Dipanwita Roy Chowdhury

From MaRDI portal
Person:1007296

Available identifiers

zbMath Open chowdhury.dipanwita-royWikidataQ102806103 ScholiaQ102806103MaRDI QIDQ1007296

List of research outcomes





PublicationDate of PublicationType
Non-malleable codes from leakage resilient cryptographic primitives2024-07-19Paper
https://portal.mardi4nfdi.de/entity/Q61374652023-09-04Paper
A Family of Subfield Hyperelliptic Curves for Use in Cryptography2022-12-21Paper
CArrency: an energy-efficient proof-of-work scheme for crypto-currencies2022-10-07Paper
Image encryption with parallel evolution of 2-D cellular automata2022-10-07Paper
Investigating four neighbourhood cellular automata as better cryptographic primitives2022-04-19Paper
Generating nonlinear codes for multi-bit symbol error correction using cellular automata2022-03-16Paper
Preventing fault attack on stream ciphers by fault detection and correction2021-08-31Paper
Design of hash function using two dimensional cellular automata2021-08-31Paper
Preventing differential fault analysis attack on AEGIS family of ciphers2021-08-31Paper
https://portal.mardi4nfdi.de/entity/Q50102962021-08-25Paper
Design of fault-resilient S-boxes for AES-like block ciphers2021-07-13Paper
Achieving Better Security Using Nonlinear Cellular Automata as a Cryptographic Primitive2020-06-29Paper
Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesis2020-06-29Paper
https://portal.mardi4nfdi.de/entity/Q52197602020-03-12Paper
Preventing fault attacks using fault randomisation with a case study on AES2018-11-26Paper
\textsc{Gain}: practical key-recovery attacks on round-reduced \texttt{PAEQ}2018-10-26Paper
\textsc{EnCounter}: on breaking the nonce barrier in differential fault analysis with a case-study on PAEQ2018-02-14Paper
On the security of designing a cellular automata based stream cipher2017-08-25Paper
Leakage squeezing using cellular automata and its application to scan attack2016-06-10Paper
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts2016-05-19Paper
CASca:A CA Based Scalable Stream Cipher2015-11-04Paper
https://portal.mardi4nfdi.de/entity/Q34500012015-11-02Paper
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES2015-10-20Paper
EscApe: Diagonal Fault Analysis of APE2015-09-10Paper
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry2014-06-24Paper
Leakage Squeezing Using Cellular Automata2013-10-10Paper
https://portal.mardi4nfdi.de/entity/Q49121662013-04-03Paper
Nimix:An involutary nonlinear vectorial boolean function2012-06-18Paper
On usage of cellular automata in strengthening stream ciphers2012-06-18Paper
Fault Analysis of Grain-128 by Targeting NFSR2011-06-29Paper
Null Boundary 90/150 Cellular Automata for Multi-byte Error Correcting Code2010-10-04Paper
Provably secure key establishment protocol using one-way functions2010-05-25Paper
An Integrated ECC-MAC Based on RS Code2009-05-12Paper
Parallel crypto-devices for GF\((p)\) elliptic curve multiplication resistant against side channel attacks2009-03-20Paper
An Efficient n ×n Boolean Mapping Using Additive Cellular Automata2008-11-27Paper
An Improved Double Byte Error Correcting Code Using Cellular Automata2008-11-27Paper
Characterization of a Class of Complemented Group Cellular Automata2005-08-17Paper
Design of CAECC - cellular automata based error correcting code2003-10-16Paper
Theory and application of nongroup cellular automata for synthesis of easily testable finite state machines1996-01-01Paper
CA-based byte error-correcting code1995-01-01Paper
A low-cost high-capacity associative memory design using cellular automata1995-01-01Paper

Research outcomes over time

This page was built for person: Dipanwita Roy Chowdhury