep Mukhopadhyay:
Efficient Secure k-Nearest Neighbours over Encrypted Data. EDBT 2018: 564-575 - [c13]Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay:
Template-Based Fault Injection Analysis of Block Ciphers. SPACE 2018: 21-36 - [i20]Arnab Bag, Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Cryptographically Secure Multi-Tenant Provisioning of FPGAs. CoRR abs/1802.04136 (2018) - [i19]Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay:
Template-based Fault Injection Analysis of Block Ciphers. IACR Cryptol. ePrint Arch. 2018: 72 (2018) - [i18]Sikhar Patranabis, Debdeep Mukhopadhyay:
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption. IACR Cryptol. ePrint Arch. 2018: 190 (2018) - [i17]Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay:
Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules. IACR Cryptol. ePrint Arch. 2018: 832 (2018) - [i16]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2018: 1168 (2018) - [i15]Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna:
Function Private Predicate Encryption for Low Min-Entropy Predicates. IACR Cryptol. ePrint Arch. 2018: 1250 (2018) - 2017
- [j6]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. J. Hardw. Syst. Secur. 1(1): 3-17 (2017) - [j5]Rajat Sadhukhan, Sikhar Patranabis, Ashrujit Ghoshal, Debdeep Mukhopadhyay, Vishal Saraswat, Santosh Ghosh:
An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security. J. Hardw. Syst. Secur. 1(3): 203-218 (2017) - [j4]Anju P. Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications. Microprocess. Microsystems 52: 131-144 (2017) - [j3]Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud. IEEE Trans. Computers 66(5): 891-904 (2017) - [j2]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti:
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers. IEEE Trans. Inf. Forensics Secur. 12(5): 1092-1102 (2017) - [c12]Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks To Design Fault Resistant Ciphers (Full Version). Conf. Computing Frontiers 2017: 402-408 - [c11]Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin:
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers. FDTC 2017: 25-32 - [c10]S. V. Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi:
A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20. FDTC 2017: 33-40 - [i14]Sikhar Patranabis, Debdeep Mukhopadhyay:
Encrypt-Augment-Recover: Computationally Function Private Predicate Encryption in the Public-Key Setting. IACR Cryptol. ePrint Arch. 2017: 319 (2017) - [i13]Sikhar Patranabis, Debdeep Mukhopadhyay:
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs. IACR Cryptol. ePrint Arch. 2017: 668 (2017) - [i12]Sikhar Patranabis, Debdeep Mukhopadhyay:
Lightweight Symmetric-Key Hidden Vector Encryption without Pairings. IACR Cryptol. ePrint Arch. 2017: 796 (2017) - [i11]Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IACR Cryptol. ePrint Arch. 2017: 1008 (2017) - [i10]Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin:
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 1073 (2017) - [i9]S. V. Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi:
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20. IACR Cryptol. ePrint Arch. 2017: 1074 (2017) - 2016
- [j1]Anjan Sarkar, Rupert Reiger, Debashis Chatterjee, Sikhar Patranabis, Haritabh Singh, Prithwish Mukherjee:
Simulation study of a constant time hybrid approach for large scale terrain mapping using satellite stereo imagery. Robotics Auton. Syst. 79: 132-146 (2016) - [c9]Anju P. Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Remote Dynamic Clock Reconfiguration Based Attacks on Internet of Things Applications. DSD 2016: 431-438 - [c8]Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Fault Tolerant Implementations of Delay-Based Physically Unclonable Functions on FPGA. FDTC 2016: 87-101 - [c7]Sikhar Patranabis, Debapriya Basu Roy, Yash Shrivastava, Debdeep Mukhopadhyay, Santosh Ghosh:
Parsimonious design strategy for linear layers with high diffusion in block ciphers. HOST 2016: 31-36 - [c6]Sikhar Patranabis, Debapriya Basu Roy, Praveen Kumar Vadnala, Debdeep Mukhopadhyay, Santosh Ghosh:
Shuffling across rounds: A lightweight strategy to counter side-channel attacks. ICCD 2016: 440-443 - [c5]Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks to Design Fault Resistant Ciphers. VLSID 2016: 585-586 - [i8]Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA. IACR Cryptol. ePrint Arch. 2016: 441 (2016) - [i7]Sikhar Patranabis, Debdeep Mukhopadhyay:
Identity-Based Key Aggregate Cryptosystem from Multilinear Maps. IACR Cryptol. ePrint Arch. 2016: 693 (2016) - [i6]Debapriya Basu Roy, Shivam Bhasin, Sikhar Patranabis, Debdeep Mukhopadhyay, Sylvain Guilley:
What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate. IACR Cryptol. ePrint Arch. 2016: 1152 (2016) - 2015
- [c4]Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen, Debdeep Mukhopadhyay:
A Biased Fault Attack on the Time Redundancy Countermeasure for AES. COSADE 2015: 189-203 - [c3]Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:
Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing. INDOCRYPT 2015: 25-44 - [c2]Tanmoy Chakraborty, Sikhar Patranabis, Pawan Goyal, Animesh Mukherjee:
On the Formation of Circles in Co-authorship Networks. KDD 2015: 109-118 - [c1]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. SPACE 2015: 190-209 - [i5]Tanmoy Chakraborty, Sikhar Patranabis, Pawan Goyal, Animesh Mukherjee:
On the Formation of Circles in Co-authorship Networks. CoRR abs/1505.04560 (2015) - [i4]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. IACR Cryptol. ePrint Arch. 2015: 493 (2015) - [i3]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti:
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures. IACR Cryptol. ePrint Arch. 2015: 806 (2015) - [i2]Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:
Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing. IACR Cryptol. ePrint Arch. 2015: 923 (2015) - [i1]Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Using Tweaks To Design Fault Resistant Ciphers. IACR Cryptol. ePrint Arch. 2015: 932 (2015)
Coauthor Index
aka: Hart Montgomery
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint