default search action
Rajat Subhra Chakraborty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Sivappriya Manivannan, Rajat Subhra Chakraborty, Indrajit Chakrabarti, Jothi Rangasamy:
Practical and Efficient PUF-Based Protocol for Authentication and Key Agreement in IoT. IEEE Embed. Syst. Lett. 16(2): 118-121 (2024) - [j50]Mahabub Hasan Mahalat, Shyam Subba, Anindan Mondal, Biplab K. Sikdar, Rajat Subhra Chakraborty, Bibhash Sen:
CAPUF: Design of a configurable circular arbiter PUF with enhanced security and hardware efficiency. Integr. 95: 102113 (2024) - [c72]Kuheli Pratihar, Soumi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Breaching the Gap: Modelling SRAM-PUFs via Side-Channel Signatures. ACM Great Lakes Symposium on VLSI 2024: 574-578 - [i13]Sneha Swaroopa, Rijoy Mukherjee, Anushka Debnath, Rajat Subhra Chakraborty:
Evaluating Large Language Models for Automatic Register Transfer Logic Generation via High-Level Synthesis. CoRR abs/2408.02793 (2024) - 2023
- [b3]Pranesh Santikellur, Rajat Subhra Chakraborty:
Deep Learning for Computational Problems in Hardware Security - Modeling Attacks on Strong Physically Unclonable Function Circuits. Studies in Computational Intelligence 1052, Springer 2023, ISBN 978-981-19-4016-3, pp. 1-84 - [j49]Gisha C. G., Ananda Sankar Chakraborty, Rajat Subhra Chakraborty, Bijoy Antony Jose, Jimson Mathew:
A Novel Physical Unclonable Function Based on Hybrid Current Mirror. J. Hardw. Syst. Secur. 7(4): 125-137 (2023) - [j48]Divakar Singh, Priyanka Singh, Riyanka Jena, Rajat Subhra Chakraborty:
An image forensic technique based on JPEG ghosts. Multim. Tools Appl. 82(9): 14153-14169 (2023) - [j47]Debjit Das, Ruchira Naskar, Rajat Subhra Chakraborty:
Image splicing detection with principal component analysis generated low-dimensional homogeneous feature set based on local binary pattern and support vector machine. Multim. Tools Appl. 82(17): 25847-25864 (2023) - [j46]Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Birds of the Same Feather Flock Together: A Dual-Mode Circuit Candidate for Strong PUF-TRNG Functionalities. IEEE Trans. Computers 72(6): 1636-1651 (2023) - [j45]Rijoy Mukherjee, Rajat Subhra Chakraborty:
Attacks on Recent DNN IP Protection Techniques and Their Mitigation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(11): 3642-3650 (2023) - [c71]Venkata Sreekanth Balijabudda, Kamalesh Acharya, Rajat Subhra Chakraborty, Indrajit Chakrabarti:
Theoretical Enumeration of Deployable Single-Output Strong PUF Instances Based on Uniformity and Uniqueness Constraints. ICISS 2023: 77-87 - [c70]Gisha C. G., Ananda Sankar Chakraborty, Rajat Subhra Chakraborty, Bijoy Antony Jose, Jimson Mathew:
Diode-Triode Current Mirror Inverter PUF: A Novel Mixed-Signal Low Power Analog PUF. MWSCAS 2023: 1132-1136 - 2022
- [j44]Rijoy Mukherjee, Rajat Subhra Chakraborty:
Novel Hardware Trojan Attack on Activation Parameters of FPGA-Based DNN Accelerators. IEEE Embed. Syst. Lett. 14(3): 131-134 (2022) - [j43]Rijoy Mukherjee, Sree Ranjani Rajendran, Rajat Subhra Chakraborty:
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention. J. Cryptogr. Eng. 12(4): 495-522 (2022) - [j42]Pranesh Santikellur, Rajat Subhra Chakraborty:
Correlation Integral-Based Intrinsic Dimension: A Deep-Learning-Assisted Empirical Metric to Estimate the Robustness of Physically Unclonable Functions to Modeling Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(10): 3216-3227 (2022) - [j41]Mahabub Hasan Mahalat, Suraj Mandal, Anindan Mondal, Bibhash Sen, Rajat Subhra Chakraborty:
Implementation, Characterization and Application of Path Changing Switch based Arbiter PUF on FPGA as a lightweight Security Primitive for IoT. ACM Trans. Design Autom. Electr. Syst. 27(3): 26:1-26:26 (2022) - [c69]Akashdeep Saha, Hrivu Banerjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Revisiting Logic Obfuscation Using Cellular Automata. ASCAT 2022: 27-41 - [c68]Debjit Das, Banalata Bhunia, Ruchira Naskar, Rajat Subhra Chakraborty:
Linear and Non-Linear Filter-based Counter-Forensics Against Image Splicing Detection. CVIP (1) 2022: 261-275 - [c67]Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
DIP Learning on CAS-Lock: Using Distinguishing Input Patterns for Attacking Logic Locking. DATE 2022: 688-693 - [p3]Pranesh Santikellur, Rajat Subhra Chakraborty, Swarup Bhunia:
Hardware IP Protection Using Register Transfer Level Locking and Obfuscation of Control and Data Flow. Behavioral Synthesis for Hardware Security 2022: 57-69 - 2021
- [j40]Anindita Chakraborty, Vivek Maurya, Sneha Prasad, Suryansh Gupta, Rajat Subhra Chakraborty, Hafizur Rahaman:
Binary decision diagram-based synthesis technique for improved mapping of Boolean functions inside memristive crossbar-slices. IET Comput. Digit. Tech. 15(2): 112-124 (2021) - [j39]Pranesh Santikellur, Rajat Subhra Chakraborty:
A Computationally Efficient Tensor Regression Network-Based Modeling Attack on XOR Arbiter PUF and Its Variants. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1197-1206 (2021) - [j38]Akashdeep Saha, Hrivu Banerjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
ORACALL: An Oracle-Based Attack on Cellular Automata Guided Logic Locking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(12): 2445-2454 (2021) - [j37]Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
3PAA: A Private PUF Protocol for Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 16: 756-769 (2021) - [j36]Saranyu Chattopadhyay, Pranesh Santikellur, Rajat Subhra Chakraborty, Jimson Mathew, Marco Ottavi:
A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability. ACM Trans. Design Autom. Electr. Syst. 26(6): 41:1-41:24 (2021) - [c66]Pranesh Santikellur, Rijoy Mukherjee, Rajat Subhra Chakraborty:
APUF-BNN: An Automated Framework for Efficient Combinational Logic Based Implementation of Arbiter PUF through Binarized Neural Network. ACM Great Lakes Symposium on VLSI 2021: 89-94 - [c65]Akashdeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Design and Analysis of Logic Locking Techniques. VLSI-SoC 2021: 1-2 - [i12]Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Open Sesame: A Novel Non-SAT-Attack against CAS-Lock. IACR Cryptol. ePrint Arch. 2021: 791 (2021) - [i11]Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs. IACR Cryptol. ePrint Arch. 2021: 1067 (2021) - 2020
- [j35]Tamzidul Hoque, Rajat Subhra Chakraborty, Swarup Bhunia:
Hardware Obfuscation and Logic Locking: A Tutorial Introduction. IEEE Des. Test 37(3): 59-77 (2020) - [j34]Rijoy Mukherjee, Vidya Govindan, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi, Rajat Subhra Chakraborty:
Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure. J. Hardw. Syst. Secur. 4(4): 343-360 (2020) - [j33]Aniket Roy, Rajat Subhra Chakraborty:
Toward Optimal Prediction Error Expansion-Based Reversible Image Watermarking. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2377-2390 (2020) - [j32]Urbi Chatterjee, Soumi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT. ACM Trans. Design Autom. Electr. Syst. 25(4): 32:1-32:21 (2020) - [c64]Diangarti Bhalang Tariang, Sri Charan Birudaraju, Ruchira Naskar, Vijeta Khare, Rajat Subhra Chakraborty:
Malware Classification Through Attention Residual Network based Visualization. AsianHOST 2020: 1-6 - [c63]Sree Ranjani Rajendran, Rijoy Mukherjee, Rajat Subhra Chakraborty:
SoK: Physical and Logic Testing Techniques for Hardware Trojan Detection. ASHES@CCS 2020: 103-116 - [c62]Urbi Chatterjee, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions. WWW (Companion Volume) 2020: 217-221
2010 – 2019
- 2019
- [j31]Pallabi Ghosh, Aritra Bhattacharya, Domenic Forte, Rajat Subhra Chakraborty:
Automated Defective Pin Detection for Recycled Microelectronics Identification. J. Hardw. Syst. Secur. 3(3): 250-260 (2019) - [j30]Diangarti Bhalang Tariang, Rajat Subhra Chakraborty, Ruchira Naskar:
A Robust Residual Dense Neural Network For Countering Antiforensic Attack on Median Filtered Images. IEEE Signal Process. Lett. 26(8): 1132-1136 (2019) - [j29]Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database. IEEE Trans. Dependable Secur. Comput. 16(3): 424-437 (2019) - [j28]Pallabi Ghosh, Rajat Subhra Chakraborty:
Recycled and Remarked Counterfeit Integrated Circuit Detection by Image-Processing-Based Package Texture and Indent Analysis. IEEE Trans. Ind. Informatics 15(4): 1966-1974 (2019) - [c61]Venkata Sreekanth Balijabudda, Dhruv Thapar, Pranesh Santikellur, Rajat Subhra Chakraborty, Indrajit Chakrabarti:
Design of a Chaotic Oscillator based Model Building Attack Resistant Arbiter PUF. AsianHOST 2019: 1-6 - [c60]Pranesh Santikellur, Lakshya, Shashi Ranjan Prakash, Rajat Subhra Chakraborty:
A Computationally Efficient Tensor Regression Network based Modeling Attack on XOR APUF. AsianHOST 2019: 1-6 - [c59]Saranyu Chattopadhyay, Preeti Kumari, Biswajit Ray, Rajat Subhra Chakraborty:
Machine Learning Assisted Accurate Estimation of Usage Duration and Manufacturer for Recycled and Counterfeit Flash Memory Detection. ATS 2019: 49-54 - [c58]Diangarti Bhalang Tariang, Prithviraj Senguptab, Aniket Roy, Rajat Subhra Chakraborty, Ruchira Naskar:
Classification of Computer Generated and Natural Images based on Efficient Deep Convolutional Recurrent Attention Model. CVPR Workshops 2019: 146-152 - [c57]Urbi Chatterjee, Pranesh Santikellur, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs. DAC 2019: 224 - [c56]Saranyu Chattopadhyay, Rajat Subhra Chakraborty:
Cyclic Beneš Network Based Logic Encryption for Mitigating SAT-Based Attacks. ICCD 2019: 567-575 - [c55]Vidya Govindan, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi, Rajat Subhra Chakraborty:
ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch. SPACE 2019: 159-175 - [c54]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. SPACE 2019: 214-230 - [p2]Durga Prasad Sahoo, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Fault-Tolerant Implementations of Physically Unclonable Functions on FPGA. Security and Fault Tolerance in Internet of Things 2019: 129-153 - [e3]Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos:
Security and Fault Tolerance in Internet of Things - Technology, Communications and Computing. Springer 2019, ISBN 978-3-030-02806-0 [contents] - [i10]Pranesh Santikellur, Aritra Bhattacharyay, Rajat Subhra Chakraborty:
Deep Learning based Model Building Attacks on Arbiter PUF Compositions. IACR Cryptol. ePrint Arch. 2019: 566 (2019) - 2018
- [j27]Debapriya Basu Roy, Manaar Alam, Sarani Bhattacharya, Vidya Govindan, Francesco Regazzoni, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Customized Instructions for Protection Against Memory Integrity Attacks. IEEE Embed. Syst. Lett. 10(3): 91-94 (2018) - [j26]Vidya Govindan, Rajat Subhra Chakraborty, Pranesh Santikellur, Aditya Kumar Chaudhary:
A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection. J. Hardw. Syst. Secur. 2(3): 225-239 (2018) - [j25]Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen:
A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security. IEEE Trans. Computers 67(3): 403-417 (2018) - [c53]Aniket Roy, Diangarti Bhalang Tariang, Rajat Subhra Chakraborty, Ruchira Naskar:
Discrete Cosine Transform Residual Feature Based Filtering Forgery and Splicing Detection in JPEG Images. CVPR Workshops 2018: 1552-1560 - [c52]Mustafa Khairallah, Rajat Sadhukhan, Radhamanjari Samanta, Jakub Breier, Shivam Bhasin, Rajat Subhra Chakraborty, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
DFARPA: Differential fault attack resistant physical design automation. DATE 2018: 1171-1174 - [c51]Urbi Chatterjee, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Trustworthy proofs for sensor data using FPGA based physically unclonable functions. DATE 2018: 1504-1507 - [c50]Urbi Chatterjee, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Sweta Pati, Debashis Mahata, Mukesh M. Prabhu:
PUFSSL: An OpenSSL Extension for PUF based Authentication. DSP 2018: 1-5 - 2017
- [j24]Anju P. Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications. Microprocess. Microsystems 52: 131-144 (2017) - [j23]Rajat Subhra Chakraborty, Ratan Rahul Jeldi, Indrasish Saha, Jimson Mathew:
Binary Decision Diagram Assisted Modeling of FPGA-Based Physically Unclonable Function by Genetic Programming. IEEE Trans. Computers 66(6): 971-981 (2017) - [j22]Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
An Improved DCM-Based Tunable True Random Number Generator for Xilinx FPGA. IEEE Trans. Circuits Syst. II Express Briefs 64-II(4): 452-456 (2017) - [j21]Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-Based Secure Communication Protocol for IoT. ACM Trans. Embed. Comput. Syst. 16(3): 67:1-67:25 (2017) - [j20]Jimson Mathew, Rajat Subhra Chakraborty, Dhiraj K. Pradhan:
Guest Editorial: Special Issue on "Secure and Fault-Tolerant Embedded Computing". ACM Trans. Embed. Comput. Syst. 16(4): 92:1-92:2 (2017) - [j19]Rajat Subhra Chakraborty, Samuel Pagliarini, Jimson Mathew, Sree Ranjani Rajendran, M. Nirmala Devi:
A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis. IEEE Trans. Emerg. Top. Comput. 5(2): 260-270 (2017) - [j18]Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test. ACM Trans. Design Autom. Electr. Syst. 22(2): 20:1-20:28 (2017) - [c49]Aniket Roy, Rajat Subhra Chakraborty, Venkata Udaya Sameer, Ruchira Naskar:
Camera Source Identification Using Discrete Cosine Transform Residue Features and Ensemble Classifier. CVPR Workshops 2017: 1848-1854 - [c48]Durga Prasad Sahoo, Phuong Ha Nguyen, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Side Channel Evaluation of PUF-Based Pseudorandom Permutation. DSD 2017: 237-243 - [c47]Pallabi Ghosh, Rajat Subhra Chakraborty:
Counterfeit IC Detection By Image Texture Analysis. DSD 2017: 283-286 - [c46]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. HOST 2017: 167 - [c45]Aniket Roy, Akhil Konda, Rajat Subhra Chakraborty:
Copy move forgery detection with similar but genuine objects. ICIP 2017: 4083-4087 - [c44]Diangarti Bhalang Tariang, Aniket Roy, Rajat Subhra Chakraborty, Ruchira Naskar:
Automated JPEG forgery detection with correlation based localization. ICME Workshops 2017: 226-231 - [i9]Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs. IACR Cryptol. ePrint Arch. 2017: 422 (2017) - [i8]Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test. IACR Cryptol. ePrint Arch. 2017: 459 (2017) - 2016
- [j17]Urbi Chatterjee, Rajat Subhra Chakraborty, Hitesh Kapoor, Debdeep Mukhopadhyay:
Theory and Application of Delay Constraints in Arbiter PUF. ACM Trans. Embed. Comput. Syst. 15(1): 10:1-10:20 (2016) - [j16]Ruchira Naskar, Rajat Subhra Chakraborty:
A Technique to Evaluate Upper Bounds on Performance of Pixel-prediction Based Reversible Watermarking Algorithms. J. Signal Process. Syst. 82(3): 373-389 (2016) - [c43]Anju P. Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Remote Dynamic Clock Reconfiguration Based Attacks on Internet of Things Applications. DSD 2016: 431-438 - [c42]Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Testability Based Metric for Hardware Trojan Vulnerability Assessment. DSD 2016: 503-510 - [c41]Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Fault Tolerant Implementations of Delay-Based Physically Unclonable Functions on FPGA. FDTC 2016: 87-101 - [c40]Aniket Roy, Rajat Subhra Chakraborty:
Optimal Distortion Estimation for Prediction Error Expansion Based Reversible Watermarking. IWDW 2016: 265-279 - [c39]Manaar Alam, Debapriya Basu Roy, Sarani Bhattacharya, Vidya Govindan, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC. MEMOCODE 2016: 1-4 - [c38]Urbi Chatterjee, Rajat Subhra Chakraborty, Jimson Mathew, Dhiraj K. Pradhan:
Memristor Based Arbiter PUF: Cryptanalysis Threat and Its Mitigation. VLSID 2016: 535-540 - [i7]Durga Prasad Sahoo, Phuong Ha Nguyen, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants. IACR Cryptol. ePrint Arch. 2016: 57 (2016) - [i6]Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems. IACR Cryptol. ePrint Arch. 2016: 182 (2016) - [i5]Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA. IACR Cryptol. ePrint Arch. 2016: 441 (2016) - [i4]Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-based Secure Communication Protocol for IoT. IACR Cryptol. ePrint Arch. 2016: 674 (2016) - [i3]Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen:
A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security. IACR Cryptol. ePrint Arch. 2016: 1031 (2016) - [i2]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse. IACR Cryptol. ePrint Arch. 2016: 1149 (2016) - 2015
- [j15]Jimson Mathew, Rajat Subhra Chakraborty, Durga Prasad Sahoo, Yuanfan Yang, Dhiraj K. Pradhan:
A novel memristor based physically unclonable function. Integr. 51: 37-45 (2015) - [j14]Durga Prasad Sahoo, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8): 1334-1343 (2015) - [j13]Jimson Mathew, Rajat Subhra Chakraborty, Durga Prasad Sahoo, Yuanfan Yang, Dhiraj K. Pradhan:
A Novel Memristor-Based Hardware Security Primitive. ACM Trans. Embed. Comput. Syst. 14(3): 60:1-60:20 (2015) - [j12]Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-Enabled Secure Architecture for FPGA-Based IoT Applications. IEEE Trans. Multi Scale Comput. Syst. 1(2): 110-122 (2015) - [c37]Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay:
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability. CHES 2015: 577-596 - [c36]Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. DATE 2015: 641-646 - [c35]Ayan Palchaudhuri, Rajat Subhra Chakraborty, Durga Prasad Sahoo:
Automated Design of High Performance Integer Arithmetic Cores on FPGA. DSD 2015: 322-329 - [c34]Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Towards Ideal Arbiter PUF Design on Xilinx FPGA: A Practitioner's Perspective. DSD 2015: 559-562 - [c33]Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A Novel Attack on a FPGA based True Random Number Generator. WESS 2015: 6 - [c32]Aniket Roy, Rajat Subhra Chakraborty, Ruchira Naskar:
Reversible Color Image Watermarking in the YCoCg-R Color Space. ICISS 2015: 480-498 - [c31]Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen, Durga Prasad Sahoo:
Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things. VLSID 2015: 14-15 - [p1]Ayan Palchaudhuri, Rajat Subhra Chakraborty:
A Fabric Component Based Approach to the Architecture and Design Automation of High-Performance Integer Arithmetic Circuits on FPGA. Computational Intelligence in Digital and Network Designs and Applications 2015: 33-68 - [e2]Rajat Subhra Chakraborty, Peter Schwabe, Jon A. Solworth:
Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings. Lecture Notes in Computer Science 9354, Springer 2015, ISBN 978-3-319-24125-8 [contents] - [i1]Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay:
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability. IACR Cryptol. ePrint Arch. 2015: 1252 (2015) - 2014
- [b2]Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Hardware Security - Design, Threats, and Safeguards. CRC Press 2014, ISBN 978-1-439-89583-2, pp. I-XXXIII, 1-556 - [b1]Ruchira Naskar, Rajat Subhra Chakraborty:
Reversible Digital Watermarking: Theory and Practices. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2014, ISBN 978-3-031-01214-3 - [c30]Ayan Palchaudhuri, Rajat Subhra Chakraborty, Mohammad Salman, Sreemukh Kardas, Debdeep Mukhopadhyay:
Highly Compact Automated Implementation of Linear CA on FPGAs. ACRI 2014: 388-397 - [c29]Anju P. Johnson, Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Sezer Gören:
Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. WESS 2014: 1:1-1:8 - [c28]Durga Prasad Sahoo, Sayandeep Saha, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Hitesh Kapoor:
Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA. HOST 2014: 50-55 - [c27]Phuong Ha Nguyen, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Cryptanalysis of Composite PUFs (Extended abstract-invited talk). VDAT 2014: 1-2 - [e1]Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont:
Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings. Lecture Notes in Computer Science 8804, Springer 2014, ISBN 978-3-319-12059-1 [contents] - 2013
- [j11]Sezer Gören, Ozgur Ozkurt, Abdullah Yildiz, H. Fatih Ugurdag, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Partial bitstream protection for low-cost FPGAs with physical unclonable function, obfuscation, and dynamic partial self reconfiguration. Comput. Electr. Eng. 39(2): 386-397 (2013) - [j10]Rajat Subhra Chakraborty, Indrasish Saha, Ayan Palchaudhuri, Gowtham Kumar Naik:
Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream. IEEE Des. Test 30(2): 45-54 (2013) - [j9]Ruchira Naskar, Rajat Subhra Chakraborty:
Histogram-bin-shifting-based reversible watermarking for colour images. IET Image Process. 7(2): 99-110 (2013) - [j8]Seetharam Narasimhan, Dongdong Du, Rajat Subhra Chakraborty, Somnath Paul, Francis G. Wolff, Christos A. Papachristou, Kaushik Roy, Swarup Bhunia:
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis. IEEE Trans. Computers 62(11): 2183-2195 (2013) - [j7]Ruchira Naskar, Rajat Subhra Chakraborty:
A generalized tamper localization approach for reversible watermarking algorithms. ACM Trans. Multim. Comput. Commun. Appl. 9(3): 19:1-19:22 (2013) - [c26]Indrasish Saha, Ratan Rahul Jeldi, Rajat Subhra Chakraborty:
Model building attacks on Physically Unclonable Functions using genetic programming. HOST 2013: 41-44 - [c25]Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Design of low area-overhead ring oscillator PUF with large challenge space. ReConFig 2013: 1-6 - 2012
- [j6]Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Chakraborty:
Hardware IP Protection During Evaluation Using Embedded Sequential Trojan. IEEE Des. Test Comput. 29(3): 70-79 (2012) - [c24]Ruchira Naskar, Rajat Subhra Chakraborty:
Fuzzy Inference Rule Based Reversible Watermarking for Digital Images. ICISS 2012: 149-163 - [c23]Ruchira Naskar, Rajat Subhra Chakraborty:
Lossless secret image sharing based on generalized: LSB replacement. RACS 2012: 290-295 - [c22]Sanjay Burman, Ayan Palchaudhuri, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Pranav Singh:
Effect of Malicious Hardware Logic on Circuit Reliability. VDAT 2012: 190-197 - 2011
- [j5]Rajat Subhra Chakraborty, Swarup Bhunia:
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation. J. Electron. Test. 27(6): 767-785 (2011) - [c21]Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Testability of Cryptographic Hardware and Detection of Hardware Trojans. Asian Test Symposium 2011: 517-524 - [c20]Subidh Ali, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Swarup Bhunia:
Multi-level attacks: An emerging security concern for cryptographic hardware. DATE 2011: 1176-1179 - [c19]Seetharam Narasimhan, Xinmu Wang, Dongdong Du, Rajat Subhra Chakraborty, Swarup Bhunia:
TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection. HOST 2011: 71-74 - [c18]Ruchira Naskar, Rajat Subhra Chakraborty:
Reversible Image Watermarking through Coordinate Logic Operation Based Prediction. ICISS 2011: 190-203 - [c17]Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia:
Embedded Software Security through Key-Based Control Flow Obfuscation. InfoSecHiComNet 2011: 30-44 - [c16]Sambaran Bandyopadhyay, Ruchira Naskar, Rajat Subhra Chakraborty:
Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform. InfoSecHiComNet 2011: 45-56 - 2010
- [c15]Seetharam Narasimhan, Somnath Paul, Rajat Subhra Chakraborty, Francis G. Wolff, Christos A. Papachristou, Daniel J. Weyer, Swarup Bhunia:
System level self-healing for parametric yield and reliability improvement under power bound. AHS 2010: 52-58 - [c14]Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia:
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection. CHES 2010: 173-187 - [c13]Seetharam Narasimhan, Rajat Subhra Chakraborty, Dongdong Du, Somnath Paul, Francis G. Wolff, Christos A. Papachristou, Kaushik Roy, Swarup Bhunia:
Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach. HOST 2010: 13-18 - [c12]Rajat Subhra Chakraborty, Swarup Bhunia:
RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation. VLSI Design 2010: 405-410
2000 – 2009
- 2009
- [j4]Rajat Subhra Chakraborty, Somnath Paul, Yu Zhou, Swarup Bhunia:
Low-power hybrid complementary metaloxide- semiconductor-nano-electro-mechanical systems field programmable gate array: circuit level analysis and defect-aware mapping. IET Comput. Digit. Tech. 3(6): 609-624 (2009) - [j3]Rajat Subhra Chakraborty, Swarup Bhunia:
A study of asynchronous design methodology for robust CMOS-nano hybrid system design. ACM J. Emerg. Technol. Comput. Syst. 5(3): 12:1-12:22 (2009) - [j2]Rajat Subhra Chakraborty, Swarup Bhunia:
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 28(10): 1493-1502 (2009) - [c11]Rajat Subhra Chakraborty, Francis G. Wolff, Somnath Paul, Christos A. Papachristou, Swarup Bhunia:
MERO: A Statistical Approach for Hardware Trojan Detection. CHES 2009: 396-410 - [c10]Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia:
Hardware Trojan: Threats and emerging solutions. HLDVT 2009: 166-171 - [c9]Rajat Subhra Chakraborty, Swarup Bhunia:
Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP. HOST 2009: 96-99 - [c8]Rajat Subhra Chakraborty, Swarup Bhunia:
Security against hardware Trojan through a novel application of design obfuscation. ICCAD 2009: 113-116 - 2008
- [c7]Francis G. Wolff, Christos A. Papachristou, Swarup Bhunia, Rajat Subhra Chakraborty:
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme. DATE 2008: 1362-1365 - [c6]Rajat Subhra Chakraborty, Somnath Paul, Swarup Bhunia:
On-Demand Transparency for Improving Hardware Trojan Detectability. HOST 2008: 48-50 - [c5]Rajat Subhra Chakraborty, Swarup Bhunia:
Hardware protection and authentication through netlist level obfuscation. ICCAD 2008: 674-677 - [c4]Rajat Subhra Chakraborty, Swarup Bhunia:
Micropipeline-Based Asynchronous Design Methodology for Robust System Design Using Nanoscale Crossbar. ISQED 2008: 697-701 - [c3]Rajat Subhra Chakraborty, Somnath Paul, Swarup Bhunia:
Analysis and Robust Design of Diode-Resistor Based Nanoscale Crossbar PLA Circuits. VLSI Design 2008: 441-446 - 2007
- [j1]Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia:
Hybridization of CMOS With CNT-Based Nano-Electromechanical Switch for Low Leakage and Robust Circuit Design. IEEE Trans. Circuits Syst. I Regul. Pap. 54-I(11): 2480-2488 (2007) - [c2]Somnath Paul, Rajat Subhra Chakraborty, Swarup Bhunia:
Defect-Aware Configurable Computing in Nanoscale Crossbar for Improved Yield. IOLTS 2007: 29-36 - [c1]Somnath Paul, Rajat Subhra Chakraborty, Swarup Bhunia:
VIm-Scan: A Low Overhead Scan Design Approach for Protection of Secret Key in Scan-Based Secure Chips. VTS 2007: 455-460
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint