Scan based side channel attacks on stream ciphers and their counter-measures M Agrawal, S Karmakar, D Saha, D Mukhopadhyay Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008 | 84 | 2008 |
Fault analysis of Grain-128 by targeting NFSR S Karmakar, D Roy Chowdhury Progress in Cryptology–AFRICACRYPT 2011: 4th International Conference on …, 2011 | 52 | 2011 |
Differential fault analysis of MICKEY-128 2.0 S Karmakar, DR Chowdhury 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 52-59, 2013 | 27 | 2013 |
CAvium-Strengthening Trivium Stream Cipher Using Cellular Automata. S Karmakar, D Mukhopadhyay, DR Chowdhury J. Cell. Autom. 7 (2), 179-197, 2012 | 20 | 2012 |
d-Monomial Tests of Nonlinear Cellular Automata for Cryptographic Design S Karmakar, D Mukhopadhyay, D Roy Chowdhury Cellular Automata: 9th International Conference on Cellular Automata for …, 2010 | 14 | 2010 |
NOCAS: a nonlinear cellular automata based stream cipher S Karmakar, DR Chowdhury Discrete Mathematics & Theoretical Computer Science, 2011 | 11 | 2011 |
Detection and intelligent control of cloud data location using hyperledger framework S Basu, D Bera, S Karmakar IEEE Transactions on Consumer Electronics 69 (1), 76-86, 2022 | 10 | 2022 |
Leakage squeezing using cellular automata S Karmakar, D Roy Chowdhury Cellular Automata and Discrete Complex Systems: 19th International Workshop …, 2013 | 8 | 2013 |
Fault analysis of grain family of stream ciphers S Karmakar, DR Chowdhury Cryptology ePrint Archive, 2014 | 6 | 2014 |
Differential fault analysis of MICKEY family of stream ciphers S Karmakar, DR Chowdhury Cryptology ePrint Archive, 2014 | 6 | 2014 |
Scan-based side channel attack on stream ciphers and its prevention S Karmakar, DR Chowdhury Journal of Cryptographic Engineering 8, 327-340, 2018 | 5 | 2018 |
An algebraic cryptanalysis tool for cube attack on symmetric ciphers S Karmakar, P Mishra, N Gaba, DR Chowdhury Journal of Information and Optimization Sciences 39 (6), 1231-1243, 2018 | 4 | 2018 |
Blockchain based Secured Virtual Machine Image Monitor. S Basu, S Karmakar, D Bera ICISSP, 432-439, 2021 | 3 | 2021 |
Differential fault analysis of rectangle-80 S Sinha, S Karmakar Cryptology ePrint Archive, 2018 | 3 | 2018 |
Countermeasures of side channel attacks on symmetric key ciphers using cellular automata S Karmakar, DR Chowdhury International Conference on Cellular Automata, 623-632, 2012 | 3 | 2012 |
Non-destructive and partially destructive test locations in RC structures: A combined spatial optimisation and Bayesian updating approach S Karmakar, S Ghosh, D Saha, SA Faroz Life-Cycle of Structures and Infrastructure Systems, 2355-2362, 2023 | 2 | 2023 |
Securing cloud virtual machine image using ethereum blockchain S Basu, S Karmakar, D Bera International Journal of Information Security and Privacy (IJISP) 16 (1), 1-22, 2022 | 2 | 2022 |
An Experiment with Some Rule 30 and Rule 150 Hybrid Non-linear Cellular Automata for Cryptography. S Karmakar Journal of Cellular Automata 13, 2018 | 2 | 2018 |
A generic scan attack on hardware based estream winners S Karmakar, DR Chowdhury Cryptology ePrint Archive, 2014 | 2 | 2014 |
Design and Analysis of Some Cryptographically Robust Non-uniform Nonlinear Cellular Automata. S Karmakar, DR Chowdhury Journal of Cellular Automata 13, 2018 | 1 | 2018 |