Name
Papers
Collaborators
ANUPAM CHATTOPADHYAY
158
262
Citations 
PageRank 
Referers 
318
62.76
653
Referees 
References 
2644
1508
Search Limit
1001000
Title
Citations
PageRank
Year
Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs.00.342022
Feeding Three Birds With One Scone - A Generic Duplication Based Countermeasure To Fault Attacks.00.342021
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version).00.342021
Three Input Exclusive-OR Gate Support for Boyar-Peralta's Algorithm.00.342021
Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography00.342021
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis.00.342020
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA10.342020
Threshold Implementations Of Gift: A Trade-Off Analysis00.342020
Towards Designing a Secure RISC-V System-on-Chip: ITUS00.342020
Efficient Quantum Circuits for Square-Root and Inverse Square-Root00.342020
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4.00.342020
A Coding Theoretic Approach Towards Symmetrization In Reversible Circuit Synthesis00.342020
Re-markable - Stealing Watermarked Neural Networks Through Synthesis.00.342020
A Brain–Computer Interface Framework Based on Compressive Sensing and Deep Learning00.342020
Enabling Efficient Mapping of XMG-Synthesized Networks to Spintronic Hardware00.342020
Lightweight Secure-Boot Architecture for RISC-V System-on-Chip20.392019
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor.00.342019
Number "Not Used" Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates.10.352019
Optimizing Quantum Circuits for Modular Exponentiation00.342019
Analysis Of The Strict Avalanche Criterion In Variants Of Arbiter-Based Physically Unclonable Functions20.372019
RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders00.342019
Guest Editorial Special Section on Security Challenges and Solutions With Emerging Computing Technologies00.342019
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST Candidates.10.352019
Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST Candidates.00.342019
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes.00.342019
Spintronic Device-Structure for Low-Energy XOR Logic using Domain Wall Motion10.372019
Design and synthesis of improved reversible circuits using AIG- and MIG-based graph data structures.00.342019
Efficient Realization of Givens Rotation through Algorithm-Architecture Co-design for Acceleration of QR Factorization.00.342018
Crack Me If You Can: Hardware Acceleration Bridging The Gap Between Practical And Theoretical Cryptanalysis? A Survey00.342018
CoLPUF : A Novel Configurable LFSR-based PUF00.342018
Accelerating Hash Computations Through Efficient Instruction-Set Customisation20.512018
On Hardware Implementation of Tang-Maitra Boolean Functions.00.342018
A template-based technique for efficient Clifford+T-based quantum circuit implementation.50.632018
BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS10.362018
Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate.00.342018
ReRAM-based In-Memory Computation of Galois Field arithmetic00.342018
Number "Not" Used Once - Key Recovery Fault Attacks on LWE Based Lattice Cryptographic Schemes.00.342018
PPAP and iPPAP: PLL-Based Protection Against Physical Attacks.00.342018
RAPPER: Ransomware Prevention via Performance Counters.10.352018
Lightweight and High Performance SHA-256 using Architectural Folding and 4-2 Adder Compressor00.342018
A Hardware-Efficient Implementation of CLOC for On-chip Authenticated Encryption00.342018
TriviA and uTriviA: two fast and secure authenticated encryption schemes.00.342018
Achieving Efficient Realization of Kalman Filter on CGRA through Algorithm-Architecture Co-design.20.382018
Domain Wall Motion-based Dual-Threshold Activation Unit for Low-Power Classification of Non-Linearly Separable Functions.00.342018
Security of autonomous vehicle as a cyber-physical system00.342017
Automatic Test Pattern Generation for Multiple Missing Gate Faults in Reversible Circuits - Work in Progress Report.00.342017
Efficient complementary resistive switch-based crossbar array Booth multiplier.20.382017
RC4-AccSuite: A Hardware Acceleration Suite for RC4-Like Stream Ciphers.20.372017
Survey of secure processors00.342017
Depth-Optimal Quantum Circuit Placement for Arbitrary Topologies.30.472017
  • 1
  • 2