Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database U Chatterjee, V Govindan, R Sadhukhan, D Mukhopadhyay, ... IEEE transactions on dependable and secure computing 16 (3), 424-437, 2018 | 268 | 2018 |
Generating secure hardware using chatgpt resistant to cwes M Nair, R Sadhukhan, D Mukhopadhyay Cryptology ePrint Archive, 2023 | 40 | 2023 |
An evaluation of lightweight block ciphers for resource-constrained applications: Area, performance, and security R Sadhukhan, S Patranabis, A Ghoshal, D Mukhopadhyay, V Saraswat, ... Journal of Hardware and Systems Security 1, 203-218, 2017 | 29 | 2017 |
Lightweight and side-channel secure 4x4 S-boxes from cellular automata rules A Ghoshal, R Sadhukhan, S Patranabis, N Datta, S Picek, ... Cryptology ePrint Archive, 2018 | 25 | 2018 |
DFARPA: Differential fault attack resistant physical design automation M Khairallah, R Sadhukhan, R Samanta, J Breier, S Bhasin, ... 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018 | 17 | 2018 |
Count your toggles: A new leakage model for pre-silicon power analysis of crypto designs R Sadhukhan, P Mathew, DB Roy, D Mukhopadhyay Journal of Electronic Testing 35, 605-619, 2019 | 14 | 2019 |
PUFSSL: An OpenSSL extension for PUF based authentication U Chatterjee, R Sadhukhan, V Govindan, D Mukhopadhyay, ... 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 1-5, 2018 | 13 | 2018 |
How hardened is your hardware? guiding chatgpt to generate secure hardware resistant to cwes M Nair, R Sadhukhan, D Mukhopadhyay International Symposium on Cyber Security, Cryptology, and Machine Learning …, 2023 | 11 | 2023 |
Lightweight Design Choices for LED-like Block Ciphers S Sarkar, H Syed, R Sadhukhan, D Mukhopadhyay Progress in Cryptology–INDOCRYPT 2017: 18th International Conference on …, 2017 | 11 | 2017 |
Stupify: a hardware countermeasure of kracks in wpa2 using physically unclonable functions U Chatterjee, R Sadhukhan, D Mukhopadhyay, R Subhra Chakraborty, ... Companion Proceedings of the Web Conference 2020, 217-221, 2020 | 10 | 2020 |
PUF+ IBE: blending physically unclonable functions with identity based encryption for authentication and key exchange in IoTs U Chatterjee, V Govindan, R Sadhukhan, D Mukhopadhyay, ... Cryptology ePrint Archive, 2017 | 9 | 2017 |
Shortest path to secured hardware: Domain oriented masking with high-level-synthesis R Sadhukhan, S Saha, D Mukhopadhyay 2021 58th ACM/IEEE Design Automation Conference (DAC), 223-228, 2021 | 8 | 2021 |
DFARPA: differential fault attack resistant physical design automation, in 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE) M Khairallah, R Sadhukhan, R Samanta, J Breier, S Bhasin, ... IEEE 59, 1171-1174, 2018 | 6 | 2018 |
Trifle N Datta, A Ghoshal, D Mukhopadhyay, S Patranabis, S Picek, ... Submission to the NIST Lightweight Cryptography Competition, 2019 | 5 | 2019 |
Light but tight: Lightweight composition of serialized s-boxes with diffusion layers for strong ciphers R Sadhukhan, A Chakraborty, N Datta, S Patranabis, D Mukhopadhyay International Conference on Security, Privacy, and Applied Cryptography …, 2022 | 4 | 2022 |
Power efficiency of s-boxes: From a machine-learning-based tool to a deterministic model R Sadhukhan, N Datta, D Mukhopadhyay IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019 | 3 | 2019 |
United we stand: A threshold signature scheme for identifying outliers in PLCs U Chatterjee, P Santikellur, R Sadhukhan, V Govindan, D Mukhopadhyay, ... Proceedings of the 56th Annual Design Automation Conference 2019, 1-2, 2019 | 3 | 2019 |
A machine learning based approach to predict power efficiency of S-boxes R Sadhukhan, N Datta, D Mukhopadhyay 2019 32nd International Conference on VLSI Design and 2019 18th …, 2019 | 3 | 2019 |
Netlist Whisperer: AI and NLP Fight Circuit Leakage! M Nair, R Sadhukhan, H Pearce, D Mukhopadhyay, R Karri Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware …, 2023 | 2 | 2023 |
SENTAUR: Security EnhaNced Trojan Assessment Using LLMs Against Undesirable Revisions J Bhandari, R Sadhukhan, P Krishnamurthy, F Khorrami, R Karri arXiv preprint arXiv:2407.12352, 2024 | 1 | 2024 |