Dipanwita Roy Chowdhury

From MaRDI portal
(Redirected from Person:1007296)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient and optimized modeling of S-Boxes2026-01-08Paper
Security analysis of WG-7 lightweight stream cipher against cube attack2025-02-05Paper
Verifiable delay function based on non-linear hybrid cellular automata2025-02-05Paper
Key-dependent dynamic sbox for KASUMI block cipher2025-02-05Paper
Deep learning-based differential distinguishers for NIST standard authenticated encryption and permutations2025-02-05Paper
Non-malleable codes from leakage resilient cryptographic primitives2024-07-19Paper
Synthesis of maximum length cellular automata with nonlinearity injections2023-09-04Paper
A Family of Subfield Hyperelliptic Curves for Use in Cryptography
1515.94069
2022-12-21Paper
CArrency: an energy-efficient proof-of-work scheme for crypto-currencies2022-10-07Paper
Image encryption with parallel evolution of 2-D cellular automata2022-10-07Paper
Investigating four neighbourhood cellular automata as better cryptographic primitives
Journal of Discrete Mathematical Sciences and Cryptography
2022-04-19Paper
Generating nonlinear codes for multi-bit symbol error correction using cellular automata
Physica D
2022-03-16Paper
Preventing fault attack on stream ciphers by fault detection and correction2021-08-31Paper
Design of hash function using two dimensional cellular automata2021-08-31Paper
Preventing differential fault analysis attack on AEGIS family of ciphers2021-08-31Paper
scientific article; zbMATH DE number 7385042 (Why is no real title available?)2021-08-25Paper
Design of fault-resilient S-boxes for AES-like block ciphers
Cryptography and Communications
2021-07-13Paper
Achieving better security using nonlinear cellular automata as a cryptographic primitive
Communications in Computer and Information Science
2020-06-29Paper
Study of five-neighborhood linear hybrid cellular automata and their synthesis
Communications in Computer and Information Science
2020-06-29Paper
Prevention of fault attacks in cellular automata based stream ciphers2020-03-12Paper
Preventing fault attacks using fault randomisation with a case study on AES
International Journal of Applied Cryptography
2018-11-26Paper
\textsc{Gain}: practical key-recovery attacks on round-reduced \texttt{PAEQ}2018-10-26Paper
\textsc{EnCounter}: on breaking the nonce barrier in differential fault analysis with a case-study on PAEQ2018-02-14Paper
On the security of designing a cellular automata based stream cipher2017-08-25Paper
Leakage squeezing using cellular automata and its application to scan attack
Journal of Cellular Automata
2016-06-10Paper
\textsc{scope}: on the side channel vulnerability of releasing unverified plaintexts
Lecture Notes in Computer Science
2016-05-19Paper
CASca: a CA based scalable stream cipher
Springer Proceedings in Mathematics & Statistics
2015-11-04Paper
NOCAS: a nonlinear cellular automata based stream cipher2015-11-02Paper
Preventing fault attacks using fault randomization with a case study on AES
Information Security and Privacy
2015-10-20Paper
\textsc{escape}: diagonal fault analysis of APE
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Practical distinguishers against 6-round Keccak-\(f\) exploiting self-symmetry
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Leakage squeezing using cellular automata
Cellular Automata and Discrete Complex Systems
2013-10-10Paper
CAvium -- strengthening Trivium stream cipher using cellular automata2013-04-03Paper
Nimix : An involutary nonlinear vectorial Boolean function
Journal of Discrete Mathematical Sciences & Cryptography
2012-06-18Paper
On usage of cellular automata in strengthening stream ciphers
Journal of Discrete Mathematical Sciences & Cryptography
2012-06-18Paper
Fault analysis of grain-128 by targeting NFSR
Lecture Notes in Computer Science
2011-06-29Paper
Null boundary 90/150 cellular automata for multi-byte error correcting code
Lecture Notes in Computer Science
2010-10-04Paper
Provably secure key establishment protocol using one-way functions
Journal of Discrete Mathematical Sciences and Cryptography
2010-05-25Paper
An Integrated ECC-MAC Based on RS Code
Transactions on Computational Science IV
2009-05-12Paper
Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks
Computers and Electrical Engineering
2009-03-20Paper
An Efficient n ×n Boolean Mapping Using Additive Cellular Automata
Lecture Notes in Computer Science
2008-11-27Paper
An Improved Double Byte Error Correcting Code Using Cellular Automata
Lecture Notes in Computer Science
2008-11-27Paper
Characterization of a Class of Complemented Group Cellular Automata
Lecture Notes in Computer Science
2005-08-17Paper
Design of CAECC - cellular automata based error correcting code
IEEE Transactions on Computers
2003-10-16Paper
Theory and application of nongroup cellular automata for synthesis of easily testable finite state machines
IEEE Transactions on Computers
1996-01-01Paper
CA-based byte error-correcting code
IEEE Transactions on Computers
1995-01-01Paper
A low-cost high-capacity associative memory design using cellular automata
IEEE Transactions on Computers
1995-01-01Paper


Research outcomes over time


This page was built for person: Dipanwita Roy Chowdhury